Model driven approach for availability management framework (AMF) configuration generation
    1.
    发明授权
    Model driven approach for availability management framework (AMF) configuration generation 有权
    可用性管理框架(AMF)配置生成的模型驱动方法

    公开(公告)号:US08752003B2

    公开(公告)日:2014-06-10

    申请号:US13099880

    申请日:2011-05-03

    IPC分类号: G06F9/44

    CPC分类号: G06Q10/00

    摘要: A method and system for generating an Availability Management Framework (AMF) configuration based on a model driven approach. The AMF configuration is an instance of an AMF sub-profile that can be used to model resources and services to be protected, and is generated from an instance of the Entity Type Files (ETF) sub-profile and an instance of the Configuration Requirements (CR) sub-profile. The ETF sub-profile can be used to model the resources provided by vendors, and the CR sub-profile can be used to model configuration requirements. Each of the AMF sub-profile, the ETF sub-profile and the CR sub-profile is a specialization of pre-defined Unified Modeling Language (UML) meta-classes. An input that includes an ETF model and a CR model, which are instances of the ETF sub-profile and the CR sub-profile, respectively, is transformed into an AMF model as the AMF configuration.

    摘要翻译: 一种基于模型驱动方法生成可用性管理框架(AMF)配置的方法和系统。 AMF配置是AMF子配置文件的一个实例,可用于建模要保护的资源和服务,并从实体类型文件(ETF)子配置文件的实例和配置要求的实例 CR)子配置文件。 ETF子配置文件可用于对供应商提供的资源进行建模,CR子配置文件可用于建模配置要求。 每个AMF子配置文件,ETF子配置文件和CR子配置文件都是预定义的统一建模语言(UML)元类的专业化。 分别包含作为ETF子简档和CR子简档的实例的ETF模型和CR模型的输入被转换为AMF模型作为AMF配置。

    MODEL DRIVEN APPROACH FOR AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATION GENERATION
    2.
    发明申请
    MODEL DRIVEN APPROACH FOR AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATION GENERATION 有权
    可用性管理框架(AMF)配置生成的模型驱动方法

    公开(公告)号:US20110270595A1

    公开(公告)日:2011-11-03

    申请号:US13099880

    申请日:2011-05-03

    IPC分类号: G06G7/48

    CPC分类号: G06Q10/00

    摘要: A method and system for generating an Availability Management Framework (AMF) configuration based on a model driven approach. The AMF configuration is an instance of an AMF sub-profile that can be used to model resources and services to be protected, and is generated from an instance of the Entity Type Files (ETF) sub-profile and an instance of the Configuration Requirements (CR) sub-profile. The ETF sub-profile can be used to model the resources provided by vendors, and the CR sub-profile can be used to model configuration requirements. Each of the AMF sub-profile, the ETF sub-profile and the CR sub-profile is a specialization of pre-defined Unified Modeling Language (UML) meta-classes. An input that includes an ETF model and a CR model, which are instances of the ETF sub-profile and the CR sub-profile, respectively, is transformed into an AMF model as the AMF configuration.

    摘要翻译: 一种基于模型驱动方法生成可用性管理框架(AMF)配置的方法和系统。 AMF配置是AMF子配置文件的一个实例,可用于建模要保护的资源和服务,并从实体类型文件(ETF)子配置文件的实例和配置要求的实例 CR)子配置文件。 ETF子配置文件可用于对供应商提供的资源进行建模,CR子配置文件可用于建模配置要求。 每个AMF子配置文件,ETF子配置文件和CR子配置文件都是预定义的统一建模语言(UML)元类的专业化。 分别包含作为ETF子简档和CR子简档的实例的ETF模型和CR模型的输入被转换为AMF模型作为AMF配置。

    Bridging the gap between high level user requirements and availability management framework configurations
    3.
    发明授权
    Bridging the gap between high level user requirements and availability management framework configurations 有权
    弥合高级用户需求和可用性管理框架配置之间的差距

    公开(公告)号:US08683424B2

    公开(公告)日:2014-03-25

    申请号:US13342767

    申请日:2012-01-03

    CPC分类号: G06F8/10

    摘要: Configuration requirements for an Availability Management Framework (AMF) configuration are generated from high level user requirements that specify a subset of properties of an AMF configuration. The user requirements are first mapped into entity prototypes defined in an extended Entity Types File (ETF) model. A computer system identifies additional entity prototypes and dependency thereof that support functionalities of the mapped entity prototypes under a set of grouping conditions. The computer system calculates the required number of component service instances (CSIs) and service instances (SIs) that satisfy the user requirements. The calculation is based on the subset of the properties specified by the user requirements and measurements associated with the entity prototypes in the extended ETF model. The computer system then forms configuration requirements including the required number of CSIs and SIs for generating the AMF configuration that satisfies the user requirements.

    摘要翻译: 可用性管理框架(AMF)配置的配置要求是从指定AMF配置的属性子集的高级用户要求生成的。 用户需求首先映射到在扩展实体类型文件(ETF)模型中定义的实体原型。 计算机系统识别在一组分组条件下支持映射实体原型的功能的附加实体原型及其依赖性。 计算机系统计算满足用户要求的组件服务实例(CSI)和服务实例(SI)的所需数量。 该计算基于用户要求指定的属性子集以及与扩展ETF模型中的实体原型相关联的测量。 计算机系统然后形成配置要求,包括所需数量的CSI和SI,用于生成满足用户要求的AMF配置。

    BRIDGING THE GAP BETWEEN HIGH LEVEL USER REQUIREMENTS AND AVAILABILITY MANAGEMENT FRAMEWORK CONFIGURATIONS
    4.
    发明申请
    BRIDGING THE GAP BETWEEN HIGH LEVEL USER REQUIREMENTS AND AVAILABILITY MANAGEMENT FRAMEWORK CONFIGURATIONS 有权
    搭配高水平用户要求和可用性管理框架配置之间的差距

    公开(公告)号:US20130091485A1

    公开(公告)日:2013-04-11

    申请号:US13342767

    申请日:2012-01-03

    IPC分类号: G06F9/44

    CPC分类号: G06F8/10

    摘要: Configuration requirements for an Availability Management Framework (AMF) configuration are generated from high level user requirements that specify a subset of properties of an AMF configuration. The user requirements are first mapped into entity prototypes defined in an extended Entity Types File (ETF) model. A computer system identifies additional entity prototypes and dependency thereof that support functionalities of the mapped entity prototypes under a set of grouping conditions. The computer system calculates the required number of component service instances (CSIs) and service instances (SIs) that satisfy the user requirements. The calculation is based on the subset of the properties specified by the user requirements and measurements associated with the entity prototypes in the extended ETF model. The computer system then forms configuration requirements including the required number of CSIs and SIs for generating the AMF configuration that satisfies the user requirements.

    摘要翻译: 可用性管理框架(AMF)配置的配置要求是从指定AMF配置的属性子集的高级用户要求生成的。 用户需求首先映射到在扩展实体类型文件(ETF)模型中定义的实体原型。 计算机系统识别在一组分组条件下支持映射实体原型的功能的附加实体原型及其依赖性。 计算机系统计算满足用户需求的组件服务实例(CSI)和服务实例(SI)的所需数量。 计算基于用户要求指定的属性子集以及与扩展ETF模型中的实体原型相关联的测量。 计算机系统然后形成配置要求,包括所需数量的CSI和SI,用于生成满足用户要求的AMF配置。

    Heuristic approach on checking service instance protection for availability management framework (AMF) configurations
    5.
    发明授权
    Heuristic approach on checking service instance protection for availability management framework (AMF) configurations 有权
    检查可用性管理框架(AMF)配置的服务实例保护的启发式方法

    公开(公告)号:US08584090B2

    公开(公告)日:2013-11-12

    申请号:US13083243

    申请日:2011-04-08

    IPC分类号: G06F9/44 G06F9/46

    CPC分类号: G06F11/008 G06F11/202

    摘要: A configuration including Service Instances (SIs) and a list of Service Units (SUs) is to be validated. The SIs are to be allocated to the SUs for protection of the service represented by the SIs. A set of heuristics is applied to determine whether, for each of the SI assignments, the SI can be allocated to one of the SUs whose capacities support the required capacities of the SI. The heuristic then walks the list in order, to find a first SU that supports a current SI. If none of the SUs in the list can support the current SI, the heuristic indicates that the configuration is not validated. In response to a result that at least one of the heuristics in the set indicates the SUs can support all of the SIs, a final result is generated indicating that the configuration is valid.

    摘要翻译: 要验证包括服务实例(SI)和服务单元(SU)的列表的配置。 SI将被分配给SU以保护由SI表示的服务。 应用一组启发式方法来确定对于每个SI分配,SI可以分配给其容量支持SI的所需容量的SU中的一个。 启发式然后按顺序排列列表,以找到支持当前SI的第一个SU。 如果列表中的任何一个SU都不能支持当前的SI,则启发式表示配置未被验证。 响应于集合中的启发式中的至少一个指示SU可以支持所有SI,产生指示配置有效的最终结果。

    HEURISTIC APPROACH ON CHECKING SERVICE INSTANCE PROTECTION FOR AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATIONS
    6.
    发明申请
    HEURISTIC APPROACH ON CHECKING SERVICE INSTANCE PROTECTION FOR AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATIONS 有权
    检查可用性管理框架(AMF)配置的服务实例保护的整体方法

    公开(公告)号:US20120192157A1

    公开(公告)日:2012-07-26

    申请号:US13083243

    申请日:2011-04-08

    IPC分类号: G06F9/44

    CPC分类号: G06F11/008 G06F11/202

    摘要: A configuration including Service Instances (SIs) and a list of Service Units (SUs) is to be validated. The SIs are to be allocated to the SUs for protection of the service represented by the SIs. A set of heuristics is applied to determine whether, for each of the SI assignments, the SI can be allocated to one of the SUs whose capacities support the required capacities of the SI. The heuristic then walks the list in order, to find a first SU that supports a current SI. If none of the SUs in the list can support the current SI, the heuristic indicates that the configuration is not validated. In response to a result that at least one of the heuristics in the set indicates the SUs can support all of the SIs, a final result is generated indicating that the configuration is valid.

    摘要翻译: 要验证包括服务实例(SI)和服务单元(SU)的列表的配置。 SI将被分配给SU以保护由SI表示的服务。 应用一组启发式方法来确定对于每个SI分配,SI可以分配给其容量支持SI的所需容量的SU中的一个。 启发式然后按顺序排列列表,以找到支持当前SI的第一个SU。 如果列表中的任何一个SU都不能支持当前的SI,则启发式表示配置未被验证。 响应于集合中的启发式中的至少一个指示SU可以支持所有SI,产生指示配置有效的最终结果。

    Automation of management of cloud upgrades

    公开(公告)号:US11886917B2

    公开(公告)日:2024-01-30

    申请号:US17265998

    申请日:2019-07-24

    IPC分类号: G06F9/50

    CPC分类号: G06F9/5027

    摘要: Resources in an Infrastructure-as-a-Service (IaaS) system are upgraded in an iterative process. In response to an upgrade request indicating requested changes to a current configuration of the system, one or more graph representations of the current configuration and the requested changes are created. The graph representations include a control graph which has vertices representing resource groups, and edges representing dependences among the resource groups. A batch of resource groups is identified to be upgraded in a current iteration based on the dependencies and Service Level Agreement (SLA) requirements including availability and elasticity of the system. Upgrade operations are executed on the identified batch using selected upgrade methods which handle potential incompatibilties during transition of system configurations. The graph representations are updated to include any new requested changes and recovery operations in response to feedback of failed upgrade operations. The iterative process proceed to upgrade remaining one or more resource groups.

    Runtime adjustment of configuration models for consistency preservation

    公开(公告)号:US11099860B2

    公开(公告)日:2021-08-24

    申请号:US15758622

    申请日:2015-09-15

    IPC分类号: G06F9/445 G06F8/656 G06F9/50

    摘要: A system performs runtime adjustment of a configuration model. The system receives, at runtime, a change request directed at one or more modified entities in the configuration model. Based on leadership information, one or more infringing entities are identified among the one or more modified entities. The leadership information indicates an impact that one entity has on another entity with respect to a given constraint. Based on the leadership information, a propagation scope is identified for a constraint violated by an infringing entity. The propagation scope includes the infringing entity and other entities that are potentially affected by the request. For resolving single constraint violation, a collection of paths are created in the propagation scope and a path is selected one at a time starting from the shortest path in the collection. For resolving multiple constraint violation, a bonded path is formed for a group of propagation scopes that overlap.

    Model based upgrade campaign generation

    公开(公告)号:US10466998B2

    公开(公告)日:2019-11-05

    申请号:US16071034

    申请日:2016-02-17

    摘要: An upgrade campaign is generated for entities of a system described by a source configuration. According to the upgrade campaign, the system is upgraded to a target configuration using available software. A change model describes changes from the source configuration to the target configuration. According to the change model, an upgrade campaign specification model is generated, which contains at least one upgrade campaign element for each change in the change model. A subset of upgrade campaign elements are matched based on a first set of rules, and the matched upgrade campaign elements are merged into an upgrade procedure in the upgrade campaign specification model. The upgrade procedures are ordered based on a second set of rules and dependencies among the entities of the system, where the dependencies are extracted from the source configuration, the target configuration and the description of available software.

    NETWORK SERVICE DESCRIPTOR SUPPORT FOR NETWORK SLICE ISOLATION REQUIREMENTS

    公开(公告)号:US20230037914A1

    公开(公告)日:2023-02-09

    申请号:US17791036

    申请日:2020-01-30

    摘要: A non-transitory computer readable media, methods, system and network function virtualization orchestrator can be used to instantiate a network service operating as at least a portion of a network slice. A network service descriptor describing the network service comprises at least one service deployment flavor; zero or more sharing allowed attribute defining if the network service or constituent instances of the network service is allowed to be shared with another network service instance, or with its constituent instances; and zero or more external placement rule attribute defining if the network service or constituent instances of the network service, is affine or anti-affine with current and future other network service or constituent instances of the current and future other network service.