Abstract:
In one embodiment, a method comprises retrieving a request graph specifying request nodes identifying respective requested cloud computing service operations, and at least one request edge specifying a requested path requirements connecting the request nodes; identifying a placement pivot among feasible cloud elements identified in a physical graph representing a data network having a physical topology, each feasible cloud element an available solution for one of the request nodes, the placement pivot having a maximum depth in the physical topology relative to the feasible cloud elements; ordering the feasible cloud elements, according to increasing distance from the placement pivot to form an ordered list of candidate sets of feasible cloud elements; and determining an optimum candidate set, from at least a portion of the ordered list, based on the optimum candidate set having an optimized fitness function in the physical graph among the other candidate sets in the ordered list.
Abstract:
Techniques are provided to move the services performed on one device to another device in a cloud computing system for a variety of reasons including failure, maintenance or upgrade of the device. A notification is received that services performed by an impacted device in a domain of a plurality of hierarchical domains need to be moved. A determination is made as to whether there are replacement resources available in the domain to perform the services, and if so, the replacement resources are automatically rendered to perform the services. The process continues to higher level domains that have a view into the capabilities of subordinate domains in order to determine where to move the services within the cloud computing system.
Abstract:
Techniques are provided for mitigating the effects of slow or no drain devices on a fabric. One or more of the described embodiments can be used alone or in combination to address problems associated with inter-switch link blocking and to address the situation where flows which are not associated with slow/no drain devices suffer the negative impacts of slow or no drain devices on a fabric.
Abstract:
In one embodiment, an n-dimensional resource vector for each of a plurality of resources in a computer network is determined, each n-dimensional resource vector having n property values for a corresponding resource of the plurality of resources. Upon receiving a request for one or more resources of the plurality of resources, where the request indicates one or more desired property values, the techniques convert the desired property values of the request into an n-dimensional request vector, determine a distance between each resource vector and the request vector, and provide a response to the request, the response indicating one or more closest match resources for the request based on the distances.
Abstract:
Techniques are provided herein for defragmenting resources within a cloud computing system. The cloud computing system includes a plurality of servers deployed in a plurality of respective racks, wherein the respective racks are deployed in a pod of a data center. An element of the cloud computing system determines for each server in a given rack of servers a number of free resource slots available thereon and a number of resource slots in an idle state, and then further determines whether the number of free resource slots on a first server in the plurality of servers is greater than a predetermined threshold. When the number of free resource slots in the first server is greater than the predetermined threshold, a second server in the plurality of servers is identified with sufficient resource slots thereon to accommodate the number of resource slots in the idle state on the first server, and the resource slots in the idle state on the first server are caused to be migrated to the second server.
Abstract:
Techniques are described for selecting an optimal data center for instantiating a first cloud service. Embodiments of the invention receive a request specifying a topology of a first cloud service to be hosted by one of a plurality of data centers which provide computing resources to host a plurality of cloud services. A suitability value is then determined for each of the data centers which measures a fitness of the data center for instantiating the first cloud service. In one embodiment, the suitability value is determined by calculating a plurality of metric values for the data center, normalizing the metric values and calculating a weighted average of the normalized values. One of the data centers is then selected for instantiating the first cloud service, based at least in part on the determined suitability values.
Abstract:
Techniques are provided for sending from a client in a first network device a first session-initiate message to a second network device that is configured to provide network layer, data link layer, or associated convergence layer based service connection information in order for the second network device to accept or reject a network layer, data link layer, or associated convergence layer based service connection with the first network device. The first session-initiate message is based on a messaging and presence protocol. A session-accept message is received at the client in the first network device that is configured to accept the service connection and provide a network layer, data link layer, or associated convergence layer based service connection information in order for the first network device to establish the service connection with the second network device. The session-accept message is based on the messaging and presence protocol. In response to receiving the session-accept message, the service connection is established.
Abstract:
Techniques are provided for a switch to assign proxy FCIDs to endpoint device so that the endpoint devices may achieve FCID mobility by retaining their originally assigned FCIDs. At a switch in a network, e.g., a Virtual Storage Area Network (VSAN), a fabric login request is received from a first endpoint device that is associated with a first FC identifier (FCID) that was previously assigned to the first endpoint device by another switch in the VSAN. The fabric login request is responded to with the first FCID. The first endpoint device is assigned a second FCID associated with a domain of the switch where the endpoint device is directly attached to, and the second FCID is used as a proxy FCID within the VSAN for the first endpoint device. A frame is received from the first endpoint device with a source FCID comprising the first FCID and a destination FCID comprising an FCID for a second endpoint device. The source FCID in the frame is overwritten with the second FCID. The frame is forwarded to the second endpoint device.
Abstract:
In an example embodiment, a new qualifier is added to members in a Fibre Channel zone to specify whether each member is a target or initiator and in another embodiment a time-range attribute is added to a zone in the zoneset. When the zoneset is applied the number of ACL entries that must be programmed is reduced from k×(k−1) entries to 2(k−1) entries for a zone with k members where k−1 members are of one type (e.g. initiators) and one of the members is of a different type (e.g., a tape device). The time-range attribute is enforced by zone server software and enhances security by, for example, limiting access to sensitive data to specified times. In another embodiment, an incremental zoneset activation protocol is implemented where a hash of a zoneset is created by a switch updating the zoneset and the hash and ID of the switch updating the zoneset are sent to all other switches in the fabric when the zoneset is propagated. The hash and switch ID are stored in persistent storage at all switches in the fabric. When a target zoneset is updated by a source switch only the incremental change is propagated to other switches in the fabric along with the hash and switch ID of the target zoneset. Each switch checks a received hash and switch ID against its stored hash and switch ID to assure that the stored local zoneset is the same as the target zoneset before applying the incremental change.
Abstract:
Disclosed are methods and apparatus for redirecting fiber channel data that is transmitted between a first and a second node, such as a host and target, in a storage area network (SAN) to an intelligent node that facilitates implementation of a service on such redirected data. Such redirection is provided transparently with respect to the first and second nodes without significantly reconfiguring the existing infrastructure of the first and second nodes. In a specific Fiber Channel implementation, the redirection is accomplished without rewiring any of the nodes in the network fabric or reconfiguring zones or virtual storage area networks (VSANs). In general, such redirection is accomplished by rewriting the data as it traverses on a path between the first and second node towards an original destination (e.g., the first or second node) so that the data is redirected to an intelligent node. The intelligent node then facilitates implementation of a service on such redirected data and then forwards the serviced data back to its original destination. In one example, setup of this redirection function is accomplished simply by making a request to a network device (e.g., a host and/or target switch) in the first and second node's communication path, where the request identifies the first node, the second node, and the intelligent node.