Processor scheduling method and system using domains

    公开(公告)号:US08578386B1

    公开(公告)日:2013-11-05

    申请号:US12416867

    申请日:2009-04-01

    IPC分类号: G06F9/455 G06F9/46

    摘要: Aspects of the present invention concern a method and system for scheduling a request for execution on multiple processors. This scheduler divides processes from the request into a set of domains. Instructions in the same domain are capable of executing the instructions associated with the request in a serial manner on a processor without conflicts. A relative processor utilization for each domain in the set of the domains is based upon a workload corresponding to an execution of the request. If there are processors available then the present invention provisions a subset of available processors to fulfill an aggregate processor utilization. The aggregate processor utilization is created from a combination of the relative processor utilization associated with each domain in the set of domains. If processors are not needed then some processors may be shut down. Shutting down processors in accordance with the schedule saves energy without sacrificing performing.

    DETECTING FALSE ANSWER SUPERVISION
    2.
    发明申请
    DETECTING FALSE ANSWER SUPERVISION 审中-公开
    检测错误的回答监督

    公开(公告)号:US20110033032A1

    公开(公告)日:2011-02-10

    申请号:US12538384

    申请日:2009-08-10

    IPC分类号: H04M3/42

    摘要: A method and corresponding apparatus are provided to detect false answer supervision by determining false answer supervision as either as a function of a number of completed calls of short duration or as a function of a distribution of differences between timestamps of alert signals and timestamps of connect signals used to complete calls, detecting false answer supervision based on the indicator of false answer supervision determined by either functions separately or in combination, and affecting a decision in response to the detecting.

    摘要翻译: 提供了一种方法和相应的装置,用于通过将虚假应答监视确定为作为短持续时间的完成呼叫的数量的函数或作为警报信号的时间戳和连接信号的时间戳之间的差分布的函数来检测错误应答监视 用于完成电话,根据由任一功能单独或组合确定的虚假回答监督指标,检测虚假回答监督,并影响响应检测的决定。

    Method for generating an annotated network topology
    3.
    发明授权
    Method for generating an annotated network topology 失效
    生成注释网络拓扑的方法

    公开(公告)号:US07782796B2

    公开(公告)日:2010-08-24

    申请号:US11204856

    申请日:2005-08-16

    IPC分类号: H04L12/28

    摘要: A method of generating an annotated network topology of a network is described. The method includes; deriving a network topology by performing a route tracing utility between each pair of endpoints to determine the route taken by packets; initially annotating each network path with an initial value; determining the available bandwidth of a path connecting a pair of endpoints by performing Transfer Control Protocol (TCP) flows between the pair of endpoints; identifying a bottleneck link in the network path, and annotating all edges to generate an annotated network topology wherein available bandwidth annotation of links inside the network is determined using end-to-end network measurements.

    摘要翻译: 描述了一种生成网络的注释网络拓扑的方法。 该方法包括: 通过在每对端点之间执行路由跟踪实用程序来导出网络拓扑,以确定分组采用的路由; 用初始值初始化每个网络路径; 通过在所述一对端点之间执行传输控制协议(TCP)流来确定连接一对端点的路径的可用带宽; 识别网络路径中的瓶颈链接,以及注释所有边缘以生成注释网络拓扑,其中使用端对端网络测量确定网络内的链路的可用带宽注释。

    Managing data storage
    4.
    发明授权

    公开(公告)号:US10353637B1

    公开(公告)日:2019-07-16

    申请号:US13340945

    申请日:2011-12-30

    IPC分类号: G06F12/02 G06F3/06

    摘要: A method and system for use in managing data storage is disclosed. Data storage in a data storage system is managed. The data storage system comprises a first cache and at least one solid state drive for storing data. The data storage in connection with the at least one solid state drive is monitored. The amount of free data storage capacity in connection with the at least one solid state drive is determined in response to monitoring the data storage in connection with the at least one solid state drive. At least a portion of the free data storage capacity is provisioned as a second cache in response to determining the amount of free data storage capacity in connection with the at least one solid state drive.

    Managing read caching
    5.
    发明授权
    Managing read caching 有权
    管理阅读缓存

    公开(公告)号:US08812899B1

    公开(公告)日:2014-08-19

    申请号:US13248068

    申请日:2011-09-29

    IPC分类号: G06F11/00

    摘要: A method is used in managing read caching. First and second read caches are maintained in a data storage system. The first read cache is controlled by a first storage controller and the second read cache is controlled by a second storage controller. Read cache data is copied from the first storage controller to the second storage controller. A failure of the first storage controller is detected. Based on the detection, the copied read cache data is processed at the second storage controller to make the copied read cache data available for use at the second storage controller.

    摘要翻译: 一种方法用于管理读取缓存。 第一和第二读取高速缓存保存在数据存储系统中。 第一读取缓存由第一存储控制器控制,第二读取高速缓存由第二存储控制器控制。 读取高速缓存数据从第一存储控制器复制到第二存储控制器。 检测到第一存储控制器的故障。 基于检测,在第二存储控制器处处理复制的读取高速缓存数据,以使复制的读取高速缓存数据可用于第二存储控制器。

    Method and an apparatus to provide access to operational data in a storage server via multiple data management protocols
    6.
    发明授权
    Method and an apparatus to provide access to operational data in a storage server via multiple data management protocols 有权
    用于通过多个数据管理协议提供对存储服务器中的操作数据的访问的方法和装置

    公开(公告)号:US08239543B1

    公开(公告)日:2012-08-07

    申请号:US10806703

    申请日:2004-03-22

    IPC分类号: G06F15/16

    摘要: A method and an apparatus to manage data in a networked storage server have been disclosed. In one embodiment, the method includes providing a single logical layer between a number of logical subsystems in a storage server and a number of data management agents in the storage server, wherein the data management agents are operable to service requests from a number of client machines following different data management protocols, and exporting a set of application programming interfaces (APIs) from the single logical layer to interface with the data management agents.

    摘要翻译: 已经公开了一种用于管理网络存储服务器中的数据的方法和装置。 在一个实施例中,该方法包括在存储服务器中的多个逻辑子系统和存储服务器中的多个数据管理代理之间提供单个逻辑层,其中数据管理代理可操作以从多个客户端机器 遵循不同的数据管理协议,并将一组应用程序编程接口(API)从单个逻辑层导出到与数据管理代理接口。

    Methods and computer program products for managing application performance on a network
    7.
    发明授权
    Methods and computer program products for managing application performance on a network 失效
    用于管理网络上应用程序性能的方法和计算机程序产品

    公开(公告)号:US08005935B2

    公开(公告)日:2011-08-23

    申请号:US11696975

    申请日:2007-04-05

    摘要: Managing application performance on a network. A network graph is generated from a set of application endpoints on the network. The network graph is annotated by associating one or more of the application endpoints with at least one of a corresponding latency annotation or a corresponding available bandwidth annotation. An end to end plan is formulated from the annotated network graph, wherein the plan maps one or more application requirements onto the plurality of paths in accordance with one or more end to end control adjustments including at least one of a server selection adjustment, an internet service provider (ISP) selector, or an overlay routing adjustment.

    摘要翻译: 管理网络上的应用程序性能。 从网络上的一组应用程序端点生成网络图。 通过将一个或多个应用端点与对应的延迟注释或相应的可用带宽注释中的至少一个相关联来注释网络图。 根据一个或多个端对端控制调整,从注释网络图形成端到端计划,其中,所述计划将一个或多个应用需求映射到多个路径上,包括以下各项中的至少一个:服务器选择调整,互联网 服务提供商(ISP)选择器或覆盖路由调整。

    Detection and management of rogue wireless network connections
    9.
    发明授权
    Detection and management of rogue wireless network connections 有权
    流氓无线网络连接的检测和管理

    公开(公告)号:US08000698B2

    公开(公告)日:2011-08-16

    申请号:US11586137

    申请日:2006-10-25

    IPC分类号: H04M1/66 H04M1/68 H04M3/16

    摘要: A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To guard against the suspect device spoofing an authorized SSID and/or BSSID, location information is gathered so that the network administrator can pinpoint the location of the rogue device. If the device is not recognized, various other tests are run to determine whether the unrecognized device is actually connected to the wired network. These tests include an association test, a MAC address test, an ARP test, a packet replay test, a correlation test, and/or a DHCP fingerprint test. Once it is determined that the suspect device is a rogue connected to the wired network, an appropriate alert is generated.

    摘要翻译: 提供了一种检测耦合到有线网络的恶意设备而不产生假否定或非正警告的方法。 当无线监视器检测到观察到的SSID和/或BSSID时,将进行各种测试以确定观察设备是否实际耦合到有线网络。 为了防范怀疑设备欺骗授权的SSID和/或BSSID,收集位置信息,以便网络管理员可以精确定位流氓设备的位置。 如果设备未识别,则会运行各种其他测试,以确定无法识别的设备是否实际连接到有线网络。 这些测试包括关联测试,MAC地址测试,ARP测试,分组重放测试,相关测试和/或DHCP指纹测试。 一旦确定可疑设备是连接到有线网络的流氓,就产生适当的警报。

    Detection and management of rogue wireless network connections
    10.
    发明申请
    Detection and management of rogue wireless network connections 有权
    流氓无线网络连接的检测和管理

    公开(公告)号:US20070298720A1

    公开(公告)日:2007-12-27

    申请号:US11586137

    申请日:2006-10-25

    IPC分类号: H04B7/00

    摘要: A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To guard against the suspect device spoofing an authorized SSID and/or BSSID, location information is gathered so that the network administrator can pinpoint the location of the rogue device. If the device is not recognized, various other tests are run to determine whether the unrecognized device is actually connected to the wired network. These tests include an association test, a MAC address test, an ARP test, a packet replay test, a correlation test, and/or a DHCP fingerprint test. Once it is determined that the suspect device is a rogue connected to the wired network, an appropriate alert is generated.

    摘要翻译: 提供了一种检测耦合到有线网络的恶意设备而不产生假否定或非正警告的方法。 当无线监视器检测到观察到的SSID和/或BSSID时,将进行各种测试以确定观察设备是否实际耦合到有线网络。 为了防范怀疑设备欺骗授权的SSID和/或BSSID,收集位置信息,以便网络管理员可以精确定位流氓设备的位置。 如果设备未识别,则会运行各种其他测试,以确定无法识别的设备是否实际连接到有线网络。 这些测试包括关联测试,MAC地址测试,ARP测试,分组重放测试,相关测试和/或DHCP指纹测试。 一旦确定可疑设备是连接到有线网络的流氓,就产生适当的警报。