摘要:
A packet processor provides for rule matching of packets in a network architecture. The packet processor includes a lookup cluster complex having a number of lookup engines and respective on-chip memory units. The on-chip memory stores rules for matching against packet data. Each of the lookup engines receives a key request associated with a packet and determines a subset of the rules to match against the packet data. A work product may be migrated between lookup engines to complete the rule matching process. As a result of the rule matching, the lookup engine returns a response message indicating whether a match is found.
摘要:
Computer-implemented methods and systems are provided for detecting a failed server. The computer-implemented method includes creating a proxy file for each server of a plurality of servers in an active state and assigning a timestamp to each proxy file of each server of the plurality of servers. The computer-implemented method further includes permitting each server to inspect each timestamp of each proxy file of each server of the plurality of servers and determining whether the timestamp assigned to each proxy file of each server of the plurality of servers exceeds a predetermined threshold. The computer-implemented method further includes, in response to a timestamp of a proxy file of a failed server exceeding the predetermined threshold, allowing another server of the plurality of servers to complete remaining work of the failed server.
摘要:
An application management device includes a memory that stores therein application conditions for defining a condition of whether an update program is to be applied to a data center. The application management device acquires information for an update program from a control center that manages failures in a plurality of data centers including the data center. Thereafter, the application management device controls the application of the update program to the data center based on the acquired information for the update program and the stored application conditions.
摘要:
In one embodiment, a method includes encoding a key matching rule having at least one dimension by storing in a memory (i) a header of the key matching rule that has at least one header field, and (ii) at least one rule value field of the key matching rule corresponding to one of the dimensions.
摘要:
The invention concerns a method, arrangement (26), computer program and a computer program product for allocating physical cloud computing resources (12, 16, 18) to processes, where at least some of the cloud computing resources (12, 16, 18) have different ages, said cloud computing resources (12, 16, 18) having individual primary failure probabilities, each being based on an age dependent failure probability function of the cloud computing resource. The receives requests for performing computational tasks for a number of processes, where the processes have different process priorities, investigates the availability of the cloud computing resources for performing the tasks of the requests, and assigns the available cloud computing resources to the based on the process priorities, where processes with the highest process priorities are assigned to the cloud computing resources (12, 16, 18) having the lowest primary failure probabilities.
摘要:
Hardware component repair in a computing system while workload continues to execute on the computing system includes receiving an indication that an operational parameter of a first hardware resource of said computing system does not meet operational acceptability criteria; migrating workload of the computing system from said first hardware resource to a second hardware resource within the computing system; and halting operation of said first hardware resource for repair.
摘要:
Concepts and technologies disclosed herein are directed to virtual zones for Open Systems Interconnection (“OSI”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a virtual zone. The virtual zone can include a virtual network function (“VNF”) that is executable by the hardware resource. The VNF can support a service that operates within one of layers 4-7 of the OSI communication model. A computing system can detect new subscribers to the service within the virtual zone. The computing system also can determine that a capacity constraint exists within the virtual zone as a result of the new subscribers. The computing system also can home the new subscribers to the further virtual zone so that the further VNF can provide the service to the new subscribers.
摘要:
Techniques for virtual machine (VM) availability during migration network failure and VM network failure in a first host computing system in a failover cluster are described. In one example embodiment, migration and VM network failure in the first host computing system is identified, wherein the first host computing system being configured to migrate VMs using the migration network and to route network traffic of VMs via the VM network. A migration network is then temporarily configured for the first host computing system over a management network in the virtual datacenter, wherein the management network being used to manage host computing systems by virtual management software (VMS) residing in a management server. The VMs running on the first host computing system are then migrated to at least one other host computing system in the failover cluster via the migration network temporarily configured on the management network.
摘要:
A system for maintaining a two-site configuration for continuous availability over long distances may include a first computing site configured to execute a first instance associated with a priority workload, the first instance being designated as an active instance; a second computing site configured to execute a second instance of the priority workload, the second instance being designated as a standby instance; a software replication module configured to replicate a unit of work data associated with the priority workload from a first data object associated with the active instance to a second data object associated with the standby instance, and a hardware replication module configured to replicate an image from a first storage volume to a copy on a second storage volume, wherein the first storage volume is associated with the first computing site, and the second storage volume is associated with a third computing site.
摘要:
Systems and methods for data center control are provided that identify parameters of one or more data centers, where each data center includes a plurality of devices. The systems and methods receive a command to execute an application, and identify a selected data center from the one or more data centers as a location to run the application based at least in part on an evaluation of the parameters.