摘要:
In an embodiment, a method is provided. In an embodiment, the method provides determining that a message has been placed in a send buffer; and transferring the message to an application on a second virtual machine by bypassing use of an operating system to process the message by directly placing the message in an application memory space from which the application can retrieve the message.
摘要:
Remote direct memory access over a network uses a constrained usage model. In one embodiment, a method of accessing memory on a network comprises a first node of the network generating a remote direct memory access request to remotely access application-level memory on a second node of the network. The first node sends the request in a packet over the network to the second node, the sending being performed in accordance with a constrained usage model. In a further embodiment, constrained usage model comprises sending the packet in an Ethernet protocol packet over an Ethernet network, the Ethernet protocol packet having a OSI layer two header, but not a layer three header.
摘要:
I/O resources are allocated to one or more hosts in a network cluster. Each host stores a cluster resource table (CRT) that identifies the configuration and allocation of I/O resources within its cluster. Each host includes an I/O resource management agent (RMA) within the operating system. A host's RMA obtains a list of all hosts and I/O units and their network addresses from the fabric services. The RMA then queries each host to obtain at least a portion of the CRTs of each of the host's in the cluster. The RMA replaces its local CRT with the most current version of the CRT (e.g., based on a time and date stamp or version number of each CRT). The host's RMA then queries each I/O unit to identify the I/O controllers and their controller number in the cluster. The RMA then queries each I/O controller in the cluster to identify the I/O devices in the cluster. The RMA then updates its CRT based on this information. The RMA can provide the updated CRT to each of the hosts in the cluster.
摘要:
Methods and apparatus to provide peer-to-peer interrupt signaling between devices coupled via one or more interconnects are described. In one embodiment, a NIC (Network Interface Card such as a Remote Direct Memory Access (RDMA) capable NIC) transfers data directly into or out of the memory of a peer device that is coupled to the NIC via one or more interconnects, bypassing a host computing/processing unit and/or main system memory. Other embodiments are also disclosed.
摘要:
Remote direct memory access over a network uses a constrained usage model. In one embodiment, a method of accessing memory on a network comprises a first node of the network generating a remote direct memory access request to remotely access application-level memory on a second node of the network. The first node sends the request in a packet over the network to the second node, the sending being performed in accordance with a constrained usage model. In a further embodiment, constrained usage model comprises sending the packet in an Ethernet protocol packet over an Ethernet network, the Ethernet protocol packet having a OSI layer two header, but not a layer three header.
摘要:
In an embodiment, a method is provided. In an embodiment, the method provides determining that a message has been placed in a send buffer; and transferring the message to an application on a second virtual machine by bypassing use of an operating system to process the message by directly placing the message in an application memory space from which the application can retrieve the message.
摘要:
A method for managing a computer system includes initiating a reset of the computer system from a remote location. Diagnostic software on the computer system is downloaded from the remote location.
摘要:
In an embodiment, a method is provided. In an embodiment, the method provides determining that a message has been placed in a send buffer; and transferring the message to an application on a second virtual machine by bypassing use of an operating system to process the message by directly placing the message in an application memory space from which the application can retrieve the message.
摘要:
In an embodiment, a method is provided. In an embodiment, the method provides determining that a message has been placed in a send buffer; and transferring the message to an application on a second virtual machine by bypassing use of an operating system to process the message by directly placing the message in an application memory space from which the application can retrieve the message.
摘要:
In an embodiment, a method is provided. In an embodiment, the method provides determining that a message has been placed in a send buffer; and transferring the message to an application on a second virtual machine by bypassing use of an operating system to process the message by directly placing the message in an application memory space from which the application can retrieve the message.