James A. Lynn - Rose Hill KS Pramodh K. Mereddy - Wichita KS
Assignee:
LSI Logic Corporation - Milpitas CA
International Classification:
G06F 300
US Classification:
710 9, 710 10, 710 15, 710 16, 710 17
Abstract:
An apparatus comprising one or more enclosures and a controller. The one or more enclosures may each comprise one or more drives. The controller may be configured to map correctly correlating addresses to one or more drives. An advantageous aspect of the present invention is the ability to support general enclosure wiring when associating data with physical devices, such as associating SES data with physical devices on a fiber channel loop with soft addresses.
Method And Apparatus For Identifying One Or More Devices Having Faults In A Communication Loop
Daniel A. Riedl - Andover KS, US James A. Lynn - Rose Hill KS, US Anthony D. Gitchell - Derby KS, US
Assignee:
LSI Logic Corporation - Milpitas CA
International Classification:
G06F 11/00 G06F 11/10 G06F 11/20
US Classification:
714 4, 714 5
Abstract:
A system identifies one or more devices having faults in a communication loop. The system includes an interface, a decision module, and a connection processor. The interface is configured for sending requests for information to each device of the communication loop and for receiving responses to the requests. The devices may include computer disk drives for use in a storage system. The requests may include Read-Link Status (RLS) commands sent to the computer disk drives. The RLS commands may provide diagnostics of the disk drives connected to the loop. The decision module is communicatively connected to the interface for weighting the responses of each device to identify the devices having the faults. The responses may be weighted based on the relative potential for disrupting operability of the system. The communication loop may include an FC loop that allows communications between a host system and the computer disk drives.
Method For Changing Fibre Channel Speed Of A Drive Loop With Esm-Controlled Drive Boxes Using Redundant Drive Channels
James A. Lynn - Rose Hill KS, US Jeremy D. Stover - Wichita KS, US Jason M. Stuhsatz - Wichita KS, US Dan A. Riedl - Andover KS, US Timothy Flynn - Wichita KS, US
Assignee:
LSI Logic Corporation - Milpitas CA
International Classification:
G06F 15/16
US Classification:
709233, 709228, 370229
Abstract:
The present invention discloses a system for adjusting the speed of operation of a channel for communicating with disk drives in a multi ported system, comprising a bridge controller having a first channel and a second channel and a plurality of enclosure services modules, each having a first channel connected in sequence from a bridge controller to a first enclosure services module and successively connected to successive enclosure services modules to a last enclosure services module and each having a second channel connected in reverse sequence from the bridge controller to the last enclosure services module and successively connected to the successive enclosure services modules to the first enclosure services module. In the disclosed method for changing the speed of operation of a channel, a change speed is performed on either the first or second channel and the other of the first and second channel is used to send change speed frames from the bridge controller to each of the plurality of enclosure services modules.
Method And Apparatus For Balancing A Request Load Of Communication Channels
James A. Lynn - Rose Hill KS, US Pramodh K. Mereddy - Wichita KS, US
Assignee:
LSI Corporation - Milpitas CA
International Classification:
H04J 3/16
US Classification:
370468, 3702301
Abstract:
The present invention provides systems and methods for balancing a request load on device communication channels. A system includes a channel scanner, a processor, and a load balancer. The system may iteratively balance the request load on the communication channels. The device communication channels are typically connected between controllers and a system of devices. The channel scanner is configured for scanning the channels to determine the number or bandwidth of requests of each device. The processor may rank the devices by the number or bandwidth of requests of each device. The load balancer may allocate the requests between the channels based on the rank of the devices. For example, the load balancer may receive the rank order of the devices from the processor and allocate the requests based on the rank order. The load balancer may additionally allocate the requests based on present capabilities of the channels.
Method And Apparatus For Identifying Ipsec Security Policy In Iscsi
The present invention is directed to a method and apparatus for identifying IPsec security policy in iSCSI. In an exemplary aspect of the present invention, a method for identifying IPsec security policy in iSCSI includes the following steps. An IP address may be allocated to a physical port of an iSCSI network entity. The physical port may include at least one TCP listening port. For a discovery session, the IP address may be statically allocated (or permanently leased). For a normal session, the IP address may be statically allocated or DHCP assigned. A TCP listening port associated with the IP address in an iSCSI portal may then be used to link a security policy on an IP connection with iSCSI configuration.
Methods For Defining And Naming Iscsi Targets Using Volume Access And Security Policy
Andrew J. Spry - Wichita KS, US Kevin Lindgren - Newtown KS, US James Lynn - Rose Hill KS, US
Assignee:
LSI Logic Corporation - Milpitas CA
International Classification:
H04L 9/00
US Classification:
726 1
Abstract:
The present invention is directed to methods for defining and naming iSCSI targets using volume access and security policy. In an exemplary aspect of the present invention, a method for defining an iSCSI target using volume access and security policy may include the following steps. One or more volumes of a network entity may be first mapped to an initiator. The mapping defines the unique Logical Unit Number for the volume to an initiator. Then, a security level may be defined for access to each volume accessed by the initiator. The subset of mappings for each initiator may be given any unique name. Next, the mapping and security subsets may be used to define the fully qualified targets with which the initiator may open a session.
Method Of Partioning Storage In Systems With Both Single And Virtual Target Interfaces
James A. Lynn - Rose Hill KS, US Kevin F. Lindgren - Newton KS, US
Assignee:
LSI Corporation - Milpitas CA
International Classification:
G06F 13/14 G06F 12/06
US Classification:
711153, 711173
Abstract:
A method of partitioning storage is provided. In an exemplary embodiment, the method includes connecting at least one initiator with at least one target device. Upon connection of the at least one initiator with the at least one target device, at least one initiator-target association object may be created. The method may also include selecting at least one storage partition with the at least one initiator-target association object.
Method For Simplifying Interfaces Having Dynamic Libraries
A method may include defining an interface class including a static member having an implementation pointer. The method may also include loading a main code segment including a stub implementation of the interface class. Additionally, the method may include instantiating the stub implementation of the interface class to provide a stub implementation object. The stub implementation of the interface class may include a first constructor configured to set the implementation pointer to the stub implementation object. Further, the method may include loading a dynamic library including a real implementation of the interface class. Still further, the method may include instantiating the real implementation of the interface class to provide a real implementation object. The real implementation of the interface class may include a second constructor configured to set the implementation pointer to the real implementation object.
Mettler Toledo Hi-Speed - Network Admin (2011) NY Army National Guard - PFC (2009-2012) All-Mode Communications - VoIP Installation Tech (2010-2011) Anheuser-Busch InBev - IS Co-Op (2009-2009) Rochester Institute of Technology - Teaching Assistant (2009-2010) Monroe 2 Boces - IT Co-Op (2008-2008)
Education:
Rochester Institute of Technology - Applied Networking and Systems Administration
Relationship:
Single
About:
I am James. I am a gamer, an Airsofter, and a computer geek.Â
Home Base Businessowner at Healthy Water Living I am a person who enjoys helping and working with others to achieve THEIR GOALS !
I believe You Sow what You REAP...So if I help others,I will also benefit... I am a person who enjoys helping and working with others to achieve THEIR GOALS !
I believe You Sow what You REAP...So if I help others,I will also benefit from helping them.
I also believe in "Treat Others as YOU Wish To Be TREATED "
Soon after, one of Tonya Lynn's relatives alerted police that this was not the first time a spouse of James Lynn had died unexpectedly. His first wife died in the bathtub at their home in Candler County in the early 1990s; medical examiners ruled it a suicide.Police believe James Lynn killed Tonya during an argument early that morning, dumped her body in the well and left her Chevrolet Tahoe at a library near their house so it appeared she had abandoned it there.
to the well in a densely wooded area near the Gwinnett County border. The body, believed to be Tonya Faye Lynn, 38, will be taken to the Georgia Crime Lab for a positive identification and, perhaps, an autopsy. If the identity is confirmed, police said James Lynn will likely be charged with murder.James Lynn was charged with battery in May after an incident in which he allegedly threw his wife off a mattress, injuring her knee. During one incident in which police were dispatched to the couple's home, Tonya Lynn told an officer her husband "has a violent history."