摘要:
A method of enabling an electronic privately addressable source to be publicly addressable starts at a receiver where an electronic message is received. It is communicated from a sender with a private address outside a subnet of the receiver through a translator. The translator retrieves a lease to at least one of a public address or a port from a lease manager, translates the private address and the private port into a public address and a public port and communicates identifying data such as the public address and the public port to the receiver. If a response is communicated to the private sender, the response may be communicated to the private sender through the network. The public address and the public port on the message may be translated to the private address and the port of the private sender and the private address and the private port may be used to properly route the response to the private sender.
摘要:
A system that includes multiple hosts, each running a plurality of virtual machines. The system may be, for example, a cloud computing environment in which there are services and a service coordination system that communicates with the hosts and with the services. The services include a middleware management service that is configured to maintain per-tenant middleware policy for each of multiple tenants. The middleware management service causes the middleware policy to be applied to network traffic by directing network traffic to a middleware enforcement mechanism. This middleware policy is per-tenant in that it depends on an identity of a tenant.
摘要:
Method and apparatus for providing a control plane across multiple optical network domains is described. In one example, topology and resource discovery is employed in a transport network having a plurality of control domains. Topology information for each of the control domains is summarized to produce summarized topology information. The summarized topology information for each of the control domains is exchanged among the control domains. At each of the control domains, the summarized topology information of each of the control domains is combined to produce combined topology information. The combined topology information is passed among network elements within each of the control domains using an intra-domain routing protocol.
摘要:
Traffic in a cloud is controlled by the nodes participating in the cloud. Tenants of the cloud each have a ratio. On any given node, a current transmission rate of the node is allocated among the tenants of the node, or more specifically, their execution units (e.g., virtual machines) on the node. Thus each tenant receives a predefined portion of the transmission capacity of the node. The transmission capacity can vary as conditions on the network change. For example, if congestion occurs, the transmission capacity may be decreased. Nonetheless, each tenant receives, according to its ratio, a same relative portion of the overall transmission capacity.
摘要:
The described implementations relate to distributed computing. One implementation provides a system that can include an outlier detection component that is configured to identify an outlier task from a plurality of tasks based on runtimes of the plurality of tasks. The system can also include a cause evaluation component that is configured to evaluate a cause of the outlier task. For example, the cause of the outlier task can be an amount of data processed by the outlier task, contention for resources used to execute the outlier task, or a communication link with congested bandwidth that is used by the outlier task to input or output data. The system can also include one or more processing devices configured to execute one or more of the components.
摘要:
Computerized methods, systems, and computer-readable media are provided for establishing and managing a virtual network (V-net) and virtual machine (VM) switches that enable protected and isolated interconnections between members of the V-net. The V-net members include an originating network adapter that generates data packets addressed to a destination network adapter. Upon detecting data-packet generation, a source-side VM switch accesses a forwarding table associated with the V-net, ascertains a destination-side, VM-switch locator that corresponds to an identifier of the destination network adapter, and modifies the data packets to include the identifier. The forwarding table represents a mapping between the members of the V-net and VM switches located on respective nodes within the data center. In operation, the mapping enforces communication policies that govern data-packet traffic. Upon receiving the data packets, the destination-side VM switch restores the data packets and forwards them to the destination network adapter.
摘要:
A system and method is described for generating a test bed that is useful in developing, testing and/or supporting the use of software, such as software used for managing IT processes and/or monitoring equipment in an enterprise network. The system and method operates by processing a manifest to generate an instance space model of a computer network, wherein the manifest refers to a type space model of a computer network and includes an encoding that conveys parameters that are used to inflate the type space model of the computer network into the instance space model of the computer network. The type space model may comprise an object-relational directed graph that describes a plurality of potential directed graph instances and the instance space model may comprise one of the plurality of potential directed graph instances.
摘要:
Constructing an inference graph relates to the creation of a graph that reflects dependencies within a network. In an example embodiment, a method includes determining dependencies among components of a network and constructing an inference graph for the network responsive to the dependencies. The components of the network include services and hardware components, and the inference graph reflects cross-layer components including the services and the hardware components. In another example embodiment, a system includes a service dependency analyzer and an inference graph constructor. The service dependency analyzer is to determine dependencies among components of a network, the components including services and hardware components. The inference graph constructor is to construct an inference graph for the network responsive to the dependencies, the inference graph reflecting cross-layer components including the services and the hardware components.
摘要:
A method and apparatus for presenting advertisements is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, a system having an inspection element that monitors packet traffic associated with an end user, and determines a behavioral profile of the end user from the monitored packet traffic, a publisher element that detects an end user visiting a website managed thereby, and generates an advertisement request associated with the website, and advertisement element that selects one or more advertisements according to the behavioral profile of the end user, and submits said one or more advertisements to the publisher element for presentation thereof to the end user. Additional embodiments are disclosed.
摘要:
This patent application relates to an agile network architecture that can be employed in data centers, among others. One implementation provides a virtual layer-2 network connecting machines of a layer-3 infrastructure.