摘要:
Aspects of the present invention concern a method and system for scheduling a request for execution on multiple processors. This scheduler divides processes from the request into a set of domains. Instructions in the same domain are capable of executing the instructions associated with the request in a serial manner on a processor without conflicts. A relative processor utilization for each domain in the set of the domains is based upon a workload corresponding to an execution of the request. If there are processors available then the present invention provisions a subset of available processors to fulfill an aggregate processor utilization. The aggregate processor utilization is created from a combination of the relative processor utilization associated with each domain in the set of domains. If processors are not needed then some processors may be shut down. Shutting down processors in accordance with the schedule saves energy without sacrificing performing.
摘要:
A method and corresponding apparatus are provided to detect false answer supervision by determining false answer supervision as either as a function of a number of completed calls of short duration or as a function of a distribution of differences between timestamps of alert signals and timestamps of connect signals used to complete calls, detecting false answer supervision based on the indicator of false answer supervision determined by either functions separately or in combination, and affecting a decision in response to the detecting.
摘要:
A method of generating an annotated network topology of a network is described. The method includes; deriving a network topology by performing a route tracing utility between each pair of endpoints to determine the route taken by packets; initially annotating each network path with an initial value; determining the available bandwidth of a path connecting a pair of endpoints by performing Transfer Control Protocol (TCP) flows between the pair of endpoints; identifying a bottleneck link in the network path, and annotating all edges to generate an annotated network topology wherein available bandwidth annotation of links inside the network is determined using end-to-end network measurements.
摘要:
A method and system for use in managing data storage is disclosed. Data storage in a data storage system is managed. The data storage system comprises a first cache and at least one solid state drive for storing data. The data storage in connection with the at least one solid state drive is monitored. The amount of free data storage capacity in connection with the at least one solid state drive is determined in response to monitoring the data storage in connection with the at least one solid state drive. At least a portion of the free data storage capacity is provisioned as a second cache in response to determining the amount of free data storage capacity in connection with the at least one solid state drive.
摘要:
A method is used in managing read caching. First and second read caches are maintained in a data storage system. The first read cache is controlled by a first storage controller and the second read cache is controlled by a second storage controller. Read cache data is copied from the first storage controller to the second storage controller. A failure of the first storage controller is detected. Based on the detection, the copied read cache data is processed at the second storage controller to make the copied read cache data available for use at the second storage controller.
摘要:
A method and an apparatus to manage data in a networked storage server have been disclosed. In one embodiment, the method includes providing a single logical layer between a number of logical subsystems in a storage server and a number of data management agents in the storage server, wherein the data management agents are operable to service requests from a number of client machines following different data management protocols, and exporting a set of application programming interfaces (APIs) from the single logical layer to interface with the data management agents.
摘要:
Managing application performance on a network. A network graph is generated from a set of application endpoints on the network. The network graph is annotated by associating one or more of the application endpoints with at least one of a corresponding latency annotation or a corresponding available bandwidth annotation. An end to end plan is formulated from the annotated network graph, wherein the plan maps one or more application requirements onto the plurality of paths in accordance with one or more end to end control adjustments including at least one of a server selection adjustment, an internet service provider (ISP) selector, or an overlay routing adjustment.
摘要:
A method, system and apparatus for routing data through a network based on the content or semantics of the data. Semantic routing engines route the data through the network based upon information maintained in routing tables. The routing tables used to route the content through the network are derived by aggregating information about either content consumers or content producers into ontological
摘要:
A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To guard against the suspect device spoofing an authorized SSID and/or BSSID, location information is gathered so that the network administrator can pinpoint the location of the rogue device. If the device is not recognized, various other tests are run to determine whether the unrecognized device is actually connected to the wired network. These tests include an association test, a MAC address test, an ARP test, a packet replay test, a correlation test, and/or a DHCP fingerprint test. Once it is determined that the suspect device is a rogue connected to the wired network, an appropriate alert is generated.
摘要:
A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To guard against the suspect device spoofing an authorized SSID and/or BSSID, location information is gathered so that the network administrator can pinpoint the location of the rogue device. If the device is not recognized, various other tests are run to determine whether the unrecognized device is actually connected to the wired network. These tests include an association test, a MAC address test, an ARP test, a packet replay test, a correlation test, and/or a DHCP fingerprint test. Once it is determined that the suspect device is a rogue connected to the wired network, an appropriate alert is generated.