Patents by Inventor Nathan Marushak

Nathan Marushak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7797465
    Abstract: A core of a network includes a storage unit to store a plurality of parameters to receive and transmit data packets in a communication system. A program controls transfer of the data packets between the core and a network node. The plurality of parameters in the storage unit controls the receiving and transmitting.
    Type: Grant
    Filed: June 10, 2005
    Date of Patent: September 14, 2010
    Assignee: Intel Corporation
    Inventors: Roger C. Jeppsen, Nathan Marushak, Brian J. Skerry, Jeffrey D. Skirvin
  • Publication number: 20070005819
    Abstract: A method and apparatus to guarantee unique connection tags across resets in a connection protocol. In one embodiment, the methods include the update of a reset counter following a system reset. In one embodiment, once updated, a controller, such as, for example, an input/output (I/O) controller, may receive a response from a target device to an I/O request that was issued to the target device prior to system reset. In one embodiment, the I/O controller may determine a reset counter value associated with the received response. If the received response includes a reset counter value that does not match a local reset counter held by the I/O controller, the I/O controller may disregard the received response. Other embodiments are described and claimed.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Inventors: Jeffrey Skirvin, Nathan Marushak, Roger Jeppsen, Jonathan Wootten, Richard Boyd
  • Publication number: 20060282526
    Abstract: A core of a network includes a storage unit to store a plurality of parameters to receive and transmit data packets in a communication system. A program controls transfer of the data packets between the core and a network node. The plurality of parameters in the storage unit controls the receiving and transmitting.
    Type: Application
    Filed: June 10, 2005
    Publication date: December 14, 2006
    Inventors: Roger Jeppsen, Nathan Marushak, Brian Skerry, Jeffrey Skirvin
  • Publication number: 20060271722
    Abstract: Provided are a method, system, and program for processing a transmission from a first device to a second device. An identification transmission is received including an interface address from the first device. A determination is made as to whether the identification transmission indicates a recognized vendor identifier. An interface address of a third device is returned to the first device in response to determining that the identification transmission includes one recognized vendor identifier, wherein the third device relays transmissions between the first and second devices.
    Type: Application
    Filed: July 27, 2006
    Publication date: November 30, 2006
    Applicant: INTEL CORPORATION
    Inventors: Nathan Marushak, Deif Atallah
  • Publication number: 20060155888
    Abstract: In one embodiment, a method may include, if an amount of data requested to be transferred by a data transfer request according to a first protocol exceeds a maximum data transfer amount permitted to be requested by a single data transfer request according to a second protocol, generating one data transfer request according to the second protocol and a data structure, and modifying, at least in part, another data structure. This data transfer request may request transfer of a portion of the data. The data structure may include one or more values identifying, at least in part, another portion of the data. The modifying may be based, at least in part, upon the one or more values. The other data structure may include, prior to being modified, one or more other values indicating, at least in part, one or more parameters of the one data transfer request.
    Type: Application
    Filed: March 10, 2006
    Publication date: July 13, 2006
    Inventors: Roger Jeppsen, Nathan Marushak
  • Publication number: 20060143331
    Abstract: One embodiment of a method may include, in response, at least in part, to one or more received frames, generating an interrupt and preventing transmission of one or more other frames. The one or more received frames may indicate, at least in part, an error condition or a commencement of a data transfer. The method of this embodiment also may include, in response, at least in part, to the interrupt, executing one or more instructions. The one or more instructions, when executed, may optionally result in deleting the one or more other frames, and if the one or more received frames indicate, at least in part, the error condition, commencing recovery from the error condition. If the one or more received frames indicate, at least in part, the commencement of the data transfer, the method of the embodiment may include storing data associated with the data transfer.
    Type: Application
    Filed: December 14, 2004
    Publication date: June 29, 2006
    Inventors: Nathan Marushak, Roger Jeppsen, Richard Beckett, Devicharan Devidas, Richard Carmichael
  • Publication number: 20060123167
    Abstract: In one embodiment, if the amount of data requested by a data transfer request according to a first protocol exceeds a maximum permitted for a single data transfer request according to a second protocol, a data structure and one data transfer request according to the second protocol may be generated. The request may request a portion of the data. If a target of the request is capable of receiving, prior to completion of performance of the request, another data transfer request according to the second protocol, the another data transfer request may be generated, based upon the at least one value, and the data structure may be modified. The another data transfer request may request at least some of the another portion of the data. The data structure, as modified, may comprise at least one value indicating that the target has not completed performing the another data transfer request.
    Type: Application
    Filed: December 8, 2004
    Publication date: June 8, 2006
    Inventors: Roger Jeppsen, Nathan Marushak
  • Publication number: 20060095658
    Abstract: A method according to one embodiment may include communicating, by an integrated circuit, with at least one target ATA/ATAPI storage device. The method of this embodiment may also include creating, by the integrated circuit, a persistent reservation between at least one target ATA/ATAPI storage device and the integrated circuit. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 4, 2006
    Inventors: Nathan Marushak, Chet Douglas
  • Publication number: 20060095599
    Abstract: A method according to one embodiment may include communicating, by an expander device, with at least one initiator engine using at least a first communication protocol and at least one target storage device using at least a second communication protocol. The method of this embodiment may also include translating, by the expander device, between first commands transmitted using the first communication protocol and second commands transmitted using the second communication protocol. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
    Type: Application
    Filed: October 29, 2004
    Publication date: May 4, 2006
    Inventors: Chet Douglas, Nathan Marushak
  • Publication number: 20060095625
    Abstract: A method according to one embodiment may include discovering at least one ATA/ATAPI target device. The method of this embodiment may also include discovering a SAS address for at the least one ATA/ATAPI target device. The method of this embodiment may also include returning the SAS address for the at least one ATA/ATAPI target device in response to a device inquiry command. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
    Type: Application
    Filed: October 29, 2004
    Publication date: May 4, 2006
    Inventors: Jonathan Wootten, Roger Jeppsen, Nathan Marushak, Brian Skerry
  • Publication number: 20050228924
    Abstract: A method according to one embodiment may include creating at least one of a persistent reservation and a persistent affiliation between one or more target SATA storage devices and one or more initiator engines. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 13, 2005
    Inventors: Nathan Marushak, Chet Douglas
  • Publication number: 20050138261
    Abstract: Provided are a method, system, and program for processing a transmission from a first device to a second device. An identification transmission is received including an interface address from the first device. A determination is made as to whether the identification transmission indicates a recognized vendor identifier. An interface address of a third device is returned to the first device in response to determining that the identification transmission includes one recognized vendor identifier, wherein the third device relays transmissions between the first and second devices.
    Type: Application
    Filed: December 22, 2003
    Publication date: June 23, 2005
    Inventors: Nathan Marushak, Deif Atallah
  • Publication number: 20050138221
    Abstract: Provided are a method, system, and article of manufacture for initiating a discovery operation to discover end devices and intermediary devices. In response to discovering one device during the discovery operation, a determination is made as whether there are redundant paths to the discovered device. One intermediary device is selected to provide one path to the discovered device in response to determining redundant paths to the discovered device. Commands are sent to cause a configuration where the selected intermediary device is configured to provide the path to the discovered device and the path to the discovered device other than through the selected intermediary device is disabled.
    Type: Application
    Filed: December 23, 2003
    Publication date: June 23, 2005
    Inventor: Nathan Marushak
  • Publication number: 20050055480
    Abstract: In one embodiment, a method may include, if an amount of data requested to be transferred by a data transfer request according to a first protocol exceeds a maximum data transfer amount permitted to be requested by a single data transfer request according to a second protocol, generating one data transfer request according to the second protocol and a data structure, and modifying, at least in part, another data structure. This data transfer request may request transfer of a portion of the data. The data structure may include one or more values identifying, at least in part, another portion of the data. The modifying may be based, at least in part, upon the one or more values. The other data structure may include, prior to being modified, one or more other values indicating, at least in part, one or more parameters of the one data transfer request.
    Type: Application
    Filed: September 10, 2003
    Publication date: March 10, 2005
    Inventors: Roger Jeppsen, Nathan Marushak