Patent application number | Description | Published |
20080215698 | Method and Apparatus for Adding Recipients to Sent Email - A data processing system for resending a previously sent email message. A new recipient for the previously sent email message is selected. The new recipient of the previously sent email message is added in response to selecting the new recipient, wherein the previously sent email message is directed to the new recipient and a previous recipient. An indicator to the previously sent email message is added in response to selecting the new recipient, wherein the indicator indicates that the new recipient has been added to a form a new version of the previously sent email message. The new version of the previously sent email message is sent in response to adding the indicator, wherein the indicator causes the new version of the previously sent email message to replace the previously sent email message at an email program of the previous recipient. | 09-04-2008 |
20080222292 | Method for Allowing Multiple Authorized Applicants to Share the Same Port - In a method comprising an embodiment of the invention, an original application initially binds to a port, and selects or designates a confidential key, which usefully may be a conventional cookie. The invention also sets a socket option, referred to by way of example, as SO_SECURE_REUSEPORT. The confidential key, together with the port number, is then registered with the operating system of a host associated with the port. In order for another application to subsequently bind to the port, such application must provide the operating system with a key that is identical to the confidential key. In one useful embodiment of the invention, a first application binds a socket to a particular port associated with the host. A specified key is registered with the operating system, and a second application is allowed to bind to the particular port only if the second application can furnish the operating system with a key that matches the specified key. | 09-11-2008 |
20080225700 | Protocol Definition for Software Bridge Failover - A method, data processing system, and computer usable code are provided for protocol definition for software bridge failover. In a first aspect of the present invention, a first software bridge determines the proper working operation of a physical adapter. Limbo packets are sent to a second software bridge alerting the second software bridge that the first software bridge is no longer bridging traffic responsive to the physical adapter failure in the first software bridge. The second software bridge receives the limbo packets, and, in response to receiving the limbo packets, asserts primary control and initiates bridging of traffic. In an alternative aspect of the present invention a first software bridge sends keep-alive packets. A second software bridge monitors the keep-alive packets from the first software bridge and, in response to a failure to detect the keep-alive packets from the first software bridge, the second software bridge initiates bridging of traffic. | 09-18-2008 |
20080229431 | System and Method to Manage Device Access in a Software Partition - A system and method to manage device access in a software partition are provided. The illustrative embodiments provide a mechanism for exporting resources/devices from an administrator partition to a software partition in its purview. A trusted device list data structure is provided that identifies which devices are permitted to be exported into a software partition from an administrative partition. This trusted device list data structure also identifies which of the devices in the list of devices should be exported by default when exporting devices to a software partition, i.e. if no overrides are specified. In addition, a user-specifiable mechanism to override the entries in the trusted device list data structure is provided. For security purposes, this mechanism may not be used to export devices not listed in the trusted device list data structure. The mechanism may also be used to prevent the exporting of devices which are exported by default. | 09-18-2008 |
20080267176 | SELECTIVE PRESERVATION OF NETWORK STATE DURING A CHECKPOINT - A computer implemented method, data processing system, and computer program product for selectively preserving network state during a checkpoint operation. Packets flowing through a network stack are examined to determine whether the packets belong to a WPAR under checkpoint. If one or more packets belong to a WPAR under checkpoint, a filter is used to block the packets from flowing through the network stack. Address information in each blocked packet is checked against an access list of allowed communications to determine if the access list indicates that a packet is an allowed packet. If the access list indicates that one of the packets is an allowed packet, that packet is unblocked and allowed to continue flowing through the network stack during the checkpoint operation. If the access list indicates that another of the packets is not an allowed packet, that packet is discarded during the checkpoint operation. | 10-30-2008 |
20080267193 | TECHNIQUE FOR ENABLING NETWORK STATISTICS ON SOFTWARE PARTITIONS - A computer implemented method, data processing system, and computer program product for enabling network statistics to be collected per software partition. When an incoming data packet is received at the Internet Protocol (IP) layer of an operating system, the IP address in the incoming data packet is identified. The IP address in the incoming data packet is then compared against IP addresses stored in a hash table, wherein the hash table maps each IP address in the hash table to a software partition of the operating system. If an IP address in the hash table matches the IP address in the data packet, the software partition mapped to the located IP address in the hash table is identified. Network statistics collected for the incoming data packet are then associated with the software partition. | 10-30-2008 |
20080270422 | IN-FLIGHT FILE DESCRIPTORS CHECKPOINT - A computer implemented method, data processing system, and computer program product for enabling the restoration of in-flight file descriptors during a checkpoint operation. Responsive to a checkpoint operation being initiated on a process in a workload partition, in-flight file pointers in an in-flight file queue on a socket bound to the process are identified. A file descriptor is instantiated in the process file table of the process for each identified in-flight file pointer in the in-flight file queue. After completion of the checkpoint operation, the in-flight file queue on the socket may be reconstructed in a restore operation using the instantiated file descriptors. | 10-30-2008 |
20080270829 | CHECKPOINT OF APPLICATIONS USING UNIX® DOMAIN SOCKETS - A computer implemented method, apparatus, and computer program product for managing state data in a workload partitioned environment. Process state data for a process in a workload partition is saved. Process state data is used to restore the process to a given state. State data associated with open sockets and open files bound to the first process is saved. In response to a determination that the process is associated with a domain socket that is bound to a socket file, an absolute pathname for the socket file is saved. A domain socket associated with a connecting process in the workload partition uses the socket file to connect to a domain socket associated with a listening process in the same workload partition to enable the two processes to communicate with each other. | 10-30-2008 |
20080301312 | Tunneling IPv6 Packets - Methods, systems, and products are provided for tunneling IPv6 packets. Embodiments include receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv6 packet having an IPv6 destination address; receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv4 address for a destination IPv6 border router retrieved from a data structure associating IPv6 destination addresses with IPv4 addresses for destination IPv6 border routers; encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet; and sending the encapsulated packet to a destination IPv6 border router at the IPv4 address. In many embodiments, encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet is carried out by adding an IPv4 header to the IPv6 packet. | 12-04-2008 |
20080307532 | SECURELY MAINTAINING COMMUNICATIONS NETWORK CONNECTION DATA - An apparatus and computer-readable medium for securely maintaining communications network connection data is disclosed. According to one embodiment, an apparatus is disclosed according to which a user is prompted for network element address substitution data which specifies a substitute network element address for a network element address associated with a network element of a first communications network. The network element address substitution data is then stored within a first storage element, wherein access to the first storage element outside of the first communications network is restricted. Connection monitor data associated with the first communications network is processed utilizing the network element address substitution data. According to the described embodiment, such connection monitor data processing includes a means for identifying metadata of the connection monitor data which specifies the described network element address, and a means for substituting the metadata with metadata which specifies the substitute network element address. | 12-11-2008 |
20090007147 | ENABLING A THIRD PARTY APPLICATION TO PARTICIPATE IN MIGRATION OF A VIRTUALIZED APPLICATION INSTANCE - In one embodiment, an operating system manages virtualized instances of hardware resources and migration enabled applications partitioned into one of multiple partitions with a separate operating system kernel running in each of the partitions. A migration event controller of the operating system manages the checkpoint and restart process during migration of a virtualized instance of at least one migration enabled application from a departure partition to an arrival partition. The migration event controller supports migration enabled applications to separately specify at least one application specific checkpoint script and restart script to be triggered by checkpoint and restart events by the migration event controller so the at least one migration enabled application can participate in performing the checkpoint and restart process for additional state information during migration of the virtualized instance from the departure partition to the arrival partition. | 01-01-2009 |
20090016369 | ACCESSING DATA PROCESSING SYSTEMS BEHIND A NAT ENABLED NETWORK - A method, system, and program for accessing data processing systems behind a NAT enabled network are provided. According to one aspect of the present invention, a NAT data processing system is located behind a NAT enabled network with a NAT device as a gateway to the NAT enabled network. A client system located outside the NAT enabled network queries the NAT device for the address of the NAT data processing system located behind the NAT enabled network. The query is automatically routed through the NAT device to a DNS server. The DNS server then returns an address for the NAT data processing system and source routing for the NAT device. The NAT device forwards the address and source routing to the client system. Then, the client system sends packets to the NAT data processing system at the address with source routing through the NAT device, such that the NAT data processing system behind the NAT enabled network is directly accessed by the client system from outside the NAT enabled network. | 01-15-2009 |
20090022153 | METHODS AND APPARATUS FOR CREATING ADDRESSES - In a first aspect, a first method is provided for creating a media access control (MAC) address for a device. The first method includes the steps of (1) obtaining one or more identifiers; (2) obtaining a first MAC address; and (3) creating at least a second MAC address based on the one or more identifiers and the first MAC address. Numerous other aspects are provided. | 01-22-2009 |
20090067325 | Receiving and transmitting devices for providing fragmentation at a transport level along a transmission path - The present invention provides receiving and transmitting devices for providing fragmentation at a transport level along a transmission path. The transmitting device comprises an interface and a control unit coupled to the interface. The control unit is adapted to negotiate a packet size with a remote device. The control unit is also adapted to transmit a data packet of up to the negotiated size. The control unit is further adapted to receive acknowledgments from the remote device associated with one or more fragments, fragmented at the transport-level, of the transmitted data packet. The receiving device comprises an interface and a control unit coupled to the interface. The control unit is adapted to receive two or more fragments of a data packet transmitted by a remote device. The control unit is also adapted to transmit one or more acknowledgments to the remote device based on the received fragments. | 03-12-2009 |
20090070481 | Method and Apparatus for an Improved Bulk Read Socket Call - An apparatus and method for an improved bulk read socket call are provided. With the apparatus and method, a new field, so_rcvlen, is added to the socket structure that identifies the bulk read size requested by the user. The kernel of the prior art recv( ) function is also modified so that it sets the so_rcvlen to the size requested by the user prior to the recv( ) function going to sleep and waiting for the full data size requested by the user. A new flag, SP_MSGWAITALL, is also provided in the socket structure. In the TCP input processing, when data is received for a particular socket, the current setting of the SP_MSGWAITALL is checked. If the SP_MSGWAITALL flag is set, it is determined whether the amount of data stored in the socket receive buffer is less than the value of so_rcvlen. If not, the TCP input processing does not wake up the recv( ) thread. However, for every alternate segment, the TCP input processing sends back an acknowledgment (ACK). In the TCP output processing, when the SP_MSGWAITALL flag is set and the amount of data in the socket receive buffer is less than so_rcvlen, the full window is advertised. Once the TCP input processing determines that there is at least an amount of data in the socket receive buffer equal to the value of so_rcvlen, the TCP input processing will wake up the recv( ) thread and the SP_MSGWAITALL flag is reset. | 03-12-2009 |
20090094445 | PROCESS RETEXT FOR DYNAMICALLY LOADED MODULES - A computer implemented method, apparatus, and computer program product for dynamically loading a module into an application address space. In response to receiving a checkpoint signal by a plurality of threads associated with an application running in a software partition, the plurality of threads rendezvous to a point outside an application text associated with the application. Rendezvousing the plurality of threads suspends execution of application text by the plurality of threads. The application text is moved out of an application address space for the application to form an available application address space. The available application address space is an address space that was occupied by the application text. A software module is moved into the available application address space. | 04-09-2009 |
20090094582 | CHECKPOINT AND RESTARTABLE APPLICATIONS AND SYSTEM SERVICES - A computer implemented method, apparatus, and computer program product for checkpoint and restart of a process. In one embodiment, a process shell representing a restartable process is created on an arrival server in response to identifying a process on a departure server that is a restartable process. The process shell is frozen. A name of the restartable process, an identifier of the restartable process, and an identifier of a parent process of the restartable process is assigned to the process shell. The process shell is then unfrozen and exits. A parent process restarts the restartable process when the process shell exits. | 04-09-2009 |
20090094624 | METHOD AND APPARATUS FOR BEQUEATHING PRIVILIGE TO A DYNAMICALLY LOADED MODULE - A computer implemented method, apparatus, and computer program product for transferring a privilege to a module. In one embodiment, a set of privileges required to initiate execution of code associated with the software module is identified to form enhanced privileges. The application is frozen. The enhanced privileges are unassigned to the application and the application has insufficient privileges to initiate execution of code associated with the software module. The software module is loaded into available application address space associated with the application. The enhanced privileges are transferred to the application. Execution of the application is unsuspended and the code associated with the software module is executed within the application. | 04-09-2009 |
20090112969 | CHECKPOINT AND RESTART OF NFS VERSION 2/VERSION 3 CLIENTS WITH NETWORK STATE PRESERVATION INSIDE A WORKLOAD PARTITION (WPAR) - Exemplary embodiments provide a computer implemented method, apparatus, and computer-usable program code for moving a software partition from an origination network file system client data processing system to a destination network file system client data processing system. Responsive to receiving a request to perform a checkpoint operation on a software partition, network file system related mount information for the software partition is gathered. Determined ports of a network are unblocked. Unwritten data on the origination network file system client data processing system is synchronized with a remote network file system server. The network is re-blocked. A checkpoint file is generated and stored. The checkpoint file is sent to the destination network file system data processing system. | 04-30-2009 |
20090158082 | FAILOVER IN A HOST CONCURRENTLY SUPPORTING MULTIPLE VIRTUAL IP ADDRESSES ACROSS MULTIPLE ADAPTERS - A host enables any adapter of multiple adapters of the host to concurrently support any VIPA of the multiple VIPAs assigned to the host. Responsive to a failure of at least one particular adapter from among the multiple adapters, the host triggers the remaining, functioning adapters to broadcast a separate hardware address update for each VIPA over the network, such that for a failover in the host supporting the multiple VIPAs the host directs at least one other host accessible via the network to address any new packets for the multiple VIPAs to one of the separate hardware addresses of one of the remaining adapters. | 06-18-2009 |
20100094948 | WORKLOAD MIGRATION USING ON DEMAND REMOTE PAGING - In one embodiment a method for migrating a workload from one processing resource to a second processing resource of a computing platform is disclosed. The method can include a command to migrate a workload that is processing and the process can be interrupted and some memory processes can be frozen in response to the migration command. An index table can be created that identifies memory locations that determined where the process was when it is interrupted. Table data, pinned page data, and non-private process data can be sent to the second processing resource. Contained in this data can be restart type data. The second resource or target resource can utilize this data to restart the process without the requirement of bulk data transfers providing an efficient migration process. Other embodiments are also disclosed. | 04-15-2010 |
20120198270 | FAILBACK TO A PRIMARY COMMUNICATIONS ADAPTER - In some example embodiments, there is a method for failback to a primary communications adapter. The method includes receiving, in a driver for the primary communications adapter and a backup communications adapter, a link up event for the primary communications adapter, wherein the link up event is sent from the primary communications adapter to the driver, and wherein the link up event is triggered by establishing electrical connectivity to the primary communications adapter. The method includes inferring that the primary communications adapter is configured for receiving packets. The method includes setting the backup communications adapter to idle, wherein the backup communications adapter receives packets and drops the packets while idle. The method includes activating the primary communications adapter, wherein the primary communications adapter receives packets and passes the packets up a protocol stack while activated. | 08-02-2012 |
20120204148 | MANAGING AN APPLICATION SOFTWARE PARTITION - A computer implemented method, apparatus, and computer usable program code for managing a software partition in logical partitioned data processing system. A virtual root process is created for the software partition, wherein the virtual root process functions as a root process for the software partition. The set of child processes is re-parented to the virtual root process in response to termination of a process having a set of child processes. | 08-09-2012 |
20120230192 | LINK LAYER RESERVATION OF SWITCH QUEUE CAPACITY - A network switch, in response to receipt from a source station of a Layer 2 reservation request, establishes a reservation for capacity of an ingress queue of the network switch for a data flow of the source station. In response to a queue overrun condition on the ingress queue of the network switch while the reservation is active, the network switch preserves data frames in the data flow of the source station transmitted pursuant to the reservation and discards other data frames. | 09-13-2012 |
20120230196 | LINK LAYER RESERVATION OF SWITCH QUEUE CAPACITY - A network switch, in response to receipt from a source station of a Layer | 09-13-2012 |
20120290695 | Distributed Policy Service - According to one embodiment of the present disclosure, an approach is provided in which a policy server receives a request for a policy from a requestor. The policy server identifies an initiating virtual machine; the initial virtual machine's corresponding virtual network; and a destination virtual machine. Next, a policy corresponding to sending data from the first virtual machine to the second virtual machine is selected. The policy includes one or more logical references to the virtual network and does not include a physical reference to a physical entity located on a physical network. In turn, a physical path translation corresponding to the selected policy is identified and sent to the requestor. | 11-15-2012 |
20120290703 | Distributed Policy Service - According to one embodiment of the present disclosure, an approach is provided in which a policy server receives a request for a policy from a requestor. The policy server identifies an initiating virtual machine; the initial virtual machine's corresponding virtual network; and a destination virtual machine. Next, a policy corresponding to sending data from the first virtual machine to the second virtual machine is selected. The policy includes one or more logical references to the virtual network and does not include a physical reference to a physical entity located on a physical network. In turn, a physical path translation corresponding to the selected policy is identified and sent to the requestor. | 11-15-2012 |
20120291024 | Virtual Managed Network - According to one embodiment of the present disclosure, an approach is provided in which a policy module receives data that is initiated by a first virtual machine and has a destination at a second virtual machine. The policy module selects a policy that corresponds to sending the data from the first virtual machine to the second virtual machine. The policy includes one or more logical references to one or more virtual networks, and does not include a physical reference to a physical entity located on a physical network. In turn, the policy module encapsulates the data with a physical path translation that is based upon the selected policy, and sends the encapsulated data over the physical network to a second policy module that corresponds to the second virtual machine. | 11-15-2012 |
20120297384 | Virtual Managed Network - According to one embodiment of the present disclosure, an approach is provided in which a policy module receives data that is initiated by a first virtual machine and has a destination at a second virtual machine. The policy module selects a policy that corresponds to sending the data from the first virtual machine to the second virtual machine. The policy includes one or more logical references to one or more virtual networks, and does not include a physical reference to a physical entity located on a physical network. In turn, the policy module encapsulates the data with a physical path translation that is based upon the selected policy, and sends the encapsulated data over the physical network to a second policy module that corresponds to the second virtual machine. | 11-22-2012 |
20130033993 | Distributed Overlay Network Data Traffic Management by a Virtual Server - An approach is provided in which a data traffic module executing on a network interface card receives a data packet initiated by a first virtual machine with a destination at a second virtual machine. The data traffic module identifies one or more physical path translations corresponding to a logical connectivity that is independent of physical topology constraints of a physical network. In turn, the data traffic module encapsulates the data packet with the one or more physical path translations and sends the encapsulated data packet to the second virtual machine over the physical network. | 02-07-2013 |
20130034094 | Virtual Switch Data Control In A Distributed Overlay Network - An approach is provided in which a hypervisor provisions switch resources on a network interface card, which includes a virtual switch and a physical port. The hypervisor invokes a switch control module on a virtual machine, which provides control information to one or more of the switch resources. In turn, one or more of the switch resources utilize the control information to direct data packets between a source virtual machine and a destination virtual machine over one or more virtual networks that are independent of physical topology constraints of a physical network. | 02-07-2013 |
20130034109 | Distributed Overlay Network Data Traffic Management by a Virtual Server - An approach is provided in which a data traffic module executing on a network interface card receives a data packet initiated by a first virtual machine with a destination at a second virtual machine. The data traffic module identifies one or more physical path translations corresponding to a logical connectivity that is independent of physical topology constraints of a physical network. In turn, the data traffic module encapsulates the data packet with the one or more physical path translations and sends the encapsulated data packet to the second virtual machine over the physical network. | 02-07-2013 |
20130042086 | Dynamic Network Adapter Memory Resizing and Bounding for Virtual Function Translation Entry Storage - An approach is provided which a system selects a first virtual function from a plurality of virtual functions executing on a network adapter that includes a memory area. Next, the system allocates, in the memory area, a memory corresponding to the first virtual function. The system then stores one or more translation entries in the allocated memory partition, which are utilized to send data traversing through the first virtual function. As such, the system sends, utilizing one or more of the translation entries, the data packets from the network adapter to one or more destinations. In turn, the system dynamically resizes the memory partition based upon an amount of the memory partition that is utilized to store the one or more translation entries. | 02-14-2013 |
20130042237 | Dynamic Network Adapter Memory Resizing and Bounding for Virtual Function Translation Entry Storage - An approach is provided which a system selects a first virtual function from a plurality of virtual functions executing on a network adapter that includes a memory area. Next, the system allocates, in the memory area, a memory corresponding to the first virtual function. The system then stores one or more translation entries in the allocated memory partition, which are utilized to send data traversing through the first virtual function. As such, the system sends, utilizing one or more of the translation entries, the data packets from the network adapter to one or more destinations. In turn, the system dynamically resizes the memory partition based upon an amount of the memory partition that is utilized to store the one or more translation entries. | 02-14-2013 |
20130042238 | Optimized Virtual Function Translation Entry Memory Caching - An approach is provided in which a virtual function, which executes on a network adapter, receives a data packet from a first virtual machine. A translation entry is identified that corresponds to sending the data packet from the first virtual machine to a second virtual machine, and a determination is made as to whether an onboard memory partition assigned to the virtual function includes the identified translation. If the onboard memory location includes the translation entry, the data packet is sent to the destination virtual machine using the translation entry retrieved from the onboard memory partition. Otherwise, if the translation entry is not located in the onboard memory partition, the data packet is sent to the destination virtual machine using a translation entry retrieved from an off board memory location. | 02-14-2013 |
20130042240 | Optimized Virtual Function Translation Entry Memory Caching - An approach is provided in which a virtual function, which executes on a network adapter, receives a data packet from a first virtual machine. A translation entry is identified that corresponds to sending the data packet from the first virtual machine to a second virtual machine, and a determination is made as to whether an onboard memory partition assigned to the virtual function includes the identified translation. If the onboard memory location includes the translation entry, the data packet is sent to the destination virtual machine using the translation entry retrieved from the onboard memory partition. Otherwise, if the translation entry is not located in the onboard memory partition, the data packet is sent to the destination virtual machine using a translation entry retrieved from an off board memory location. | 02-14-2013 |
20130083690 | Network Adapter Hardware State Migration Discovery in a Stateful Environment - An approach is provided in which a discovery system receives a migration request to move a virtual machine that executes on a first system. The discovery system identifies a first network adapter corresponding to the first system, and identifies hardware state data used by the first network adapter to process data packets generated by the virtual machine. In turn, the discovery system identifies a second network adapter that is compatible with a native format of the hardware state data, and migrates the virtual machine to a second system corresponding to the identified second network adapter. | 04-04-2013 |
20130086582 | Network Adapter Hardware State Migration Discovery in a Stateful Environment - An approach is provided in which a discovery system receives a migration request to move a virtual machine that executes on a first system. The discovery system identifies a first network adapter corresponding to the first system, and identifies hardware state data used by the first network adapter to process data packets generated by the virtual machine. In turn, the discovery system identifies a second network adapter that is compatible with a native format of the hardware state data, and migrates the virtual machine to a second system corresponding to the identified second network adapter. | 04-04-2013 |
20130091261 | Defining And Managing Virtual Networks In Multi-Tenant Virtualized Data Centers - An approach is provided in which a computer system selects a virtual domain from multiple virtual domains, which are each overlayed onto a physical network and are independent of physical topology constraints of the physical network. The computer system selects, from the selected virtual domain, a first virtual group that includes one or more first virtual network endpoints. Next, the computer system selects, from the selected virtual domain, a second virtual group that includes one or more second virtual network endpoints. In turn, the computer system creates a logical link policy that includes one or more actions corresponding to sending data between the first virtual group and the second virtual group. | 04-11-2013 |
20130091501 | Defining And Managing Virtual Networks In Multi-Tenant Virtualized Data Centers - An approach is provided in which a computer system selects a virtual domain from multiple virtual domains, which are each overlayed onto a physical network and are independent of physical topology constraints of the physical network. The computer system selects, from the selected virtual domain, a first virtual group that includes one or more first virtual network endpoints. Next, the computer system selects, from the selected virtual domain, a second virtual group that includes one or more second virtual network endpoints. In turn, the computer system creates a logical link policy that includes one or more actions corresponding to sending data between the first virtual group and the second virtual group. | 04-11-2013 |
20130097600 | Global Queue Pair Management in a Point-to-Point Computer Network - An approach is provided in which a local module receives a data frame initiated by a first virtual machine and has a target destination at a second virtual machine, which executes on a destination host system. The local module identifies a destination local port ID and a destination global queue pair number corresponding to the second virtual machine. In one embodiment, the destination local port ID corresponds to the destination host, but the destination global queue pair number is independent of the destination host. The local module includes the destination global queue pair number and the destination local port ID in an overlay header and encapsulates the data frame with the overlay header, which results in an encapsulated frame. In turn, the local module sends the encapsulated frame through a computer network to the second virtual machine. | 04-18-2013 |
20130148546 | SUPPORT FOR CONVERGED TRAFFIC OVER ETHERNET LINK AGGREGATION (LAG) - In one embodiment, a system includes a switching processor configured to execute logic, a plurality of ports, at least some of the ports being grouped together in one or more link aggregations (LAGs), logic adapted to create at least a first virtual local area network (VLAN) interface for Ethernet traffic using transmission control protocol/internet protocol (TCP/IP) that is received on at least one of the plurality of ports, and logic adapted to create at least a second VLAN for storage area network (SAN) traffic using Fiber Channel over Ethernet (FCoE) and/or remote direct access memory (RDMA) over Converged Enhanced Ethernet (RoCEE) that is received on at least one of the plurality of ports, wherein no SAN traffic using FCoE and/or RoCEE is assigned to the first VLAN, and wherein no Ethernet traffic using TCP/IP is assigned to the second VLAN. | 06-13-2013 |
20130152075 | Acceleration for Virtual Bridged Hosts - An approach is provided in which a hardware accelerated bridge executing on a network adapter receives an ingress data packet. The data packet includes a destination MAC address that corresponds to a virtual machine, which interfaces to a software bridge executing on a hypervisor. The hardware accelerated bridge identifies a software bridge table entry that includes the destination MAC address and a virtual function identifier, which identifies a virtual function corresponding to the software bridge. In turn, the hardware accelerated bridge sends the data packet from the hardware accelerated bridge to the software bridge through the identified virtual function. | 06-13-2013 |
20140096183 | PROVIDING SERVICES TO VIRTUAL OVERLAY NETWORK TRAFFIC - In one embodiment, a method for applying security policy in an overlay network includes receiving a request, including a packet, for a communication path through an overlay network, determining whether a security policy is to be applied to the packet based on at least one of: contents of the packet, first information, and second information, selecting a communication path between a source physical switch and a destination physical switch, wherein the selected communication path directly connects the source physical switch to the destination physical switch when it is determined to not apply the security policy to the packet, and the selected communication path connects the source physical switch to the destination physical switch via a security appliance when it is determined to apply the security policy to the packet, and sending the selected communication path to the source physical switch. | 04-03-2014 |
20140119174 | TECHNOLOGY FOR NETWORK COMMUNICATION BY A COMPUTER SYSTEM USING AT LEAST TWO COMMUNICATION PROTOCOLS - A network adapter has a first and second virtual local area network (“VLAN”) device configured on each of first and second physical ports of the network adapter. The second VLAN devices are configured as a logically bonded, virtual device. | 05-01-2014 |
20140119380 | METHOD FOR NETWORK COMMUNICATION BY A COMPUTER SYSTEM USING AT LEAST TWO COMMUNICATION PROTOCOLS - A network adapter has a first and second virtual local area network (“VLAN”) device configured on each of first and second physical ports of the network adapter. The second VLAN devices are configured as a logically bonded, virtual device. | 05-01-2014 |
20140198649 | EXTENDED LINK AGGREGATION (LAG) FOR USE IN MULTIPLE SWITCHES - In one embodiment, a method for providing link aggregation (LAG) to heterogeneous switches includes receiving, at a switch controller, LAG requests forwarded by switches and determining that multiple LAG requests corresponding to a server have been received, grouping the multiple LAG requests into LAG groups according to a switch from which they were received and correlating all the LAG groups with the server, instructing each of the switches to setup a LAG group with the server according to the LAG groups determined by the switch controller, and creating alternate flows that correspond to flows through each of the switches to the server through direction from the switch controller. The switches may rely upon OpenFlow to communicate with the switch controller, in some approaches. In addition, other methods for providing LAG to heterogeneous switches are also described, along with systems and computer program products which provide LAG to heterogeneous switches. | 07-17-2014 |
20140201733 | SCALABLE NETWORK OVERLAY VIRTUALIZATION USING CONVENTIONAL VIRTUAL SWITCHES - In one embodiment, a system includes a server running a virtualization platform, the virtualization platform including logic adapted for creating one or more virtual machines (VMs) and logic adapted for managing a virtual switch (vSwitch), a controller in communication with the server, the controller including logic adapted for assigning a media access control (MAC) address and a virtual local area network (VLAN) identifier (ID) to each of the one or more VMs, wherein a specific tenant to which the one or more VMs belongs is indicated using a tenant ID derived from the VLAN ID, the MAC address, or a combination thereof. Other systems, methods, and computer program products are also described according to more embodiments. | 07-17-2014 |
20140254603 | INTEROPERABILITY FOR DISTRIBUTED OVERLAY VIRTUAL ENVIRONMENTS - Embodiments of the invention relate to providing interoperability between hosts supporting multiple encapsulation. One embodiment includes a method that includes mapping packet encapsulation protocol type information for virtual switches. Each virtual switch is associated with one or more virtual machines (VMs). It is determined whether one or more common encapsulation protocol types exist for a first VM associated with a first virtual switch and a second VM associated with a second virtual switch based on the mapping. A common encapsulation protocol type is selected if it is determined that one or more common encapsulation protocol types exist for the first virtual switch and the second virtual switch. A packet is encapsulated for communication between the first VM and the second VM using the selected common encapsulation protocol type. | 09-11-2014 |
20150074276 | WORKLOAD DEPLOYMENT WITH REAL-TIME CONSIDERATION OF GLOBAL NETWORK CONGESTION - In one embodiment, a system includes a switch controller configured to communicate with each of a plurality of network devices in a network, the switch controller including a processor and logic integrated with and/or executable by the processor, the logic being configured to: receive a request to instantiate a new workload or to move a current workload in the network, determine a throughput associated with the new or current workload, and select an optimum location to place the new workload or to move the current workload in the network based on the throughput associated with the new or current workload. According to another embodiment, a method includes receiving a request at a switch controller to instantiate or move a workload, determining a throughput associated with the workload, and selecting an optimum location to place or move the workload based on the throughput associated with the workload. | 03-12-2015 |