摘要:
An exemplary method of identifying configuration topology, existing switches, and miswires in a given network is provided. Given a number of switches, which may be less than the maximum possible for the actual configuration and some ports of which may be miswired, generate a hypothesis for the supported topology of which the existing configuration is a subset. A best fit of the existing switches to the supported number switches of the maximal topology is performed, using formulae for the connections of the maximal supported topology. If supported switches are found missing in the assumed topology, the switch count is increased accordingly, and started over with a new hypothesis. When satisfied with identification, all switch ports are revisited and the connection formulae is used to identify all miswires.
摘要:
Topology discovery and identification of switches enables a user to determine the topology of a three-stage switch network. The method includes ascertaining an intended topology of the three-stage switch network, creating a list of switch boards that are present in the three-stage switch network, and determining a switch board connection pattern by obtaining information indicating how each switch board is connected to neighboring switch boards. The method further includes classifying each of the switch boards on the list of switch boards as a node switch board, an intermediate switch board, or a jump switch board, and creating a list for each type of switch board. The method further includes grouping the intermediate and node switch boards into sectors, and numbering each type of switch board, thereby obtaining a determined topology, and validating the determined topology by comparing it to the intended topology.
摘要:
A method of validating multi-cluster computer interconnects includes calculating a cable interconnect table associated with the multi-cluster computer, and distributing the cable interconnect table to a first transceiver in the first computer cluster and a second transceiver in the second computer cluster. The method also includes connecting a first end of a cable to the first transceiver and a second end of the cable to the second transceiver, transmitting a first neighbor identification from the first cluster to the second cluster, and a second neighbor identification from the second cluster to the first cluster, comparing the first neighbor identification with a desired first neighbor identification from the cable interconnect table to establish a first comparison result and the second neighbor identification with a desired second identification from the cable interconnect table to establish a second comparison result, and generating an alert based on the first and second comparison results.
摘要:
An exemplary method of identifying configuration topology, existing switches, and miswires in a given network is provided. Given a number of switches, which may be less than the maximum possible for the actual configuration and some ports of which may be miswired, generate a hypothesis for the supported topology of which the existing configuration is a subset. A best fit of the existing switches to the supported number switches of the maximal topology is performed, using formulae for the connections of the maximal supported topology. If supported switches are found missing in the assumed topology, the switch count is increased accordingly, and started over with a new hypothesis. When satisfied with identification, all switch ports are revisited and the connection formulae is used to identify all miswires.
摘要:
A method of validating a configuration of a computer clusters includes transmitting a first neighbor identification to a first flexible service processor (FSP) arranged in the first computer cluster and a second neighbor identification to a second FSP arranged in the second computer cluster, connecting a first end of a cable to a first transceiver arranged in the first cluster and connecting a second end of the cable to a second transceiver arranged in the second cluster. The first neighbor identification is passed from the first transceiver to the second computer cluster and the second neighbor identification is passed from the second transceiver toward the first computer cluster. The first neighbor identification is compared with a desired first neighbor identification to establish a first comparison result, and the second neighbor identification is compared with a desired second neighbor identification to establish a second comparison result and a notice is generated.
摘要:
A method of validating multi-cluster computer interconnects includes calculating a cable interconnect table associated with the multi-cluster computer, and distributing the cable interconnect table to a first transceiver in the first computer cluster and a second transceiver in the second computer cluster. The method also includes connecting a first end of a cable to the first transceiver and a second end of the cable to the second transceiver, transmitting a first neighbor identification from the first cluster to the second cluster, and a second neighbor identification from the second cluster to the first cluster, comparing the first neighbor identification with a desired first neighbor identification from the cable interconnect table to establish a first comparison result and the second neighbor identification with a desired second identification from the cable interconnect table to establish a second comparison result, and generating an alert based on the first and second comparison results.
摘要:
In a communications network having a plurality of nodes adapted to communicate with each other, and more than one path available between most source-destination node-pairs, a network interface is associated with each node. Each network interface has a plurality of route tables for defining a plurality of routes for transferring each packet from a source node to a destination node. Each network interface further includes a path status table of path status indicators, e.g., bits, for indicating whether each route in the route tables is usable or is unusable as being associated with a fault. The network manager monitors the network to identify faults and provides the path status indicators to the respective network interfaces. Failed routes in the network are avoided based on the path status indicators. When a failed route is restored, such that the route is usable again, the path status table indicates that the usable state is restored. A balance of route usage in the network is maintained, without modifying routes or establishing different routes, enabling reliable and high-performance message transfer.
摘要:
A method of validating a configuration of a computer clusters includes transmitting a first neighbor identification to a first flexible service processor (FSP) arranged in the first computer cluster and a second neighbor identification to a second FSP arranged in the second computer cluster, connecting a first end of a cable to a first transceiver arranged in the first cluster and connecting a second end of the cable to a second transceiver arranged in the second cluster. The first neighbor identification is passed from the first transceiver to the second computer cluster and the second neighbor identification is passed from the second transceiver toward the first computer cluster. The first neighbor identification is compared with a desired first neighbor identification to establish a first comparison result, and the second neighbor identification is compared with a desired second neighbor identification to establish a second comparison result and a notice is generated.
摘要:
Deadlocks are avoided in performing failovers in communications environments that include partnered interfaces. An ordered set of steps are performed to failover from one interface of a partnered interface to another interface of the partnered interface such that deadlocks are avoided.
摘要:
An exemplary method of identifying configuration topology, existing switches, and miswires in a given network is provided. Given a number of switches, which may be less than the maximum possible for the actual configuration and some ports of which may be miswired, generate a hypothesis for the supported topology of which the existing configuration is a subset. Perform a best fit of the existing switches to the supported number switches of the maximal topology, using formulae for the connections of the maximal supported topology. If supported switches are found missing in the assumed topology, increase the switch count accordingly, and start over with a new hypothesis. When satisfied with identification, revisit all switch ports and use the connection formulae to identify all miswires.