Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 5196. Отображено 100.
05-01-2012 дата публикации

Using distributed queues in an overlay network

Номер: US20120005254A1
Принадлежит: Microsoft Corp

The present invention extends to methods, systems, and computer program products for using distributed queues in an overlay network. Embodiments of the invention can be used to replicate queue state (e.g., inserted and/or deleted messages) within an overlay network and can be used to continue a process at a different node within the overlay network based on replicated queue state. Accordingly, embodiments of the invention can be used to increase the availability of queue state, compensate for node failures within an overlay network, and promote replication of consistent queue state between nodes within an overlay network.

Подробнее
05-01-2012 дата публикации

Simplifying automated software maintenance of data centers

Номер: US20120005520A1
Принадлежит: Oracle International Corp

An aspect of the present invention simplifies software maintenance of nodes in a data center. In one embodiment, a management system receives data specifying a set of commands to be executed on a node in the data center, and then forms a maintenance script by programmatically incorporating instructions for executing the set of commands on the node and to perform a set of management actions. The management system then executes the maintenance script to cause execution of the set of commands on the nodes, thereby performing maintenance of the node. A user/administrator of the data center needs to specify only the commands, thereby simplifying the software maintenance of data centers. According to another aspect, the maintenance scripts (formed by incorporating the commands provided by a user) are executed as part of a disaster recovery process in the data center.

Подробнее
26-01-2012 дата публикации

Rejuvenation processing device, rejuvenation processing system, computer program, and data processing method

Номер: US20120023495A1
Автор: Fumio Machida
Принадлежит: NEC Corp

In a rejuvenation processing device ( 1 ), at least one host machine ( 3 ) is selected as an object to be rejuvenated from among each of the host machines ( 3 ). At least one virtual machine ( 302 ) is selected from among the virtual machines ( 302 ) operating in the host machine ( 3 ) which is not selected as an object to be rejuvenated. The operation of the selected virtual machine ( 302 ) is stopped, and the virtual machine ( 302 ) operating in the host machine ( 3 ) selected as the object to be rejuvenated is migrated to the host machine ( 3 ) in which the virtual machine ( 302 ) operates. The host machine ( 3 ) selected as the object to be rejuvenated is rejuvenated. Thereby, it is possible to provide a rejuvenation processing device capable of simultaneously rejuvenating the host machines and the virtual machines necessary to be rejuvenated, while continuously operating the host machines and the virtual machines which are not necessary to be rejuvenated.

Подробнее
23-02-2012 дата публикации

Controlling apparatus, method for controlling apparatus and information processing apparatus

Номер: US20120047397A1
Принадлежит: Fujitsu Ltd

A controlling apparatus for controlling an information processing apparatus, the controlling apparatus includes a first controller including a first data transfer unit that communicates data between the information processing apparatus, and a first processing unit that generates a command to instruct the first data transfer unit to communicate data between the information processing apparatus, and a second controller including a second data transfer unit that communicates data between the information processing apparatus, and a second processing unit that generates a command to instruct the second data transfer unit to communicate data between the information processing apparatus.

Подробнее
25-10-2012 дата публикации

Partial fault processing method in computer system

Номер: US20120272091A1
Принадлежит: HITACHI LTD

As regards a hardware fault which has occurred in a computer, a hypervisor notifies an LPAR which can continue execution, of a fault occurrence as a hardware fault for which execution can be continued. Upon receiving the notice, the LPAR notifies the hypervisor that it has executed processing to cope with a fault. The hypervisor provides an interface for acquiring a situation of a notice situation. It is made possible to register and acquire a situation of coping with a hardware fault allowing continuation of execution through the interface, and it is made possible to make a decision as to the situation of coping with a fault in the computers as a whole.

Подробнее
01-11-2012 дата публикации

Controlling nanostore operation based on monitored performance

Номер: US20120278650A1
Принадлежит: Hewlett Packard Development Co LP

Methods, apparatus and articles of manufacture for controlling nanostore operation based on monitored performance are disclosed. An example method disclosed herein comprises monitoring performance of a nanostore, the nanostore including compute logic and a datastore accessible via the compute logic, and controlling operation of the nanostore in response to detecting a performance indicator associated with wearout of the compute logic to permit the compute logic to continue to access the datastore.

Подробнее
15-11-2012 дата публикации

Job migration in response to loss or degradation of a semi-redundant component

Номер: US20120290874A1
Принадлежит: International Business Machines Corp

A method of managing the workload in a computer system having one or more semi-redundant hardware components is provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components affected by the loss or degradation, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Jobs identified as critical run on hardware components having the most capacity and reliability, while less-critical jobs use the remaining capacity of affected hardware components. Examples of semi-redundant hardware components include a memory module, CPU core, Ethernet port, power supply, fan, disk drive, and an input output port.

Подробнее
03-01-2013 дата публикации

Transference control method, transference control apparatus and recording medium of transference control program

Номер: US20130006930A1
Принадлежит: Fujitsu Ltd

A transference control apparatus includes a communication controller, and a processor that executes a procedure, the procedure including processing a control that causes first processing, in which an update log representing the update content of updating performed for a first database is transmitted, by the communication controller, to a second database serving as a copy destination for the first database, to be performed with priority over second processing, in which transmission target data contained in the first database is transmitted to the second database, and restraining, in the case that updating of the transmission target data is allowed in the first database, the control that causes the first processing to be performed with priority.

Подробнее
21-03-2013 дата публикации

Mirroring Virtual Machines from a Primary Host to a Secondary Host

Номер: US20130073778A1
Принадлежит: International Business Machines Corp

A system and computer program product for mirroring virtual machines from a primary host to a secondary host. The system includes a processor tracking changes for each of a plurality of memory pages and processor states for one or more primary host virtual machines. Responsive to an occurrence of a checkpoint, the primary host virtual machines are stopped. A determination is made if each of the memory pages is frequently changed. In response to the memory page being frequently changed, the frequently changed memory page is marked as being writeable and copied to a buffer. In response to the memory page being infrequently changed, the infrequently changed memory page is marked as being read only. The one or more primary host virtual machines are resumed. A copy of the memory pages, the buffer and changes to the processor states are transmitted to the secondary host.

Подробнее
16-05-2013 дата публикации

Self-reparable semiconductor and method thereof

Номер: US20130124918A1
Принадлежит: MARVELL WORLD TRADE LTD

A semiconductor device includes a plurality of processors and a spare processor configured to perform respective processing functions. A plurality of first switches is located at respective inputs of the plurality of processors. Each of the plurality of first switches is configured to selectively provide an input signal to a respective one of the plurality of processors and the spare processor. A first multiplexer is located at an input of the spare processor. The first multiplexer is configured to receive the input signals from each of the plurality of first switches and route, to the spare processor, a selected one of the input signals corresponding to a failed one of the plurality of processors. The spare processor is further configured to perform a processing function associated with the failed one of the plurality of processors in response to receiving the selected one of the input signals.

Подробнее
23-05-2013 дата публикации

Mechanism to Provide Assured Recovery for Distributed Application

Номер: US20130132765A1
Принадлежит: CA Inc

A system and method is provided for providing assured recovery for a distributed application. Replica servers associated with the distributed application may be coordinated to perform integrity testing together for the whole distributed application. The replica servers connect to each other in a manner similar to the connection between master servers associated with the distributed application, thereby preventing the replica servers from accessing and/or changing application data on the master servers during integrity testing.

Подробнее
30-05-2013 дата публикации

Method for switching application server, management computer, and storage medium storing program

Номер: US20130138998A1
Принадлежит: HITACHI LTD

It is provided a management computer which refers to switching level information including switching patterns to be used at a time of switching the first task to the second application server; sets a level of a degree of safety for each of the switching patterns; refers to a stop time for each first task which is allowed upon switching the first task to the second application server; selects one of the switching patterns having a switching time that is shorter than the stop time of the task requirement information which is set to the first task and having the level of the degree of safety that is highest among the switching patterns of the switching level information; stops the second task of the second application server by the selected one of the switching patterns; and then controls the second application server to provide the first task.

Подробнее
13-06-2013 дата публикации

Apparatus and method of managing databases of active node and standby node of main memory database management system

Номер: US20130151895A1
Автор: Seung Won Lee
Принадлежит: Altibase Corp

Databases of an active node and a standby node of a main memory database management system (MMDBMS) are managed so as to prevent loss of a transaction caused by failure of any one of the active node or the standby node. The MMDBMS is configured to prevent data mismatch between the active node and the standby node when failure of any one of the active node and the standby node occurs. In case of failure of one of the nodes, log information from the other node is obtained to recover the failed node.

Подробнее
20-06-2013 дата публикации

Inventory updating of an internet protocol (ip) alias within a highly available computing cluster

Номер: US20130159483A1
Принадлежит: International Business Machines Corp

A clustered computing data processing system can be configured for inventory management in a highly available cluster. The system can include a cluster of computers managed by a cluster agent and providing high availability for a hosted application in the cluster. The system also can include a systems management tool executing in memory of a host computer system and coupled to the cluster agent and maintaining an inventory of data pertaining to the computers in the cluster. The system yet further can include an Internet protocol (IP) alias discover module coupled to the tool. The module can include program code executing in the memory of the host computer system so as to receive notification from the cluster agent of a change to addressing data for the computers in the cluster and, responsive to the notification, to update the inventory to reflect the change to the addressing data.

Подробнее
20-06-2013 дата публикации

Inventory updating of an internet protocol (ip) alias within a highly available computing cluster

Номер: US20130159488A1
Принадлежит: International Business Machines Corp

A clustered computing data processing system can be configured for inventory management in a highly available cluster. The system can include a cluster of computers managed by a cluster agent and providing high availability for a hosted application in the cluster. The system also can include a systems management tool executing in memory of a host computer system and coupled to the cluster agent and maintaining an inventory of data pertaining to the computers in the cluster. The system yet further can include an Internet protocol (IP) alias discover module coupled to the tool. The module can include program code executing in the memory of the host computer system so as to receive notification from the cluster agent of a change to addressing data for the computers in the cluster and, responsive to the notification, to update the inventory to reflect the change to the addressing data.

Подробнее
04-07-2013 дата публикации

Monitoring and managing device, monitoring and managing system and method of data center

Номер: US20130169816A1

A monitoring and managing method applied to a data center comprising racks is provided, wherein each rack comprises at least one electronic apparatus, and the monitoring and managing method comprises: capturing an image from a panel side of the racks to generate a first visible light image; capturing a non-visible light image of a heat dissipation side of the racks; using image recognition to determine the status of light signals and network ports of the at least one electronic apparatus and forming status information according to the first visible light image; storing the first visible light image and the non-visible light image; determining whether there is an abnormal event of the data center according to the first visible light image, the status information and profile of the data center.

Подробнее
11-07-2013 дата публикации

PHY BANDWIDTH ESTIMATION FROM BACKPRESSURE PATTERNS

Номер: US20130176880A1
Автор: Radulescu Codrut Radu
Принадлежит:

The present invention provides a system and method of determining available bandwidth at a physical layer (PHY) device at a server on a broadband network. A link layer controller of a master administrator adaptively polls a PHY device over a set of time intervals. During polling, the controller places a PHY device's address on a line of a bus and awaits a response from the PHY device. Based upon the response from the PHY device, the administrator can determine whether the PHY device has available bandwidth. The link layer controller uses this information to recalculate its polling scheme to better make use of the available bandwidth over the shared transmission medium to which each PHY device in the network is attached. 1. A method for determining available bandwidth at respective ones of a plurality of physical layer (PHY) devices , the method comprising the steps of:polling by a controller said respective ones of said plurality of PHY devices at respective time intervals determined using respective ones of a plurality of counters corresponding to said respective ones of said plurality of PHY devices;receiving at said controller a series of responses from at least a given one of said plurality of PHY devices, said responses being based on available bandwidth at said given PHY device; andcomparing said responses to determine an adjusted time interval for use in subsequent polling of said given PHY device;wherein said polling of said given PHY device comprises transmitting an inquiry as to a current status of an incoming packet buffer of said given PHY device;wherein determining a given time interval for polling of said given PHY device comprises loading the counter corresponding to said given PHY device with an initial value and transmitting the inquiry when the value of the counter corresponding to said given PHY device reaches a final value; andwherein the value of the counter corresponding to said given PHY device is changed responsive to polling of at least ...

Подробнее
11-07-2013 дата публикации

Computer system and system switch control method for computer system

Номер: US20130179532A1
Принадлежит: HITACHI LTD

Disclosed is a computer system provided with an I/O processing unit comprising a buffer and a control unit, wherein the buffer is located between the first computer and a storage apparatus and between a second computer and the storage apparatus and temporarily stores an I/O output from a first computer, and the control unit outputs data stored in the buffer to the storage apparatus, and wherein, a management computer functions to store the I/O output of the first computer in the buffer at a predetermined time, to separate a first storage unit and a second storage unit which are mirror volumes, to connect the buffer and the second storage unit, to connect the second computer and the first storage unit, to output data stored in the buffer to the second storage unit, and to activate the second computer using the first storage unit.

Подробнее
11-07-2013 дата публикации

DUAL-CHANNEL HOT STANDBY SYSTEM AND METHOD FOR CARRYING OUT DUAL-CHANNEL HOT STANDBY

Номер: US20130179723A1
Принадлежит: Beijing Jiaotong University

A dual-channel hot standby system and a method for carrying out dual-channel hot standby, the system comprises a hot standby status management layer including two hot standby management units, an application processing layer including two application processors, and a data communication layer including two communicators; the hot standby status management layer is used for controlling the setting and switching between a active status and a standby status of the two application processors, monitoring the working status of the data communication layer, and carrying out synchronization of the control cycles for the two channels of the system; wherein one of the hot standby management units controls one of the application processors, and together constitute a channel of the system therewith; the data communication layer is used for receiving data from outside, and forwarding the data to the application processing layer. The present invention avoids the occurrence of “dual-channel-active” or “dual-channel-standby” status; ensures synchronization of the control cycles of two channels; reduces the time of the system for responding to breakdowns; meets the real-time requirements; enhances the reliability and availability of the system; and ensures a seamless switching between active and standby statuses. 1. A dual-channel hot standby system , characterized in that , it comprises a hot standby status management layer including two hot standby management units , an application processing layer including two application processors , and a data communication layer including two communicators; the hot standby status management layer is used for controlling the setting and switching between a active status and a standby status of the two application processors , monitoring the working status of the data communication layer , and carrying out synchronization of the control cycles for the two channels of the system; wherein one of the hot standby management units controls one of the ...

Подробнее
18-07-2013 дата публикации

QUERY EXECUTION AND OPTIMIZATION WITH AUTONOMIC ERROR RECOVERY FROM NETWORK FAILURES IN A PARALLEL COMPUTER SYSTEM WITH MULTIPLE NETWORKS

Номер: US20130185588A1

A database query execution monitor determines if a network error or low performance condition exists and then where possible modifies the query. The query execution monitor then determines an alternate query execution plan to continue execution of the query. The query optimizer can re-optimize the query to use a different network or node. Thus, the query execution monitor allows autonomic error recovery for network failures using an alternate query execution. The alternate query execution could also be determined at the initial optimization time and then this alternate plan used to execute a query in the case of a particular network failure. 1. A computer apparatus comprising:a plurality of nodes each having a memory and at least one processor;a database residing in the memory;a plurality of networks connecting the plurality of nodes;a network monitor that periodically monitors the plurality of networks to determine network loading and maintains a network file that contains information about network utilization;a query optimizer and a query to the database residing in the memory;a query execution monitor residing in the memory and executed by the at least one processor, the query execution monitor detecting a network failure during execution of the query and invoking the query optimizer to re-optimize the query to use a different network to execute the query, the query execution monitor detecting poor performance of execution of the query and invoking the query optimizer to re-optimize the query to use a different network to execute the query.2. The computer apparatus of wherein the query execution monitor determines part of the query executed prior to the network failure and then modifies the query to utilize data from the part of the query that executed prior to the network failure.3. The computer apparatus of wherein the network file maintained by the network monitor is used by the query execution monitor and wherein the network file contains network file ...

Подробнее
08-08-2013 дата публикации

Redundant computer control method and device

Номер: US20130205162A1
Принадлежит: Fujitsu Ltd

Disclosed is a non-transitory computer-readable medium storing a program, which causes a computer to execute a sequence of processing. The sequence of processing includes receiving status information by a second server device from a client device, the status information being collected by the client device, and including a status of a first server device and statuses of one or more standby servers configured to operate when the first server device fails, and causing the second server device to operate, when the status information indicates a predetermined first status, as at least one of the first server device and the one or more standby servers in a failure status.

Подробнее
15-08-2013 дата публикации

NETWORK ARRANGEMENT OF LOW POWERED MONITORING DEVICES

Номер: US20130212254A1
Принадлежит: TEXECOM LIMITED

A network arrangement of low powered monitored devices which are linked together along with a control device in a mesh network configuration. Each of the security devices and the control devices are powered by an on board power source. To maximise the lifetime of the of the power supply the devices are monitored periodically and synchronously, and the devices are only activated during monitoring. 15-. (canceled)6. A network arrangement of low powered monitored devices operable to communicate with a control device , each said device being closer to the control device than the preceding device and wherein each said device includes a memory device in which is stored data relating to the relative position of the device in said network arrangement to other devices of said network , to allow said devices to communicate signals to the control device over a maximum distance using a minimum number of devices , thus reducing power requirements of said network arrangement.7. An arrangement according to whereby each device is operable to switch between two states claim 6 , an activated state in which said device can communicate with the control device and/or another of said devices and in which the requirements for power are relatively large and a de-activated state where the device is not able to communicate with the control device and/or other of said devices where the power requirements are relatively small.8. An arrangement according to whereby said devices are switched between said states at a predetermined rate and said switching between states is carried out in synchronization with all devices.9. An arrangement according to whereby said devices are switched between said states at a predetermined rate and said switching between states is carried out in synchronization with all devices.10. An arrangement according to wherein said devices and control device are linked by one or more wireless connections.11. An arrangement according to wherein switching between the activated ...

Подробнее
15-08-2013 дата публикации

COMPUTER SYSTEM AND BOOT CONTROL METHOD

Номер: US20130212424A1
Принадлежит: Hitachi, Ltd.

When a primary computer is taken over to a secondary computer in a redundancy configuration computer system where booting is performed via a storage area network (SAN), a management server delivers an information collecting/setting program to the secondary computer before the user's operating system of the secondary computer is started. This program assigns a unique ID (World Wide Name), assigned to the fibre channel port of the secondary computer to allow a software image to be taken over from the primary computer to the secondary computer. 1. A boot control method for a computer system having a plurality of computers , a management server that controls said plurality of computers , and a storage device that is shared by said plurality of computers , each computer having a port , a program for each computer is stored in a logical unit of said storage device , the computer system is configured to boot the program for each computer by using a unique ID that is set on the port of each computer , the unique ID that is set on the port of each computer is associated with the program stored in the logical unit , said boot control method comprising the steps of:managing, by said management server, unique IDs assigned to ports of the computers, and delivering a first unique ID assigned to a port of a failed computer to a secondary computer among said plurality of computers;setting, by said secondary computer, the delivered first unique ID on the port of the secondary computer, and notifying the management server of the first unique ID set on the port of the secondary computer;managing, by the management server, managing the notified first unique ID as a unique ID assigned to the port of the secondary computer;accessing, by said secondary computer, a logical unit associated with the failed computer using a logical connection newly created between the secondary computer and the storage device based on the setting of the first unique ID, and booting the program for the failed ...

Подробнее
15-08-2013 дата публикации

Controlling Memory Redundancy In A System

Номер: US20130212426A1
Принадлежит:

In one embodiment, the present invention provides an ability to handle an error occurring during a memory migration operation in a high availability system. In addition, a method can be used to dynamically remap a memory page stored in a non-mirrored memory region of memory to a mirrored memory region. This dynamic remapping may be responsive to a determination that the memory page has been accessed more than a threshold number of times, indicating a criticality of information on the page. Other embodiments are described and claimed. 1. A system comprising:a first processor;a second processor;a first memory controller to couple the first processor to a first portion of a system memory; anda second memory controller to couple the second processor to a second portion of the system memory, wherein the first memory controller is to cause a migration of information stored in the first portion of the system memory to the second portion of the system memory and update a redundant memory aperture storage of the first memory controller to indicate an amount of the information migrated from the first portion of the system memory to the second portion of the system memory, determine whether an error incurred during a memory access request of an operating system (OS)-controlled thread to the first portion of the system memory occurred in a region of the first portion of the system memory that has been migrated to the second portion of the system memory and if so retry the memory access request to the second portion of the system memory, otherwise signal an uncorrectable memory error.2. The system of claim 1 , wherein the first processor is to insert an identifier for a first memory page in a list of pages to be migrated to the first portion.3. The system of claim 2 , wherein the first processor is to first remap a second memory page from the first portion to a non-mirrored memory portion of the system memory before remapping the first memory page to the first portion claim 2 , ...

Подробнее
29-08-2013 дата публикации

Failover Processing

Номер: US20130227339A1
Автор: Lund Christian
Принадлежит: METASWITCH NETWORKS LTD.

A method of providing failover processing between a first element and a second element in a data communications network, the method comprising configuring a first channel and a second channel between the first and second elements, the first and second channels comprising different physical data paths, receiving at the first element, via the first channel, first data signals representative of functioning statuses of the second element, the first channel being configured to allow a non-optimal, partly functioning status of the second element to be communicated to the first element; and receiving at the first element, via the second channel, second data signals representative of functioning statuses of the second element, the second channel being configured to allow a failed functioning status of the second element to be communicated to the first element; and conducting failover processing based on both the first and second data signals. 1. A method of providing failover processing between a first element and a second element , the first element and the second element each being suitable for performing a data processing function in a data communications network , the method comprising:configuring a first channel and a second channel between the first and second elements, said first and second channels comprising different physical data paths;receiving at the first element, via the first channel, first data signals representative of functioning statuses of the second element, the first channel being configured to allow a non-optimal, partly functioning status of the second element to be communicated to the first element;receiving at the first element, via the second channel, second data signals representative of functioning statuses of the second element, the second channel being configured to allow a failed functioning status of the second element to be communicated to the first element; andconducting failover processing based on both the first and second data signals. ...

Подробнее
05-09-2013 дата публикации

Optimizing disaster recovery systems during takeover operations

Номер: US20130232111A1
Принадлежит: International Business Machines Corp

Exemplary method, system, and computer program product embodiments for optimizing disaster recovery systems during takeover operations are provided. In one embodiment, by way of example only, a flag is set in a replication grid manager to identify replication grid members to consult in a reconciliation process for resolving intersecting and non-intersecting data amongst the disaster recovery systems for a takeover operation. The replication grid members are consulted for the takeover operation to accommodate a coordination of an ownership synchronization process for cartridges not distributed on-time to the replication grid members. Additional system and computer program product embodiments are disclosed and provide related advantages.

Подробнее
26-09-2013 дата публикации

Facility Control System and Facility Control Method

Номер: US20130253665A1
Автор: Kazuto Mori, Kouichi Ikawa
Принадлежит: Daifuku Co Ltd

A facility control system comprises a selection processing portion that selects, based on a manual operation and when an abnormal condition occurs in a first-layer computer that executes a first-layer program which issues an apparatus operating command to an apparatus controller, whether to cause a second-layer computer to execute the first-layer program that had been executed by the first-layer computer, and a substitute command output processing portion which outputs a substitute command in accordance with selection information selected by the selection processing portion. The second-layer computer executes the first-layer program that had been executed by the first-layer computer in which the abnormal condition occurred based on a substitute command outputted by the substitute command output processing portion.

Подробнее
26-09-2013 дата публикации

MONITORING OF AVAILABILITY DATA FOR SYSTEM MANAGEMENT ENVIRONMENTS

Номер: US20130254393A1

A method and system for monitoring availability data of a system management (SM) environment. A connection configuration associated with the SM environment is retrieved from a central repository, wherein the SM environment is coupled to a SM portal server that includes the central repository, and wherein the SM environment includes one or more terminal systems. In response to determining that the retrieved connection configuration properly establishes communication between the SM portal server and the SM environment, availability data pertaining to availability of resources at endpoints of the one or more terminal systems is collected. The collected availability data recorded in the central repository. 1. A method for monitoring availability data of a system management (SM) environment , said method comprising:retrieving, by a processor of a computer system, a connection configuration associated with the SM environment from a central repository, wherein the SM environment is coupled to a SM portal server that comprises the central repository, and wherein the SM environment comprises one or more terminal systems;in response to determining that the retrieved connection configuration properly establishes communication between the SM portal server and the SM environment, said processor collecting availability data pertaining to availability of resources at endpoints of the one or more terminal systems; andsaid processor recording the collected availability data in the central repository.2. The method of claim 1 , wherein the one or more terminal systems is a plurality of terminal systems claim 1 , and wherein said collecting comprises:for each endpoint of each terminal system, ascertaining whether each endpoint of each terminal system is available or unavailable, wherein said ascertaining ascertains that at least one of the endpoints is available;for each available endpoint, verifying whether a proper monitoring probe is deployed or not deployed at each available ...

Подробнее
26-09-2013 дата публикации

STANDBY SYSTEM DEVICE, A CONTROL METHOD, AND A PROGRAM THEREOF

Номер: US20130254588A1
Автор: FUJIEDA Tsuyoshi
Принадлежит:

A standby system device which is connected to an active system device includes a process information sharing unit B and a standby process management unit C. The process information sharing unit B receives active side process information indicating usage of resources of an active system process A operating on the active system device from the active system device The standby process management unit C terminates a standby process A before activating a takeover process D used for taking over processing of the active system process A when a takeover of the active system process is requested on the standby system device the standby process A referring to the active side process information and acquiring resources in such a way that usage of resources of the standby process A is equal to or greater than the usage of resources of the active system process A. 1. A standby system device which is connected to an active system device comprising:a process information sharing unit which receives active side process information indicating usage of resources of an active system process operating on said active system device from said active system device; anda standby process management unit which terminates a standby process before activating a takeover process that is used for taking over processing of said active system process when a takeover of said active system process is requested on said standby system device, said standby process referring to said active side process information and acquiring resources in such a way that usage of resources of said standby process is equal to or greater than said usage of resources of said active system process.2. The standby system device according to claim 1 , wherein said standby process management unit activates said standby process before said takeover of said active system process is requested.3. The standby system device according to claim 1 , wherein said standby process management unit activates said standby process at a time at ...

Подробнее
03-10-2013 дата публикации

CLUSTER MONITOR, METHOD FOR MONITORING A CLUSTER, AND COMPUTER-READABLE RECORDING MEDIUM

Номер: US20130262916A1
Автор: SATO Yoichi
Принадлежит: NEC Corporation

A cluster monitor () controls activation of a business application program and a monitoring agent in a cluster system () that includes a plurality of servers. The cluster monitor () includes a business server identifying unit () that identifies a server on which the business application program is operating among the servers, and an agent server selecting unit () that selects a server for activating the monitoring agent from among the servers based on the identified server. 1. A cluster monitor for controlling activation of a business application program and a monitoring agent in a cluster system including a plurality of servers , comprising:a business server identifying unit that identifies a server on which the business application program is operating from among the plurality of servers; andan agent server selecting unit that selects a server for activating the monitoring agent from among the plurality of servers, based on the identified server.2. The cluster monitor according to claim 1 ,wherein in a case where the monitoring agent is activated on one of the plurality of servers, if a failure occurs in the server on which the monitoring agent is activated, the business server identifying unit identifies, in response to the occurrence of the failure, the server on which the business application program is operating, and the agent server selecting unit selects a server for activating the monitoring agent.3. The cluster monitor according to claim 1 ,wherein in a case where the monitoring agent is activated on one of the plurality of servers, if a failure relating to the business application program occurs and fail-over of the business application program is executed, the business server identifying unit identifies, in response to the execution of the fail-over, a server to take over the business application program due to the fail-over, and the agent server selecting unit selects a server for activating the monitoring agent.4. The cluster monitor according to claim ...

Подробнее
10-10-2013 дата публикации

METHOD FOR INDICATING PORT STATES AND SWITCH

Номер: US20130265882A1
Принадлежит:

The present disclosure discloses a method for indicating port states and a switch. A main panel of the switch is provided with port indicators one-to-one corresponding to physical ports and N channel indicators. The switch further includes a main chip and a control component. The control component is configured to: receive a port state indication signal from the main chip, and parse the port state indication signal to obtain usage state information of each logical port; generate N enable signals, and control at most one enable signal to be valid at any time point; and control the states of the N channel indicators by using the N enable signals sent from the enable signal controlling module, and control the state of each port indicator according to the N enable signals and the usage state information of each logical port. 1. A switch , comprising at least two physical ports on its main panel , and each physical port comprising N channels , where N≧2 , wherein the main panel is provided with port indicators one-to-one corresponding to the physical ports and N channel indicators , the N channel indicators being respectively corresponding to the N channels of each physical port; wherein the switch further comprises a main chip and a control component , wherein the main chip is provided with logical ports corresponding to each of the channels , and the control component comprises a signal parsing module , an enable signal controlling module , and an indicator controlling module , wherein:the signal parsing module is configured to receive a port state indication signal from the main chip and parse the port state indication signal to obtain usage state information of each logical port;the enable signal controlling module is configured to generate N enable signals and control at most one enable signal to be valid at any time point; andthe indicator controlling module is configured to control the states of the N channel indicators by using the N enable signals sent from the ...

Подробнее
10-10-2013 дата публикации

NETWORK AVAILABILITY ANALYTICS

Номер: US20130265894A1
Принадлежит: CISCO TECHNOLOGY, INC.

In one embodiment, a method includes receiving at a network device, route convergence measurements and traffic demand measurements from a plurality of routers, and computing network availability based on the measurements at the network device. The route convergence measurements are associated with route computations at the routers and the traffic demand measurements include portions of a demand matrix associated with the routers. An apparatus and logic are also disclosed herein. 1. A method comprising:receiving at a network device, route convergence measurements and traffic demand measurements from a plurality of routers; andcomputing network availability at the network device based on said route convergence measurements and said traffic demand measurements;wherein said route convergence measurements are associated with route computations at the routers and said traffic demand measurements comprise portions of a demand matrix associated with the routers.2. The method of wherein receiving said route convergence and traffic demand measurements comprises receiving said measurements at an application programming interface.3. The method of wherein said measurements are received for a specific location in the network.4. The method of wherein said measurements are received for a specified service.5. The method of further comprising identifying an interest in said measurements for a specific resource.6. The method of wherein computing network availability comprises computing end-to-end convergence for a flow from a source to a destination.7. The method of wherein computing network availability comprises computing a network wide availability for a specified period of time.8. The method of wherein the network availability is computed at a planning application.9. The method of wherein the network availability is used by a monitoring and troubleshooting application.10. The method of wherein the network availability is computed at an analytics application operable to process ...

Подробнее
17-10-2013 дата публикации

Providing application based monitoring and recovery for a hypervisor of an ha cluster

Номер: US20130275966A1
Принадлежит: International Business Machines Corp

An embodiment of the invention is directed to a method associated with a node comprising a hypervisor and guest VMs, each guest VM being managed by the hypervisor and disposed to run applications, the node being joined with other nodes to form an HA cluster. The method includes establishing an internal bidirectional communication channel between each guest VM and the hypervisor, and further includes sending commands and responses thereto through the channel, wherein respective commands manage a specified application running on the given guest VM. The messages are selectively monitored, to detect a failure condition associated with the specified application running on the given guest VM. Responsive to detecting a failure condition, action is taken to correct the failure condition, wherein the action includes sending at least one command through the internal channel from the hypervisor to the given guest VM.

Подробнее
31-10-2013 дата публикации

METHOD AND SYSTEM FOR FACILITATING NON-INTERRUPTIVE TRANSACTIONS

Номер: US20130290407A1
Принадлежит: INFOSYS LIMITED

A system, method and computer program product for facilitating non-interruptive transactions is provided, wherein the transactions are initiated at one or more transaction channels. The system comprises one or more transaction processing servers configured to perform transactions initiated at the transaction channels, each transaction processing server comprising predetermined logic for performing the initiated transactions. The system further comprises one or more monitors configured to monitor the availability of the transaction processing servers and forward the availability information to an integration module. The integration module is configured to forward the transactions initiated at the transaction channels to at least one transaction processing server based on the received availability information and predetermined criteria for forwarding transactions for processing to the transaction processing servers. 1. A system for facilitating non-interruptive transactions , the transactions being initiated at one or more transaction channels , the system comprising:one or more transaction processing servers configured to perform transactions initiated at the transaction channels, each transaction processing server comprising predetermined logic for performing the initiated transactions;one or more monitors configured to monitor the availability of the transaction processing servers and forward the availability information to an integration module; andthe integration module configured to forward the transactions initiated at the transaction channels to at least one transaction processing server based on the received availability information and predetermined criteria for forwarding transactions for processing to the transaction processing servers.2. The system of further comprising an input module configured to collect inputs pertaining to initiation of transactions at the transaction channels of at least one branch claim 1 , the input module comprising: render an ...

Подробнее
31-10-2013 дата публикации

Computer system and computer system information storage method

Номер: US20130290651A1
Принадлежит: HITACHI LTD

If simultaneous replacement main system and standby system of a management module was necessary due to a failure, fault or other problem in a structure containing redundant management modules, then the management information retained in the management module will be lost. A computer system contains an external storage device that is outside the manager module. This external storage device stores the same information as the management information held by the main system management module, and after replacing the management modules the management information held in the external storage device is restored in the management module. A switch is further included between the external storage device and the management module, and controlling this switch from the management module allows the plurality of management modules to exclusively access the external memory device.

Подробнее
31-10-2013 дата публикации

Redundant Automation System and Method for Operating the Redundant Automation System

Номер: US20130290776A1
Принадлежит: SIEMENS AG

A redundant automation system and a method for operating the redundant automation system which is provided with a first subsystem and a second subsystem that each process a control program while controlling a technical process, one of these subsystems operating as a master and the other subsystem operating as a slave, and the slave assuming the function of the master if the master fails such that it becomes possible to dispense with temporally synchronous communication between the participants with regard to the synchronization of the program processing in the two subsystems, thus reducing the communication load.

Подробнее
14-11-2013 дата публикации

Programmable Presence Proxy for Determining a Presence Status of a User

Номер: US20130304913A1
Принадлежит:

A method and apparatus are provided that evaluate a number of different sources of presence information to determine a presence status of a user. The presence status of a user is determined by obtaining presence information from a plurality of presence data stores; translating the obtained presence information from at least one of the presence data stores into a standard format; and determining the presence status of the user based on the obtained presence information. Presence information can also be based on user-specified rules. Presence information is obtained from a number of presence data stores and the presence status of a user is determined based on one or more rules that are applied to the obtained presence information. The rules may include, for example, aggregation rules that determines the presence status based on one or more of the obtained presence information or filter rules that determine who may receive the presence status. 1obtaining presence information from a plurality of presence data stores, wherein the presence information provides a clue as to a presence status of a user;translating the presence information into a standard format, yielding translated presence information; anddetermining the presence status based on the translated presence information.. A method comprising: This application is a division of U.S. patent application Ser. No. 12/212,241, filed Sep. 17, 2008, which is a continuation of U.S. patent application Ser. No. 10/672,635, filed Sep. 26, 2003, now abandoned, the content of which are incorporated by reference herein in their entirety.The present application is related to U.S. patent application entitled “Method and Apparatus for Delivering an Electronic Mail Message With an Indication of a Presence Status of a Sender,” (Attorney Docket Number 502063) and U.S. patent application entitled “Method and Apparatus for Delivering a Voice Mail Message With an Indication of a Presence Status of a Sender,” (Attorney Docket Number ...

Подробнее
14-11-2013 дата публикации

APPARATUS AND METHOD FOR TRANSMITTING LIVE MEDIA CONTENT

Номер: US20130304916A1
Автор: Hodapp James Michael
Принадлежит: THOMSON LICENSING

The present invention is directed to a method and an apparatus for sending live streams to regular HTTP clients. An incoming live media stream is segmented into segment files. A segment list is used to maintain the logical representation of the segment segment files so that they look like one continuous file. Each segment file is sent to the client through regular HTTP protocol once it is available. Old segment files can be deleted to save storage space and reduce management overhead. 1. An apparatus for sending a live stream to an HTTP client , the apparatus comprising:a segmenter for segmenting incoming content of said live stream into segment files;a controller for sending said segment files to said HTTP client when at least one of said segment files is available.2. The apparatus of claim 1 , wherein said controller maintains a segment list which maps said segment files into a virtual file.3. The apparatus of claim 1 , further comprising:an event monitor for monitoring said segment files for their availability.4. The apparatus of claim 3 , further comprising:a storage device for storing said segment files wherein said event monitor monitors said segment files by monitoring said storage device.5. The apparatus of claim 4 , further comprising:a segment remover for removing at least one of said segment files from said storage device.6. The apparatus of claim 5 , wherein the segment remover removes an old segment file from said storage device if a total length of said segment files exceeds a threshold.7. The apparatus of claim 1 , wherein said controller sends said segment files through HTTP chunked transfer encoding.8. The apparatus of claim 1 , wherein a chunk in said HTTP chunked transfer encoding comprises content from at least one of said segment files.9. The apparatus of claim 1 , wherein each of said segment files comprises at least one sub-segment and said segmenter generates said each of segment files by generating said at least one sub-segment.10. The ...

Подробнее
14-11-2013 дата публикации

NETWORK TRAFFIC ROUTING

Номер: US20130305085A1
Принадлежит:

A service appliance is installed between production servers running service applications and service users. The production servers and their service applications provide services to the service users. In the event that a production server is unable to provide its service to users, the service appliance can transparently intervene to maintain service availability. To maintain transparency to service users and service applications, service users are located on a first network and production servers are located on a second network. The service appliance assumes the addresses of the service users on the second network and the addresses of the production servers on the first network. Thus, the service appliance obtains all network traffic sent between the production server and service users. While the service application is operating correctly, the service appliance forwards network traffic between the two networks using various network layers. 1. Apparatus comprising a storage medium storing a program for maintaining availability of a first service on a first server to plural client systems via a network , the instructions of the program for:synchronizing a second service provided by a second server with the first service provided by the first server;monitoring availability of the first service;if the first service is unavailable, causing the second service to be substituted in place of the first service and monitoring a third service;if the third service is available and capable of handling access by client systems, causing the third service to synchronize with the second service;monitoring synchronization of the third service with the second service;if the third service is synchronized with the second service, causing the third service to be substituted in place of the second service, such that the third service is responsive to communications from the client systems directed to the first service.2. The apparatus of further comprising the second server claim 1 , the ...

Подробнее
05-12-2013 дата публикации

Failover of interrelated services on multiple devices

Номер: US20130326261A1
Автор: Eric Milo Paulson
Принадлежит: VERIZON PATENT AND LICENSING INC

A device may include a network interface for communicating with a failover device, a memory for instructions, and a processor for executing the instructions. The processor may execute the instructions to communicate with the failover device, via the network interface, to fail over the device to the failover device in a cluster by pushing a process on the device to the failover device when a first failover event occurs. The failover device is configured to fail over the device to the failover device by pulling the process on the device on the second device when a second failover event occurs. The device is in the cluster.

Подробнее
05-12-2013 дата публикации

Systems and methods for disaster recovery of multi-tier applications

Номер: US20130326265A1
Принадлежит: Symantec Corp

A computer-implemented method for disaster recovery of multi-tier applications may include 1) identifying a multi-tier application that is provisioned with a plurality of production clusters at a production site, 2) identifying a disaster recovery site including a plurality of recovery clusters, 3) identifying, at the disaster recovery site, a failure of the multi-tier application at the production site, and 4) initiating, from the disaster recovery site, a migration of the multi-tier application from the production site to the disaster recovery site. Various other methods, systems, and computer-readable media are also disclosed.

Подробнее
19-12-2013 дата публикации

Processor management method

Номер: US20130339632A1
Принадлежит: Fujitsu Ltd

A processor management method includes setting a master mechanism in a given processor among multiple processors, where the master mechanism manages the processors; setting a local master mechanism and a virtual master mechanism in each of processors other than the given processor among the processors, where the local master mechanism and the virtual master mechanism manage each of the processors; and notifying by the master mechanism, the processors of an offset value of an address to allow a shared memory managed by the master mechanism to be accessed as a continuous memory by the processors.

Подробнее
19-12-2013 дата публикации

Recovery of a System for Policy Control and Charging, Said System Having a Redundancy of Policy and Charging Rules Function

Номер: US20130339783A1
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

A first Policy and Charging Rules Function “PCRF” server for recovery of a Policy and Charging Control “PCC” system. The PCC system also has a second PCRF server previously in charge of controlling an Internet Protocol Connectivity Access Network “IP-CAN” session previously established with a UE, and a PCRF-client. The first PCRF server includes a network interface unit of the first PCRF server arranged for receiving a modification request of the IP-CAN session from the PCRF-client after failure of the second PCRF server which was in active mode. The first PCRF server has a PCRF identifier which is shared with the second PCRF server that has failed. The first PCRF server now in active mode. The modification request requesting new rules for the IP-CAN session, including modification data and excluding access data and supported features for the IP-CAN session. The first PCRF server includes a processing unit of the first PCRF server arranged for determining that the IP-CAN session is unknown, and arranged for submitting a request from the network interface unit of the first PCRF server to the PCRF-client to provide all information that the PCRF-client has regarding the IP-CAN session. The information includes all data required to be sent for the IP-CAN session establishment and synchronization data. A Policy and Charging Rules Function “PCRF”-client for recovery of a Policy and Charging Control “PCC” system. Methods for recovery of a Policy and Charging Control “PCC” system with a first Policy and Charging Rules Function “PCRF” server in standby mode, a second PCRF server in active mode, and a PCRF-client, wherein an IP-CAN session is already established with a UE and controlled by the second PCRF server. A computer program embodied on a computer readable medium for recovery of a Policy and Charging Control “PCC” system. 121.-. (canceled)22. A method for recovery of a Policy and Charging Control (PCC) system with a first Policy and Charging Rules Function (PCRF) ...

Подробнее
19-12-2013 дата публикации

Node

Номер: US20130339981A1

To facilitate changing a system configuration and allow having high redundancy in a computer system connecting a plurality of nodes. A node includes a CPU and constitutes a computer system. The node executes one or more processes and including predetermined functions. The node includes a shared memory that stores system information including process information related to each process executed by each node, in a state accessible from each process of its own node. In the node, the system information including the process information related to each process of its own node is multicast to the other nodes. A shared memory control process of the node receives the system information multicast from the other nodes and stores the system information in the shared memory.

Подробнее
06-02-2014 дата публикации

Mobile hadoop clusters

Номер: US20140040575A1
Автор: Gustav Horn
Принадлежит: NetApp Inc

Techniques for mobile clusters for collecting telemetry data and processing analytic tasks, are disclosed herein. The mobile cluster includes a processor, a plurality of data nodes and an analysis module. The data nodes receive and store a snapshot of at least a portion of data stored in a main Hadoop storage cluster and real-time acquired data received from a data capturing device. The analysis module is operatively coupled to the processor to process analytic tasks based on the snapshot and the real-time acquired data when the storage cluster is not connected to the main storage cluster.

Подробнее
13-02-2014 дата публикации

SYNCHRONOUS LOCAL AND CROSS-SITE FAILOVER IN CLUSTERED STORAGE SYSTEMS

Номер: US20140047263A1
Принадлежит:

Synchronous local and cross-site switchover and switchback operations of a node in a disaster recovery (DR) group are described. In one embodiment, during switchover, a takeover node receives a failover request and responsively identifies a first partner node in a first cluster and a second partner node in a second cluster. The first partner node and the takeover node form a first high-availability (HA) group and the second partner node and a third partner node in the second cluster form a second HA group. The first and second HA groups form the DR group and share a storage fabric. The takeover node synchronously restores client access requests associated with a failed partner node at the takeover node. 1. A method comprising:receiving, by a takeover node in a first cluster at a first site of a cross-site clustered storage system, a failover request;processing, by the takeover node, the failover request to identify a first partner node in the first cluster and a second partner node in a second cluster at a second site, the first partner node and the takeover node forming a first high-availability (HA) group, the second partner node and a third partner node in the second cluster forming a second HA group, the first HA group and the second HA group forming a disaster recovery (DR) group and sharing a storage fabric with each other; andresuming, by the takeover node, client access requests associated with a failed partner node synchronously at the takeover node.2. The method of claim 1 , further comprising:synchronously replicating, by the takeover node, cache data associated with the takeover node to the first partner node at the first site and the second partner node at the second site during non-failover conditions, wherein the first site and the second site are geographically remote with respect to each other.3. The method of claim 2 , wherein synchronously replicating the cache data comprises synchronously replicating claim 2 , by the takeover node claim 2 , the ...

Подробнее
20-02-2014 дата публикации

Virtual machine fault tolerance

Номер: US20140053022A1
Принадлежит: NetApp Inc

One or more techniques and/or systems are provided for hosting a virtual machine from a snapshot. In particular, a snapshot of a virtual machine hosted on a primary computing device may be created. The virtual machine may be hosted on a secondary computing device using the snapshot, for example, when a failure of the virtual machine on the primary computing device occurs. If a virtual machine type (format) of the snapshot is not supported by the secondary computing device, then the virtual machine within the snapshot may be converted to a virtual machine type supported by the secondary computing device. In this way, the virtual machine may be operable and/or accessible on the secondary computing device despite the failure. Hosting the virtual machine on the secondary computing device provides, among other things, fault tolerance for the virtual machine and/or applications comprised therein.

Подробнее
06-03-2014 дата публикации

METHODS AND APPARATUS FOR DETECTING AND FILTERING FORCED TRAFFIC DATA FROM NETWORK DATA

Номер: US20140068061A1
Принадлежит:

A non-transitory processor-readable medium is provided that stores code representing instructions to be executed by a processor to filter data associated with an entity for a first predefined time period in response to an access by the entity at a first time to a preselected network location from a plurality of preselected network locations. The plurality of preselected network locations are associated with forced web traffic patterns. The processor is also caused to filter data associated with the entity for a second predefined time period in response to an access by the entity at a second time to a preselected network location from the plurality of preselected network locations during the first predefined time period. The second time is after the first time. 1. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor , the code comprising code to cause the processor to:filter data associated with an entity for a first predefined time period in response to an access by the entity at a first time to a preselected network location from a plurality of preselected network locations, the plurality of preselected network locations being associated with forced web traffic patterns;if the entity accesses at a second time a preselected network location from the plurality of preselected network locations before an end of the first predefined time period, then filter data associated with the entity for a second predefined time period, an end of the second predefined time period being after the end of the first predefined time period; andif the entity does not access at the second time the preselected network location from the plurality of presented networks locations before the end of the first predefined time period, then discontinue filtering data associated with the entity at the end of the first predefined time period.2. The non-transitory processor-readable medium of claim 1 , the code to filter data associated with ...

Подробнее
06-03-2014 дата публикации

Task execution & management in a clustered computing environment

Номер: US20140068620A1
Принадлежит: International Business Machines Corp

Machines, systems and methods for task management in a computer implemented system. The method comprises registering a task with brokers residing on one or more nodes to manage the execution of a task to completion, wherein a first broker is accompanied by a first set of worker threads co-located on the node on which the first broker is executed, wherein the first broker assigns responsibility of execution for the task to the one or more worker threads in the first set of co-located worker threads, wherein in response to a failure associated with a first worker thread in the first set, the first broker reassigns the responsibility of execution for the task to a second worker thread in the first set, wherein in response to a failure associated with the first broker, a second broker assigns responsibility of execution for the task to one or more co-located worker threads.

Подробнее
20-03-2014 дата публикации

Ingress Node Controlled Path Impairment Protocol

Номер: US20140078905A1
Автор: Dunbar Linda
Принадлежит: Futurewei Technologies, Inc.

An apparatus comprising a node configured to transmit operation, administration, and maintenance (OAM) connectivity frames, wherein the node adds an impairment notification indication to some, but not all of OAM connectivity frames transmitted by the node, wherein the impairment notification indication indicates the node's desire to receive notification of an impairment condition along the path. A network component comprising a receiver unit configured to receive multiprotocol label switching (MPLS) Ping frames, a circuit logic configured to add a downstream link impairment indication to responses to the MPLS-Ping frames, wherein the downstream link impairment indication comprises a type and a severity level for a path impairment condition, and a transmitter unit configured to transmit the responses to the transmitted MPLS-Ping frames. 1. An apparatus comprising:a plurality of ports;a memory; and transmit a plurality of operation, administration, and maintenance (OAM) connectivity frames along a plurality of paths via the ports;', 'add an impairment notification value to some of the OAM connectivity frames transmitted by the node;', 'add an optional routable address that identifies the node to some of the OAM connectivity frames transmitted by the node; and', 'receive an impairment notification response corresponding to a first path,, 'a processor coupled to the ports and the memory, wherein the memory includes instructions that when executed by the processor cause the apparatus to perform the followingwherein adding the impairment notification value and adding the optional routable address to at least one of the OAM connectivity frames indicates the node is configured to receive notification of an impairment condition along the first path, andwherein the impairment notification response is sent by an intermediate node along the first path before congestion occurs on the first path.2. The apparatus of claim 1 , wherein the impairment notification value identifies a ...

Подробнее
20-03-2014 дата публикации

Fault tolerant system and method for performing fault tolerant

Номер: US20140082408A1
Принадлежит: Yokogawa Electric Corp

A primary virtual machine is formed on a primary machine in which a primary hypervisor runs, and inputs virtual interrupt based on an external interrupt from the primary hypervisor to a primary guest OS. A secondary virtual machine is formed on a secondary machine in which a secondary hypervisor runs, and inputs the virtual interrupt to a secondary guest OS on the basis of timing information on the virtual interrupt transmitted from the primary virtual machine. When inputting the virtual interrupt to the primary guest OS, the primary virtual machine suspends the primary guest OS, and determines whether the suspended position is in a critical section. If the suspended position is not in the critical section, the primary virtual machine inputs the virtual interrupt at the suspended position. If the suspended position is in the critical section, the primary virtual machine changes the suspended position, and again performs the determination.

Подробнее
27-03-2014 дата публикации

High availability for cloud-based services

Номер: US20140089488A1
Принадлежит: RingCentral Inc

High availability mechanisms are described for cloud-based services such as voice-over-IP (VoIP) services.

Подробнее
27-03-2014 дата публикации

THREAD SPARING BETWEEN CORES IN A MULTI-THREADED PROCESSOR

Номер: US20140089732A1

Embodiments relate to thread sparing between cores in a processor. An aspect includes determining that a number of recovery attempts made by a first thread on the first core has exceeded a recovery attempt threshold, and sending a request to transfer the first thread. Another aspect includes, selecting a second core from a plurality of cores to receive the first thread from the first core, wherein the second core is selected based on the second core having an idle thread. Another aspect includes transferring a last good architected state of the first thread from the first core to the second core. Another aspect includes loading the last good architected state of the first thread by the idle thread on the second core. Yet another aspect includes resuming execution of the first thread on the second core from the last good architected state of the first thread by the idle thread. 1. A computer implemented method for thread sparing between cores in a processor , the method comprising:determining, by a first core of the processor, that a number of recovery attempts made by a first thread on the first core has exceeded a recovery attempt threshold;sending, by the first core to a processor controller in the processor, a request to transfer the first thread to another core of the processor;based on receiving the request, selecting, by the processor controller, a second core from a plurality of cores of the processor to receive the first thread from the first core, wherein the second core is selected based on the second core having an idle thread;transferring a last good architected state of the first thread from an error recovery logic of the first core to the second core;loading the last good architected state of the first thread by the idle thread on the second core; andresuming execution of the first thread on the second core from the last good architected state of the first thread by the idle thread.2. The method of claim 1 , wherein the recovery attempts made by the ...

Подробнее
01-01-2015 дата публикации

COEXISTENCE OF A NORMAL-RATE PHYSICAL LAYER AND A LOW-RATE PHYSICAL LAYER IN A WIRELESS NETWORK

Номер: US20150003276A1
Автор: Liu Yong
Принадлежит:

A network device including a receiver and a processor. The receiver is configured to communicate at a first data rate via a channel and receive a first packet at the first data rate via the channel. The processor is configured to, in response to the receiver receiving a second packet at a second data rate via the channel, (i) detect a portion of the second packet, and (ii) determine that the channel is busy in response to detecting the portion of the second packet. The second data rate is different than the first data rate. 1. A network device comprising: communicate at a first data rate via a channel, and', 'receive a first packet at the first data rate via the channel; and, 'a receiver configured to'} detect a portion of the second packet, and', 'determine that the channel is busy in response to detecting the portion of the second packet,', 'wherein the second data rate is different than the first data rate., 'a processor configured to, in response to the receiver receiving a second packet at a second data rate via the channel,'}2. The network device of claim 1 , wherein the receiver is configured to:detect an energy level of the second packet; anddetermine that the channel is busy in response to the energy level being greater than or equal to a predetermined threshold.3. The network device of claim 1 , wherein:the first packet includes, in a first preamble, a first training field having a first periodicity;the second packet includes, in a second preamble, a second training field having a second periodicity;the second periodicity is different than the first periodicity; andthe portion of the second packet includes the second training field in the second preamble.4. The network device of claim 3 , wherein:the second data rate is less than the first data rate; andthe second periodicity is less than the first periodicity.5. The network device of claim 3 , wherein each of the first training field and the second training field activates the processor to process (i) the ...

Подробнее
05-01-2017 дата публикации

MANAGING BACKUP OPERATIONS FROM A CLIENT SYSTEM TO A PRIMARY SERVER AND SECONDARY SERVER

Номер: US20170004058A1
Принадлежит:

Provided are techniques for managing backup operations from a client system to a primary server and secondary server. A determination is made at the client system of whether a state of the data on the secondary server permits a backup operation in response to determining that the primary server is unavailable when a force failover parameter is not set. The client system reattempts to connect to the primary server to perform the backup operation at the primary server in response to determining that the state of the data on the secondary server does not permit the backup operation. The client system performs the backup operation at the secondary server in response to determining that the state of the secondary server permits the backup operation. 121-. (canceled)22. A computer program product for replicating client data from a client system between a primary server and a secondary server , wherein the computer program product comprises at least one computer readable storage medium including a client program embodied therewith , wherein the client program is executable by a processor to cause operations , the operations comprising:determining, by the client program, whether a state of data on the secondary server permits a backup operation in response to determining that the primary server is unavailable;determining whether a failover delay timer has expired in response to determining that the state of the data on the secondary server permits the backup operation; andattempting, by the client program, to connect to the primary server to perform the backup operation at the primary server in response to determining that failover delay timer has not expired.23. The computer program product of claim 22 , wherein the operations further comprise:performing, by the client program, the backup operation at the secondary server in response to determining that the failover delay timer has expired.24. The computer program product of claim 22 , wherein the operations further ...

Подробнее
07-01-2016 дата публикации

FAULT TOLERANT COMMUNICATIONS

Номер: US20160004609A1
Автор: Knight Richard
Принадлежит:

Apparatuses, systems and methods are disclosed for tolerating fault in a communications grid. Specifically, various techniques and systems are provided for detecting a fault or failure by a node in a network of computer nodes in a communications grid, adjusting the grid to avoid grid failure, and taking action based on the failure. In an example, a system may include receiving grid status information at a backup control node, the grid status information including a project status, storing the grid status information within the backup control node, receiving a failure communication including an indication that a primary control node has failed, designating the backup control node as a new primary control node, receiving updated grid status information based on the indication that the primary control node has failed, and transmitting a set of instructions based on the updated grid status information. 1. A computer-program product tangibly embodied in a non-transitory machine-readable storage medium , including instructions configured to cause a data processing apparatus to:transmit, from a primary control node connected to one or more worker nodes on a communications grid, worker instructions related to a project being executed by the one or more worker nodes;generate a snapshot of the communications grid, wherein the snapshot of the communications grid includes a project status of each of the one or more worker nodes, wherein a project status of a worker node includes a status of a portion of the project being executed by the worker node in the communications grid;determine that a failed worker node of the one or more worker nodes has failed, wherein the one or more worker nodes has failed at a failure time;identify a project status of the failed worker node using the snapshot of the communications grid, wherein the project status of the failed worker node includes a status of a portion of the project being executed by the failed worker node at the failure time; ...

Подробнее
13-01-2022 дата публикации

INDEXING BACKUP DATA GENERATED IN BACKUP OPERATIONS

Номер: US20220012135A1
Принадлежит:

In certain embodiments, a tiered storage system is disclosed that provides for failover protection during data backup operations. The system can provide for an index, or catalog, for identifying and enabling restoration of backup data located on a storage device. The system further maintains a set of transaction logs generated by media agent modules that identify metadata with respect to individual data chunks of a backup file on the storage device. A copy of the catalog and transaction logs can be stored at a location accessible by each of the media agent modules. In this manner, in case of a failure of one media agent module during backup, the transaction logs and existing catalog can be used by a second media agent module to resume the backup operation without requiring a restart of the backup process. 1. A non-transitory computer-readable medium that stores instructions which , when executed by a first computing device comprising one or more hardware processors , cause the first computing device to: [ (a) first backup data generated by the second computing device, wherein the first backup data comprises a plurality of data chunks, and', '(b) storage of the first backup data as the plurality of data chunks in one or more second storage devices that are communicatively coupled to the second computing device,, 'wherein the one or more first transaction logs are based on one or more of, 'wherein once a given data chunk from the plurality of data chunks is stored in the one or more second storage devices, the second computing device transmits a corresponding transaction log to the first computing device, and', 'wherein the second computing device comprises one or more hardware processors;, 'receive from a second computing device one or more first transaction logs,'}after the first backup data is generated, apply the one or more first transaction logs to an index; andwherein the index is configured to enable restoring backup data generated by at least the second ...

Подробнее
01-01-2015 дата публикации

DEVICE-TO-DEVICE BASED CONTENT DELIVERY FOR TIME-CONSTRAINED COMMUNICATIONS

Номер: US20150006739A1
Принадлежит:

A method for operating a server includes receiving, at the server, a request from a mobile device identifying a data file and retrieving the data file from a remote storage device in response to receiving the request. A party other than a party that operates the server operates the remote storage device. A number of collaborator devices are identified. Each of the number of collaborator devices is capable of establishing a mobile-to-mobile communications link with the mobile device. Respective portions of the data file are allocated to each of the number of collaborator devices based on at least one of (a) throughputs associated with the number of collaborator devices and (b) potential debits charged by the number of collaborator devices. Respective portions of the data file are transmitted to each of the number of collaborator devices according to the allocation. 1. A mobile device comprising:a processor; and receive a first request to download a data file;', 'determine a time constraint associated with the download of the data file;', 'in response to a determination that a bandwidth of the mobile device is insufficient for the download of the data file within the time constraint, transmit a second request to one or more potential collaborator devices;', 'assign a respective portion of the data file to each of a number of collaborator devices selected from the one or more potential collaborator devices;', 'receive the assigned respective portions of the data file from each of the number of collaborator devices; and', 'store the assigned portions of the data file in the memory., 'a memory storing computer executable instructions, which, when executed by the processor, cause the mobile device to2. The mobile device of claim 1 , wherein the number of collaborator devices comprises at least one stationary hotspot device.3. The mobile device of claim 1 , wherein the first request comprises a request for an identity and a bandwidth availability of a potential ...

Подробнее
14-01-2016 дата публикации

Run-To-Completion Thread Model for Software Bypass Fail Open for an Inline Intrusion Protection System

Номер: US20160011948A1
Автор: Macdonald Stuart John
Принадлежит:

A processing-based bypass “fail open” mode is provided for an intrusion prevention system by a primary process running on a first logical core (lcore) is used as a control plane, which invokes bypass-open run-to-completion threads in other lcores comprising a bypass data plane, and which spawns a secondary process to fully configure intrusion prevention threads on other lcores to create an Intrusion Prevention System data plane. Upon a ready signal from the secondary process, the primary process quiesces such that the secondary process IPS data plane exclusively owns and executes on the other lcores. 1. A method of providing a bypass fail open mode for an inline intrusion prevention system comprising the steps of: configuring one or more logical core pools, two or more network ports, and a bypass option;', 'starting one or more bypass threads on at least one logical core separate from the first single logical core, wherein the bypass threads provide a fail-open communications processing between the network ports; and', 'spawning a secondary process;, 'executing by one or more processors a primary process utilizing a first single logical core as a control plane, the primary process;'} opening an interprocess communication channel by a secondary process control plane with the primary control plane;', 'initializing and invoking by the secondary process one or more intrusion prevention threads comprising an intrusion prevention system data plane, wherein the one or more intrusion prevention threads are executed by one or more logical cores separate from the first logical core to process frames between the network ports; and', 'notifying the primary process by the secondary process via the interprocess communication channel of readiness of the intrusion detection threads; and, 'while the primary process owns and performs frame processing using one or more bypass data plane threadsresponsive to receiving the notification, the primary process relinquishing ownership of the ...

Подробнее
10-01-2019 дата публикации

Technique For Higher Availability In A Multi-Node System

Номер: US20190012244A1
Принадлежит:

Techniques are described herein for quick identification of a set of units of data for which recovery operations are to be performed to redo or undo changes made by the failed node. When a lock is requested by an instance, lock information for the lock request is replicated by another instance. If the instance fails, the other instance may use the replicated lock information to determine a set of data blocks for recovery operations. The set of data blocks is available in memory of a recovery instance when a given node fails, and does not have to be completely generated by scanning a redo log. 1. A method comprising:generating, at a first node of a multi-node database system, a plurality of lock requests; storing, in a redo log associated with the first node, changes to a target data block and a change number associated with the changes;', 'receiving, at a second node of the multi-node database system, a request to replicate lock information for the lock request; and', 'storing, in a memory of the second node, the change number and a location of the target data block., 'for each lock request of the plurality of lock requests2. The method of wherein only the second node is assigned to replicate lock information for the first node.3. The method of wherein a plurality of nodes are assigned to replicate lock information for the first node claim 1 , and the plurality of nodes includes the second node.4. The method of further comprising sending the request to replicate lock information asynchronously to the second node.5. The method of further comprising:in response to a failure of the first node, sending a recovery request to the second node;determining at the second node, based on replicated lock information, a set of one or more data blocks to recover, wherein said replicated lock information includes replicated lock information for a plurality of lock requests.6. The method of claim 5 , wherein determining the set of one or more data blocks comprises:determining a ...

Подробнее
19-01-2017 дата публикации

DETECTING HIGH AVAILABILITY READINESS OF A DISTRIBUTED COMPUTING SYSTEM

Номер: US20170017535A1
Принадлежит:

Technology is disclosed for determining high availability readiness of a distributed computing system (“system”). A confidence measure (CM) can be computed for a particular controller in the system to determine whether a takeover by the particular controller from a first controller would be successful. The CM can be a percentage value. A CM of 0% indicates that a takeover would be a failure, which results in loss of access to data managed by the first controller. A CM of 100% indicates a successful takeover with no performance impact on the system. A CM between 0% and 100% indicates a successful takeover but with a performance impact. The CM can be computed based on events occurring in the system, e.g., veto and non-veto events. The CM is computed as a function of various weights and/or indices associated with the veto events and/or non-veto events. 1. A method , comprising:receiving, by a computing device, a list of historical events related to a high availability pair comprising a first node and a second node of a distributed computing system;determining, by the computing device, a set of non-veto events and a set of veto events related to at least one of the nodes from the list of historical events;obtaining by the computing device, a severity index and a compliance factor for each event of the set of non-veto events; andgenerating and outputting, by the computing device, a confidence measure for the at least one of the nodes based on the set of veto events, the severity index, and the compliance factor.2. The computer-implemented method of claim 1 , wherein the confidence measure indicates a magnitude of an impact on a performance of the distributed computing system if the at least one of the nodes takes over from another one of the nodes.3. The computer-implemented method of claim 1 , wherein the severity index of an event of the set of non-veto events indicates a magnitude of performance impact on the distributed computing system due to the occurrence of the ...

Подробнее
15-01-2015 дата публикации

INFORMATION PROCESSING SYSTEM, TROUBLE DETECTING METHOD, AND INFORMATION PROCESSING APPARATUS

Номер: US20150019671A1
Принадлежит: FUJITSU LIMITED

A first information processing apparatus includes a first input/output unit that is capable of communicating with a second information processing apparatus for monitoring the first information processing apparatus and transmits a notification signal transmitted from a first input/output device to the second information processing apparatus even when no notification from an operating system that is operated by a processor is obtained. The second information processing apparatus includes a second input/output unit and a trouble detector that detects generation of a trouble on a network when the second input/output device does not receive the notification signal from the first input/output device. 1. An information processing system comprising:a first information processing apparatus; anda second information processing apparatus that monitors the first information processing apparatus, a first input/output device;', 'a processor which executes an operating system and', 'a first input/output unit that is capable of communicating with the second information processing apparatus and transmits a notification signal transmitted from the first input/output device to the second information processing apparatus even when no notification from the operating system is obtained, and, 'the first information processing apparatus including a second input/output device; and', 'a trouble detector that detects occurrence of a trouble on the network when the second input/output device does not receive the notification signal from the first input/output device., 'the second information processing apparatus including2. The information processing system according to claim 1 , whereinthe first input/output unit includes a generator that generates status information of the operating system based on the notification from the operating system, andthe first input/output unit transmits the notification signal including the status information generated by the generator to the second information ...

Подробнее
15-01-2015 дата публикации

Tolerating failures using concurrency in a cluster

Номер: US20150019900A1
Принадлежит: International Business Machines Corp

A system, and computer program product for tolerating failures using concurrency in a cluster are provided in the illustrative embodiments. A failure is detected in a first computing node serving an application in a cluster. A subset of actions is selected from a set of actions, the set of actions configured to transfer the serving of the application from the first computing node to a second computing node in the cluster. A waiting period is set for the first computing node. The first computing node is allowed to continue serving the application during the waiting period. During the waiting period, concurrently with the first computing node serving the application, the subset of actions is performed at the second computing node. Responsive to receiving a signal of activity from the first computing node during the waiting period, the concurrent operation of the second computing node is aborted.

Подробнее
18-01-2018 дата публикации

APPARATUS, SYSTEM AND METHOD FOR PROXY COUPLING MANAGEMENT

Номер: US20180018199A1
Принадлежит:

An apparatus, system, and method are disclosed for proxy coupling management. A proxy template module transparently offloads a task from a native data processing system to an equivalent task on a remote data processing system. A proxy generation module fills in the proxy template with information, such as specification of an offload task that is a remote equivalent of the native task, to generate a proxy of the native task. An offload agent module receives a request from the proxy to perform the offload task on the remote data processing system. 1. An apparatus comprising:a proxy template module that is configured to transparently offload a task from a native data processing system to an equivalent task on a remote data processing system;a proxy generation module that fills in the proxy template with information for a selected native task so as to generate a proxy of the native task, wherein the information comprises a specification of an offload task that is a remote equivalent of the native task; andan offload agent module that receives a request from the proxy to perform the offload task on the remote data processing systemwherein the proxy template module, the proxy generation module, and the offload agent module comprise one or more of logic hardware and executable code, the executable code stored on one or more non-transitory computer-readable media.2. The apparatus of claim 1 , wherein the proxy template module is configured to monitor the offload agent claim 1 , cancel the request to the offload agent claim 1 , and initiate a failback to revert to the native task.3. The apparatus of claim 1 , wherein the information filled in by the proxy generation module further comprises specification of input and output data needed by the native task.4. The apparatus of claim 1 , wherein the information filled in by the proxy generation module further comprises specification of an alias of the native task to be invoked for purposes of automatic failback in the event of ...

Подробнее
17-01-2019 дата публикации

SIMPLIFIED PROCESSOR SPARING

Номер: US20190018744A1
Принадлежит:

In a multi-core computer system, a method for dealing with a fault with a core includes detecting a fault in one of the cores. Information is transferred from a recovery buffer to a mapper. The information includes logical register mapping information. A recovery is performed using the information in the mapper. If a recovery cannot proceed, a sparing can be initiated using the information in the mapper. 1. A method comprising:detecting a fault in a first core in a multi-core computer system;based at least in part on the detecting, transferring information from a recovery buffer to a mapper, wherein the information includes logical register mapping information;after transferring the information from the recovery buffer to the mapper, determining if a recovery reset will proceed;upon determining that the recovery reset will not proceed, selecting a spare core; andperforming a sparing using the information in the mapper.2. The method of wherein performing the sparing comprises:loading the information in the mapper to the spare core; andlogically replacing the first core with the spare core.3. The method of wherein determining that the recovery reset cannot proceed comprises detecting a previous recovery reset attempt failed.4. The method of wherein determining that the recovery reset cannot proceed comprises detecting a failure to restore the recovery buffer.5. The method of further comprising stopping execution of threads in the first core.6. The method of further comprising stopping any updates to the mapper and the recovery buffer.7. The method of further comprising:upon determining that recovery reset will proceed, performing a recovery of the first core using the information in the mapper.8. A system comprising:a plurality of processing cores; wherein: detect a fault in a first core;', 'after transferring information from a recovery buffer to a mapper, determining if a recovery reset will proceed, wherein the information includes logical register mapping ...

Подробнее
17-01-2019 дата публикации

Method for Dirty-Page Tracking and Full Memory Mirroring Redundancy in a Fault-Tolerant Server

Номер: US20190018746A1
Принадлежит: Stratus Technologies Bermuda Ltd.

A method of transferring memory from an active to a standby memory in an FT Server system. The method includes the steps of: reserving a portion of memory using BIOS; loading and initializing an FT Kernel Mode Driver; loading and initializing an FT Virtual Machine Manager (FTVMM) including the Second Level Address Translation table SLAT into the reserved memory. In another embodiment, the method includes tracking memory accesses using the FTVMM's SLAT in Reserved Memory and tracking “L2” Guest memory accesses by tracking the current Guest's SLAT and intercepting the Hypervisor's writes to the SLAT. In yet another embodiment, the method includes entering Brownout by collecting the D-Bits; invalidating the processor's cached SLAT translation entries, and copying the dirtied pages from the active memory to memory in the second Subsystem. In one embodiment, the method includes entering Blackout and moving the final dirty pages from active to the mirror memory. 1. A method of transferring memory from an active to a standby memory in an FT (Fault Tolerant) Server system comprising the steps of:Reserving a portion of memory using BIOS of the FT Server system;Loading and initializing an FT Kernel Mode Driver into memory;Loading and initializing an FT virtual machine Manager (FTVMM) including the Second Level Address Table (SLAT) into the reserved portion of memory and synchronizing all processors in the FTVMM;Tracking the OS (Operating System), driver, software and Hypervisor memory accesses using the FTVMM's SLAT in Reserved Memory;Tracking Guest VM (Virtual Machine) memory accesses by tracking all pages of the SLAT associated with the guest and intercepting the Hypervisor writes to memory pages that constitute the SLAT;Entering Brownout—level 0, by executing a full memory copy while keeping track of the dirty bits (D-Bits) in the SLAT to track memory writes by all software in the FT Server;Clearing all of the D-Bits in the FTVMM SLAT and each Guest's current SLAT; ...

Подробнее
16-01-2020 дата публикации

STORAGE SYSTEM AND CONFIGURATION INFORMATION CONTROL METHOD

Номер: US20200019478A1
Принадлежит: Hitachi, Ltd.

Proposed is a scale-out-type storage system which implements high-availability, high-speed failover. In a scale-out-type storage system, two or more nodes each comprise a cluster controller, a node controller, a plurality of subcluster processes (subclusters and the like) which are processes which execute I/O processing in their own node, which form a subcluster between processes in their own node, and which are synchronized with work-type (active)/standby-type (passive) corresponding processes in the other nodes, and a nonvolatile data store (SODB). The configuration information of the storage system is held partitioned into global configuration information of the SODB and local configuration information and the like of the subclusters and the like, and thereupon the working-type subcluster is capable of executing I/O processing without accessing the SODB. 1. A scale-out-type storage system in which a cluster is constructed by linking a plurality of nodes , at least two or more nodes among the plurality of nodes each comprising:a cluster controller which controls processing spanning the whole cluster;a node controller which performs closed processing control on its own node;a plurality of subcluster processes which are processes which execute I/O processing in their own node, which form a subcluster between processes in their own node, and which are synchronized with work-type/standby-type corresponding processes in the other nodes; anda nonvolatile data store which is shared by the whole cluster,wherein the data store holds, as global configuration information, configuration information which includes information that must be shared by the whole cluster among the configuration information of the storage system,wherein the subcluster processes hold, as local configuration information, configuration information which is required for their own subcluster process to operate among the configuration information of the storage system, andwherein the work-type subcluster ...

Подробнее
03-02-2022 дата публикации

TECHNIQUES FOR DETERMINING BEAM FAILURE OR RADIO LINK FAILURE

Номер: US20220038933A1
Принадлежит:

Methods, systems, and devices for wireless communications are described. In some networks, a user equipment (UE) may perform radio link monitoring according to one or more radio link monitoring configurations. The UE may select a radio link monitoring configuration from a first radio link monitoring configuration associated with radio link monitoring over a duration that a hybrid automatic repeat request (HARQ) process is enabled and a second radio link monitoring configuration associated with radio link monitoring over a duration that the HARQ process is disabled. The UE may monitor reference signals using the selected radio link monitoring configuration, and may determine a radio link failure, a beam failure, or both has occurred based on monitoring the one or more reference signals using the selected radio link monitoring configuration. The UE may subsequently transmit a measurement report based on determining the radio link failure, the beam failure, or both. 1. A method for wireless communication at a user equipment (UE) , comprising:selecting a radio link monitoring configuration from a first radio link monitoring configuration associated with radio link monitoring over at least a duration that a hybrid automatic repeat request (HARQ) process is enabled and a second radio link monitoring configuration associated with radio link monitoring over at least a duration that the HARQ process is disabled;monitoring one or more reference signals using the selected radio link monitoring configuration;determining a radio link failure, a beam failure, or both has occurred based at least in part on monitoring the one or more reference signals using the selected radio link monitoring configuration; andtransmitting a measurement report based at least in part on determining the radio link failure, the beam failure, or both has occurred.2. The method of claim 1 , further comprising:determining a first block error rate (BLER) threshold and a second BLER threshold associated ...

Подробнее
17-01-2019 дата публикации

EMERGENCY NETWORK SERVICES BY AN ACCESS NETWORK COMPUTING NODE

Номер: US20190020558A1
Принадлежит:

In one embodiment, a method comprises detecting, by an access network computing node, a network service provided by a service provider for one or more identified endpoint devices via a wide area network connection, the access network computing node within an access network providing connections for the one or more identified endpoint devices to access the network service via the wide area network connection; detecting an unavailability of the network service via the wide area network connection; and supplying, by the access network computing node, at least a substitute of the network service for the one or more identified endpoint devices in response to the detected unavailability of the network service via the wide area network connection. 1. A method comprising:detecting, by an access network computing node within an access network, a network service provided by a service provider for one or more identified endpoint devices via a wide area network connection between the access network and a wide area network providing reachability to the service provider;providing, by the access network computing node, a link layer data connection for the one or more identified endpoint devices to access the network service via the access network and the wide area network connection;detecting, by the access network computing node, an unavailability of the network service to the access network via the wide area network connection, including detecting that the network service that was available to the access network via the wide area network connection is no longer available; andexecuting, by the access network computing node, at least a substitute of the network service for the one or more identified endpoint devices via the link layer data connection in response to the detected unavailablity of the network service to the access network via the wide area network connection.2. The method of claim 1 , wherein the detecting an unavailability of the network service includes determining ...

Подробнее
22-01-2015 дата публикации

WIRELESS COMMUNICATION DEVICE THAT IS CAPABLE OF IMPROVING DATA TRANSMISSION EFFICIENCY, ASSOCIATED NETWORK, AND METHOD

Номер: US20150023181A1
Принадлежит:

A wireless communication device includes a data transmission and reception section that wirelessly transmits a plurality of test packets; a signal sensing section that senses a power of a spatial radio wave signal on a frequency channel that is the same as the plurality of test packets and outputs sample data of the sensed spatial radio wave signal; a calculation processing section that converts the sample data into time series sample data; a collision detection section that calculates a packet collision rate based on the number of packet collisions and the number of the plurality of test packets if there is a packet collision due to interference of the plurality of test packets with another communication; and a control section that adjusts a parameter that the data transmission and reception section uses based on a calculation result of the collision detection section. 1. A wireless communication device , comprising:a data transmission and reception section that wirelessly transmits and receives packets and performs a statistical process for transmission and reception parameters that are associated with transmission and reception of the packets;a calculation processing section that calculates communication evaluation parameters including a busy rate that represents a ratio of a time for which it is determined that a channel, that is the same channel as its own device, is used to transmit and receive packets, a packet transmission success rate, and a standard deviation of the packet transmission success rates based on a result of the statistical process of said transmission and reception parameters calculated by said data transmission and reception section;a communication state categorization section that determines a communication state that represents an influence rate of interference with another communication based on said communication evaluation parameters calculated by said calculation processing section; anda control section that adjusts parameters that said ...

Подробнее
16-01-2020 дата публикации

METHOD AND APPARATUS FOR INCREASING RELIABILITY OF PACKET DELIVERY BY DYNAMIC PACKET CLONING AND ROUTE SELECTION

Номер: US20200021513A1
Принадлежит:

Various embodiments relate to a method for increasing the reliability of a packet delivery by using dynamic packet cloning on a source node and an intermediate node, the method comprising the steps of calculating an achieved reliability, calculating a calculated reliability using the achieved reliability, determining which of a plurality of first routes that have a reliability greater than the calculated reliability, selecting a first route from the determined first routes wherein the selected first route has the lowest reliability of the determined first routes, when there is at least one determined first routes, selecting a first route from the plurality of first routes wherein the selected first route has highest reliability of the plurality of first routes, when there are no determined first routes, updating a required reliability in the packet header to the reliability of the selected first route and sending the packet on the selected first route. 1. A method for increasing the reliability of a packet delivery by using dynamic packet cloning on a source node and an intermediate node , the method comprising the steps of:calculating an achieved reliability;calculating a calculated reliability using the achieved reliability;determining which of a plurality of first routes that have a reliability greater than the calculated reliability;selecting a first route from the determined first routes wherein the selected first route has the lowest reliability of the determined first routes, when there is at least one determined first routes;selecting a first route from the plurality of first routes wherein the selected first route has highest reliability of the plurality of first routes, when there are no determined first routes;updating a required reliability in the packet header to the reliability of the selected first route, andsending the packet on the selected first route.2. The method for increasing the reliability of a packet delivery by using dynamic packet cloning ...

Подробнее
17-04-2014 дата публикации

IDENTIFICATION OF SERVERS BY COMMON WIDE AREA NETWORK ADDRESSES

Номер: US20140108650A1
Автор: ASNIS Ilya
Принадлежит:

Systems, devices and methods are described to identify server nodes operating on a data network that are available to a client node. A registry server receives registration messages from each of the of server nodes and maintains a listing server nodes and their associated server addresses. When a request is received from a client, the registry server identifies server nodes having the same network address as the client, thereby indicating that the client and server nodes are likely to reside behind a common router or on a common local area network. A list of identified server nodes can then be forwarded to the client so that the client can establish connections as desired. These techniques may be used, for example, to establish video placeshifting connections between a placeshifting server device and a phone, tablet or other media client. 1. A method performed by a registry server to identify server nodes available to a client node from a plurality of server nodes operating on a data network , the method comprising:receiving registration messages at the registry server from each of the plurality of server nodes via the network, wherein each of the registration messages comprises a server address associated with the server node that identifies a location of the server node on the data network;maintaining, by the registry server, a listing of the plurality of server nodes that comprises the server address of each server node;receiving a request message from the client node, wherein the request message comprises a client address associated with the client node that identifies a location of the client node on the data network;identifying, by the registry server, which of the plurality of server nodes are associated with server addresses that are the same as the client address associated with the client node; andforwarding a list of those server nodes associated with the same address as the client node to the client node via the data network.2. The method of wherein the ...

Подробнее
28-01-2016 дата публикации

PATCH PROCESS ENSURING HIGH AVAILABILITY OF CLOUD APPLICATION

Номер: US20160026453A1
Принадлежит:

A cyclical patching process associated with a cloud application may be defined to ensure high availability (HA) of the cloud application in order to prevent impacting an availability to end users. A list of server identities corresponding to one or more servers of a datacenter hosting the cloud application may be accepted. HA metric values for each of the server identities may be determined in order to compute an overall HA metric value for the cloud application. A subset of the servers may be removed from a rotation framework of the cloud application based on the determined HA metric values, where the removal does not affect the overall HA metric value of the cloud application. One or more patches may be applied to each server within the subset of servers in parallel, and the subset of servers may be reinstated in the rotation framework of the cloud application. 1. A method to define a patching process associated with a cloud application , the method comprising:accepting a list of server identities corresponding to one or more servers of a datacenter hosting the cloud application;determining high availability (HA) metric values for each of the server identities on the list in order to compute an overall HA metric value for the cloud application;removing a subset of the one or more servers from a rotation framework of the cloud application based on the determined HA metric values, wherein the removal of the subset of servers from the rotation framework does not affect the overall HA metric value of the cloud application;applying one or more patches to each server within the subset of servers in parallel; andreinstating the subset of servers in the rotation framework of the cloud application upon completion of the application of the one or more patches.2. The method of claim 1 , further comprising:in response to the subset of servers being reinstated into the rotation framework of the cloud application, removing another subset of the one or more servers from the ...

Подробнее
26-01-2017 дата публикации

AUTOMATIC SERIAL STARTING OF RESOURCE GROUPS ON FAILOVER

Номер: US20170024293A1
Принадлежит:

A method for automatically prioritizing startup of resource groups during a migration event. The method may include monitoring resource usage of a first and a second set of applications associated, respectively, with a first and a second resource group executing on a first computing node. The method may additionally include generating respective first and second resource usage models for the first and second resource groups based on resource usage. The method may then include extrapolating, based on the first and second resource usage models, respective first and second resource group usage scores for the first and second resource groups at a second time in response to a migration event, the second time occurring subsequent to the first time. The method may further include determining, based on the extrapolating, a priority order for serially starting the first and second set of applications on a second computing node at the second time. 111-. (canceled)12. A computer system , comprising:one or more computing nodes having a memory and a processor; anda computer readable storage medium of the one or more computing nodes having program instructions embodied therewith, the program instructions executable by the processor to cause the computer system to: 'wherein each resource group of the set of at least two resource groups includes one or more associated applications that utilize resources of a first computing node;', 'monitor resource usage of a first set of applications associated with a first resource group of a set of at least two resource groups executing on a first computing node at a first time,'}monitor resource usage of a second set of applications associated with a second resource group of the set of at least two resource groups executing on the first computing node at the first time;generate, based on resource usage, respective first and second resource usage models for the first and second resource groups;extrapolate, based on the first and second resource ...

Подробнее
26-01-2017 дата публикации

Fault tolerant systems and method of using the same

Номер: US20170024294A1
Принадлежит: Siemens Energy Inc

Systems and methods for resolving fault detection in a control system is provided. The system includes an I/O module operably connected to a first, second, and third microcontroller for transmitting data. The first microcontroller is in an active state, i.e., in control, while the remaining controllers are in an idle state. The system further includes an event generator for generating an event indicative of a fault occurrence, and a means for detecting a fault event. The system also includes a means for reassigning a controller, wherein upon detection of a fault event in both the first and second controllers, the means for reassigning a controller changes the state of the third controller to active, leaving the remaining controllers idle or in a shutdown state, thereby effectively assigning control from the first controller to the third controller.

Подробнее
28-01-2016 дата публикации

Techniques for dynamically controlling resources based on service level objectives

Номер: US20160026535A1
Принадлежит: NetApp Inc

Various embodiments are generally directed an apparatus and method for receiving a recovery point objective for a workload, the recovery point objective comprising an amount of time in which information for the workload will be lost if a failure occurs, and determining a service level objective for a replication transfer based on the recovery point objective, the replication transfer to replicate information on a destination node to maintain the recovery point objective. Various embodiments include dynamically controlling one or more resources to replicate the information on the destination node based on the service level objective and communicating information for the replication transfer from the source node to the destination node.

Подробнее
25-01-2018 дата публикации

METHOD AND ASSOCIATED APPARATUS FOR PERFORMING WAKE-UP MANAGEMENT ON NETWORK DEVICES

Номер: US20180024843A1
Принадлежит:

A method for performing wake-up management and an associated apparatus are provided, where the method is applied to at least one portion of a network system, and the network system includes a local area network (LAN). The method includes: utilizing a wake-on-LAN (WOL) agent device to receive device information of a network device, where the WOL agent device and the network device are positioned in the LAN, and the network device broadcasts the device information according to a predetermined communications protocol; utilizing the WOL agent device to update a wake-up management list in the WOL agent device according to the device information, where the wake-up management list includes the device information; and utilizing the WOL agent device to perform a WOL operation on the network device according to the wake-up management list. 1. A method for performing wake-up management , the method being applied to at least one portion of a network system , the network system comprising a local area network (LAN) , the method comprising:utilizing a wake-on-LAN (WOL) agent device to receive device information of a network device, wherein the WOL agent device and the network device are positioned in the LAN, and the network device broadcasts the device information of the network device according to a predetermined communications protocol;utilizing the WOL agent device to refer to the device information of the network device to update a wake-up management list in the WOL agent device, wherein the wake-up management list comprises the device information of the network device; andutilizing the WOL agent device to perform a WOL operation regarding the network device according to the wake-up management list.2. The method of claim 1 , wherein the network device refers to the predetermined communications protocol to perform at least one broadcast operation claim 1 , to allow the WOL agent device to determine a state transition of the network device; and the method further comprises:in ...

Подробнее
25-01-2018 дата публикации

FAULT MONITORING DEVICE, VIRTUAL NETWORK SYSTEM, AND FAULT MONITORING METHOD

Номер: US20180024898A1
Автор: YOSHIKAWA Naoya
Принадлежит: NEC Corporation

A fault monitoring device includes a notice reception part configured to receive a notice indicating occurrence of faults from a virtual network device, and a recovery process part configured to carry out a recovery process for one device having the highest priority of fault response among the virtual network device producing the notice, a physical device implementing the virtual network device, and another virtual network device involved in dependency with the virtual network device. 1. A fault monitoring device comprising:a notice reception part configured to receive a notice indicating occurrence of a fault from a virtual network device; anda recovery process part configured to carry out a recovery process for one device having a highest priority of fault response among the virtual network device producing the notice, a physical device implementing the virtual network device, and another virtual network device involved in dependency with the virtual network device.2. The fault monitoring device according to claim 1 , further comprising a configuration storage unit configured to store the virtual network device in correlation with at least one of the physical device implementing the virtual network device and another virtual network device involved in dependency with the virtual network device claim 1 , wherein the recovery process part carries out the recovery process for one device having the highest priority of fault response among the virtual network device and each device stored on the configuration storage unit in correlation with the virtual network device.3. The fault monitoring device according to claim 2 , further comprising an instruction part configured to send an instruction to detect presence/absence of the fault to each device stored on the configuration storage unit in correlation with the virtual network device producing the notice claim 2 , and a result retrieval part configured to retrieve a detection result concerning the presence/absence of ...

Подробнее
10-02-2022 дата публикации

System and method for backing up data in a load-balanced clustered environment

Номер: US20220043720A1
Принадлежит: Acronis International GmbH

Disclosed herein are systems and method for backing up data in a load-balanced clustered environment. A clustered resource to be backed up is selected, wherein the clustered resource is stored on a common storage system and operated on by a cluster-aware application executing on at least a first node and a second node of a computing cluster. A load-balanced application may migrate the clustered resource from the first node with a high-load consumption to the second node with low-load consumption. A list of changes made by both nodes are received and merged. A backup agent then generates a consistent incremental backup using data retrieved from the common storage system according to the merged list of changes to the clustered resource.

Подробнее
24-01-2019 дата публикации

TRANSPARENT SERVER FAILOVER IN STATEFUL DISTRIBUTED PROTOCOLS

Номер: US20190026200A1
Принадлежит:

Exemplary methods, apparatuses, and systems include a proxy intercepting, from a client, a plurality of requests addressed to a first server. The proxy adds an entry for each of the plurality of requests to a data structure. Each entry includes data from one of the plurality of requests. The proxy forwards each of the plurality of requests to the first server. In response to detecting the first server was unavailable or otherwise failed, the proxy reconnects to the first server when the first server recovers or connects to a second server serving as a backup for the first server. The proxy transmits to the first or second server one or more commands using the entries of the data structure to restore state information for the client. 1. A computer-implemented method , comprising:intercepting, by a proxy, a plurality of requests sent by a client and addressed to a first server;adding, by the proxy, an entry for each of the plurality of requests to a data structure, each entry including data from one of the plurality of requests;forwarding, by the proxy, each of the plurality of requests to the first server;detecting, by the proxy, that the first server is unavailable;connecting, by the proxy in response to detecting the first server was unavailable, to the first server when the first server recovers or to a second server serving as a backup for the first server; andtransmitting, by the proxy to the first or second server, one or more commands using the entries of the data structure to restore state information for the client.2. The computer-implemented method of claim 1 , further comprising:transmitting, by the proxy to the first or second server, an indication that state recovery for the client is complete.3. The computer-implemented method of claim 1 , further comprising:receiving, by the proxy from the first or second server, an indication that the first or second server has completed recovery of state information;detecting, by the proxy, that a response to a first ...

Подробнее
25-01-2018 дата публикации

SERVICE AVAILABILITY RISK

Номер: US20180026852A1
Принадлежит:

A processor receives service availability data for at least one service, where the service availability data indicates an amount time the at least one service was available and an amount of time one or more resources utilized in the service was available. A processor receives service configuration data for the service, where the service configuration data indicates one or more resource requirements of the at least one service. A processor determines one or more resource unavailability scores for the one or more resources utilized in providing the service. A processor determines one or more resource replacement scores for the one or more resources utilized in the service. A processor determines availability risk scores for the at least one service based on the one or more resource unavailability scores and the one or more resource replacement scores. A processor generates an indication of at-risk services of the at least one service. 1. A method comprising:receiving, by one or more processors, service availability data for at least one service, wherein the service availability data indicates (i) an amount time the at least one service was available and (ii) an amount of time one or more resources utilized in providing the service was available;receiving, by the one or more processors, service configuration data for the service, wherein the service configuration data indicates one or more resource requirements of the at least one service;determining, by the one or more processors, one or more resource unavailability scores for the one or more resources utilized in providing the service;determining, by the one or more processors, one or more resource replacement scores for the one or more resources utilized in providing the service;determining, by the one or more processors, one or more availability risk scores for the at least one service based, at least in part, on the one or more resource unavailability scores and the one or more resource replacement scores; ...

Подробнее
24-04-2014 дата публикации

Telephony usage derived presence information

Номер: US20140112336A1
Принадлежит: ROCKSTAR CONSORTIUM US LP

The present invention relates to a mechanism for providing state information, which bears on the presence of a telephone user, to a presence system. The state information is derived by monitoring events relating to telephony use. Once derived, the state information is directly or indirectly sent to a presence service, which provides presence information to applications requiring such information about the telephone user. The state information preferably bears on the presence, absence, or availability of the telephone user based on their interaction with a telephony device or function. In one embodiment, a telephony switching system is configured to monitor events associated with a telephony device or function and send messages to a presence service over a packet-switched network when the state of the telephony device or function changes. In another embodiment, an IP telephone system is configured to provide state information to the presence service.

Подробнее
23-01-2020 дата публикации

SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING A SCHEDULER AND WORKLOAD MANAGER WITH WORKLOAD RE-EXECUTION FUNCTIONALITY FOR BAD EXECUTION RUNS

Номер: US20200026571A1
Принадлежит: SALESFORCE.COM, INC.

In accordance with disclosed embodiments, there are provided systems, methods, and apparatuses for implementing a stateless, deterministic scheduler and work discovery system with interruption recovery. For instance, according to one embodiment, there is disclosed a system to implement a stateless scheduler service, in which the system includes: a processor and a memory to execute instructions at the system; a compute resource discovery engine to identify one or more computing resources available to execute workload tasks; a workload discovery engine to identify a plurality of workload tasks to be scheduled for execution; a cache to store information on behalf of the compute resource discovery engine and the workload discovery engine; a scheduler to request information from the cache specifying the one or more computing resources available to execute workload tasks and the plurality of workload tasks to be scheduled for execution; and further in which the scheduler is to schedule at least a portion of the plurality of workload tasks for execution via the one or more computing resources based on the information requested. Other related embodiments are disclosed. 1. A method performed by a system having at least a processor and a memory therein , wherein the method comprises:allocating a cache within the memory of the system;identifying, via a workload discovery engine, pending workload tasks to be scheduled for execution from one or more workload queues and updating the cache;identifying, via a compute resource discovery engine, a plurality of computing resources available to execute the workload tasks and updating the cache;identifying, via an external services monitor, a plurality of external services accessible to the workload tasks and updating the cache;executing a scheduler via the processor of the system, wherein the scheduler performs at least the following operations:scheduling the workload tasks for execution on the plurality of computing resources; ...

Подробнее
23-01-2020 дата публикации

CONTROLLING PROCESSING ELEMENTS IN A DISTRIBUTED COMPUTING ENVIRONMENT

Номер: US20200026605A1
Принадлежит:

A computer system controls processing elements associated with a stream computing application. A stream computing application is monitored for the occurrence of one or more conditions. One or more processing element groups are determined to be restarted based on occurrence of the one or more conditions, wherein the processing element groups each include a plurality of processing elements associated with the stream computing application. Each processing element of the determined one or more processing element groups is concurrently restarted. Embodiments of the present invention further include a method and program product for controlling processing elements within a stream computing application in substantially the same manner described above. 1. A computer-implemented method of controlling processing elements associated with a stream computing application comprising:monitoring a stream computing application for occurrence of one or more conditions;determining one or more processing element groups to restart based on occurrence of the one or more conditions, wherein the processing element groups each include a plurality of processing elements associated with the stream computing application; andconcurrently restarting each processing element of the determined one or more processing element groups.2. The computer-implemented method of claim 1 , wherein determining one or more processing element groups further comprises:establishing at least one processing element group based on a configuration attribute.3. The computer-implemented method of claim 1 , wherein the one or processing elements include a plurality of operators claim 1 , and determining one or more processing element groups further comprises:establishing at least one processing element group based on locations of processing elements within an operator graph indicating a flow through the operators.4. The computer-implemented method of claim 1 , wherein the one or processing elements include a plurality of ...

Подробнее
23-01-2020 дата публикации

INTELLIGENT LOG GAP DETECTION TO ENSURE NECESSARY BACKUP PROMOTION

Номер: US20200026622A1
Принадлежит:

An intelligent log gap detection to ensure necessary backup promotion. Specifically, a method and system are disclosed, which entail determining whether to pursue a differential database backup or promote the differential database backup to a full database backup, in order to preclude data loss across high availability databases. The deduction pivots on a matching or mismatching between log sequence numbers (LSNs). 1. A method for intelligent log gap detection , comprising:receiving a first database backup request for a first differential database backup on a database availability cluster (DAC);making a first determination that a first full database backup has already been performed;obtaining, based on the first determination, a checkpoint log sequence number (LSN) associated with the first full database backup;making a second determination that the checkpoint LSN mismatches a first differential base LSN (DBL);detecting, based on the second determination, a log gap across the DAC; andpromoting, based on the detecting the log gap, the first differential database backup to a second full database backup.2. The method of claim 1 , wherein making the first determination claim 1 , comprises:performing a search of a cluster backup chain table (BCT) in reverse chronological order, wherein the cluster BCT comprises a plurality of cluster backup chain records (BCRs); andidentifying a cluster BCR of the plurality of cluster BCRs based on a backup identifier (ID) specified therein, wherein the backup ID identifies the cluster BCR as being associated with a full database backup.3. The method of claim 2 , wherein the cluster BCR comprises an object ID claim 2 , the backup ID claim 2 , a first LSN claim 2 , a last LSN claim 2 , the checkpoint LSN claim 2 , and a database backup LSN.4. The method of claim 1 , further comprising:issuing, based on the promoting, a full backup command (FBC).5. The method of claim 1 , further comprising:receiving a second database backup request for a ...

Подробнее
23-01-2020 дата публикации

EXECUTING RESOURCE MANAGEMENT OPERATIONS IN DISTRIBUTED COMPUTING SYSTEMS

Номер: US20200026624A1
Принадлежит: Nutanix, Inc.

Computing cluster system management. Embodiments implement fine-grained rule-based approaches to error recovery. A service dispatches tasks to components of the computing cluster. At the time of task dispatching, entries are made into a write-ahead log. The write-ahead log entries serve for recording task and component attributes. A monitor detects a failure event raised by one or more of the components of the computing cluster. Responses to the failure event include determining a set of conditions that are present in the computing cluster at the time of the detection, and then using the failure event and the determined conditions in combination with a set of fine-grained failure processing rules to determine one or more recovery actions to take. Recovery actions include redistributing the failed task to a different node or to different service. Certain conditions and rules initiate actions that rollback the state of a component to a previous success points. 1. A method comprising:dispatching a task to a component of multiple components of a distributed virtualization system that comprises a storage pool, wherein the storage pool is managed and accessible by the multiple components;recording an attribute characterizing the task in a log in the storage pool;detecting a failure that corresponds to an execution of the task in the distributed virtualization system;responsive to the failure, determining a condition associated with a status of the component of the multiple components in the log, wherein the multiple components in the distributed virtualization system are configured to collect and store the status in the log;determining an action for the task based at least in part upon a rule, wherein the rule relates the condition the action based at least in part upon a dependency relationship between the task and a different task in the distributed virtualization system; anddistributing or terminating the task based at least in part on the action.2. The method of claim ...

Подробнее
10-02-2022 дата публикации

AUTONOMOUS QUALITY REGULATION FOR DISTRIBUTED LEDGER NETWORKS

Номер: US20220045930A1
Автор: Williams David
Принадлежит:

Methods, apparatus, and systems are provided for operating a distributed ledger network (), the distributed ledger network () comprising a plurality of nodes (--), the plurality of nodes comprising a group of nodes (), wherein each node in the group of nodes () includes functionality for acting as a trusted third party node on a distributed ledger transaction, the method comprising: performing an operating performance test on one or more selected nodes (-) of the group of nodes (), wherein the operating performance test comprises sending a plurality of test messages to each selected node (-) over a predetermined time period; receiving operating performance data associated with each selected node (-) in relation to the operating performance test; aggregating operating performance statistics for each selected node (-) based on the received operating performance responses; and indicating to the distributed ledger network () those selected nodes (-) satisfying one or more operating performance benchmark(s) for acting as a trusted third party for distributed ledger transactions over the distributed ledger network () based on the aggregated operating performance statistics. 1. A computer-implemented method for operating a distributed ledger network , the distributed ledger network comprising a plurality of nodes , the plurality of nodes comprising a group of nodes , wherein each node in the group of nodes includes functionality for acting as a trusted third party node on a distributed ledger transaction , the method comprising:{'b': 104', '104, 'i': a', 'm, 'performing an operating performance test on one or more selected nodes (-) of the group of nodes, wherein the operating performance test comprises sending a plurality of test messages to each selected node over a predetermined time period;'}{'b': 104', '104, 'i': a', 'm, 'receiving operating performance data associated with each selected node (-) in relation to the operating performance test;'}{'b': 104', '104, 'i': a ...

Подробнее
28-01-2021 дата публикации

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING BYZANTINE FAULT TOLERANCE

Номер: US20210026745A1
Автор: Wang Yongge
Принадлежит:

Methods, systems, and computer readable media for providing Byzantine fault tolerance (BFT) are disclosed. According to one method, a method for providing BFT occurs at a computing platform executing a BFT protocol, wherein the computing platform is acting as a leader participant of a round of the BFT protocol. The method comprising: receiving signed round-change messages from multiple participants in the round; broadcasting a signed lock message indicating that signed round-change messages have been received from a predetermined number of the participants in the round voting for a same candidate block; receiving signed commit messages from multiple participants in the round; and broadcasting a signed decide message indicating the candidate block is a finalized block after the predetermined number of the participants in the round have sent signed commit messages indicating the candidate block. 1. A method for providing Byzantine fault tolerance (BFT) , the method comprising: receiving signed round-change messages from multiple participants in the round;', 'broadcasting a signed lock message indicating that signed round-change messages have been received from a predetermined number of the participants in the round voting for a same candidate block;', 'receiving signed commit messages from multiple participants in the round; and', 'broadcasting a signed decide message indicating the candidate block is a finalized block after the predetermined number of the participants in the round have sent signed commit messages indicating the candidate block., 'at a computing platform executing a BFT protocol, wherein the computing platform is acting as a leader participant of a round of the BFT protocol2. The method of wherein the predetermined number of the participants includes at least 2t+1 participants claim 1 , where t represents an amount of malicious participants in the round.3. The method of wherein a participant in the round receives the decide message from the leader ...

Подробнее
24-01-2019 дата публикации

MULTI-STREAM TRANSMISSION METHOD AND DEVICE IN SDN NETWORK

Номер: US20190028374A1
Автор: Xu Baolei, ZHOU Haojun
Принадлежит:

The present disclosure relates to the field of communications technologies, and provides a multi-stream transmission method and device in an SDN network. A server obtains network status information of a network by using an SDN controller; determines, according to the network status information and a data sending rate requirement of a client, a quantity of sub-streams and a sub-stream transmission path that are required by a multi-stream connection, and allocates corresponding sub-stream identification information to each sub-stream; and sends the determined sub-stream transmission path and the corresponding sub-stream identification information to the SDN controller. According to the foregoing solution, the server completes multi-stream connection path planning according to the network status information, and the SDN controller only provides the network status information for the server without performing the multi-stream connection path planning, so that calculation load of the SDN controller is reduced. 1. A multi-stream transmission method in a software defined network (SDN) , the method comprising:obtaining, by a server, network status information of a network from an SDN controller;determining, according to the network status information and a data sending rate requirement of a client, a quantity of sub-streams and a sub-stream transmission path that are required by a multi-stream connection, and allocating corresponding sub-stream identification information to each sub-stream; andsending, by the server, the determined sub-stream transmission path and the corresponding sub-stream identification information to the SDN controller.2. The method according to claim 1 , wherein:the network status information comprises a network topology;the network status information comprises an available bandwidth and a delay of a link that is between adjacent network devices and in the network topology; and calculating, by the server, a cost of each link in the network topology ...

Подробнее
24-04-2014 дата публикации

ONLINE GAME SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM

Номер: US20140115144A1
Принадлежит: BIGPOINT INC.

Certain embodiments herein are directed to an online game system, computer-readable medium, and a method comprising: providing a network system comprising a central device and a plurality of remote devices, each said remote device being connected to the central device; providing a plurality of data objects in the network system; and, for running an online game session in the network system, implementing a mode of operation, comprising: assigning each of said data objects to at least one of the remote devices, thereby, giving the at least one remote device control over the assigned data object, and excluding the central device from control over each of said data objects; and, for the plurality of remote devices, limiting data object related game data exchange to a direct data exchange with the central device only. 1. A method comprising:providing, by a network system comprising a central device and a plurality of remote devices connected to the central device, a plurality of data objects in the network system; and giving the at least one remote device control over the data object;', 'excluding the central device and at least one other remote device of the plurality of remote devices from control over the data object; and', giving the at least one other remote device control over the data object; and', 'excluding the central device and the at least one remote device from control over the data object., 'migrating ownership of the data object from the at least one remote device to said at least one other remote device, the migration comprising], 'assigning ownership of a data object of the plurality of data objects to at least one remote device of the plurality of remote devices, the assigning comprising, 'implementing, by the network system, a mode of operation for running an online game session in the network system, the implementing comprising2. The method of claim 1 , wherein migrating the ownership of the data object further comprises:providing a request message to ...

Подробнее
24-04-2014 дата публикации

FAILOVER SYSTEM AND METHOD

Номер: US20140115380A1
Принадлежит: TSX Inc.

One aspect of the present invention provides a system for failover comprising at least one client selectively connectable to one of at least two interconnected server via a network connection. In a normal state, one of the servers is designated a primary server when connected to the client and a remainder of the servers are designated as backup servers when not connected to the client. The at least one client is configured to send messages to the primary server. The servers are configured to process the messages using at least one service that is identical in each of the servers. The services are unaware of whether a server respective to the service is operating as the primary server or the backup server. The servers are further configured to maintain a library, or the like, that indicates whether a server is the primary server or a server is the backup server. The services within each server are to make external calls via its respective library. The library in the primary server is configured to complete the external calls and return results of the external calls to the service in the primary server and to forward results of the external calls to the service in the backup server. The library in the secondary server does not make external calls but simply forwards the results of the external calls, as received from the primary server, to the service in the secondary server when requested to do so by the service in the secondary server. 115-. (canceled)16. A system for failover comprising:a primary server and at least one backup server; determine a plurality of processing inputs, wherein said plurality of processing inputs guarantees deterministic processing of said plurality of processing inputs by said primary server and said backup server, wherein said plurality of processing inputs includes a call result from an external resource, said external resource resident on said primary server; and', 'forward said plurality of processing inputs to said backup server prior ...

Подробнее
28-01-2021 дата публикации

DYNAMIC BEHAVIOR MODIFICATION FOR CONTENT DOWNLOAD AND PLAYBACK

Номер: US20210029190A1
Автор: Knowler James E.
Принадлежит:

The present disclosure relates generally to a method for dynamically selecting quality levels for content downloads. The method includes receiving by a media player a content download request; determining a state of a quality module, where the state depends at least in part on a bandwidth available to the media player and a buffer value for the content; providing to the media player from the quality module a quality value corresponding to the state, wherein the quality value is used by the media player to request one or more content fragments from a server; receiving by the media player the one or more content fragments; and displaying by the medial player the one or more content fragments. 1. A method for displaying content on a user device comprising:receiving by a media player a content request corresponding to a fragment download from a server;receiving from a quality module in communication with the media player, a quality selection for the fragment;downloading by the media player the fragment from the server;analyzing a bandwidth availability for the media player during download of the fragment; andbased in part on the bandwidth availability stopping or continuing to download the fragment.2. The method of claim 1 , further comprising analyzing a buffer level during download of the fragment claim 1 , wherein stopping or continuing to download the fragment is based in part on the buffer level and the bandwidth availability.3. The method of claim 2 , wherein the quality module utilizes the buffer level and the bandwidth availability to provide an updated quality selection.4. The method of claim 1 , wherein after stopping the download of the fragment claim 1 , the method further comprises:receiving a lower quality selection for the fragment; anddownloading by the media player, the fragment at the lower quality.5. The method of claim 1 , wherein the server is a content delivery network server.6. The method of claim 1 , analyzing the bandwidth availability comprises ...

Подробнее
02-02-2017 дата публикации

FAULT TOLERANT ARCHITECTURE FOR DISTRIBUTED COMPUTING SYSTEMS

Номер: US20170031788A9
Принадлежит: QBASE, LLC

Disclosed here is a fault tolerant architecture suitable for use with any distributed computing system. A fault tolerant architecture may include any suitable number of supervisors, dependency managers, node managers, and other modules distributed across any suitable number of nodes. In one or more embodiments, supervisors may monitor the system using any suitable number of heartbeats from any suitable number of node managers and other modules. In one or more embodiments, supervisors may automatically recover failed modules in a distributed system by moving the modules and their dependencies to other nodes in the system. In one or more embodiments, supervisors may request a configuration package from one or more dependency managers installing one or more modules on a node. In one or more embodiments, one or more modules may have any suitable number of redundant copies in the system, where redundant copies of modules in the system may be stored in separate nodes. 1. A method comprising:monitoring, by a computer comprising a processor executing a supervisor module, a heartbeat signal generated by a node manager monitoring one or more software modules stored on a node, wherein the heartbeat signal contains data indicating a status of each respective software module monitored by the node manager;detecting, by the computer, a failed software module in the one or more software modules of the node based on the heartbeat signal received from the node manager of the node;transmitting, by the computer, to the node manager of the node a command instructing the node to restore the failed software module, in response to detecting the failed software module;determining, by the computer, whether the node manager successfully restored the module based on the heartbeat signal received from the node manager;detecting, by the computer, a failure of the node manager monitoring the failed software module;determining, by the computer, a failover node to execute the module, wherein the ...

Подробнее
04-02-2016 дата публикации

MANAGING BACKUP OPERATIONS FROM A CLIENT SYSTEM TO A PRIMARY SERVER AND SECONDARY SERVER

Номер: US20160034357A1
Принадлежит:

Provided are techniques for managing backup operations from a client system to a primary server and secondary server. A determination is made at the client system of whether a state of the data on the secondary server permits a backup operation in response to determining that the primary server is unavailable when a force failover parameter is not set. The client system reattempts to connect to the primary server to perform the backup operation at the primary server in response to determining that the state of the data on the secondary server does not permit the backup operation. The client system performs the backup operation at the secondary server in response to determining that the state of the secondary server permits the backup operation. 115-. (canceled)16. A method for replicating client data from a client system between a primary server and a secondary server , comprising:determining whether a state of the data on the secondary server permits a backup operation in response to determining that the primary server is unavailable when a force failover parameter is not set;reattempting to connect to the primary server to perform the backup operation at the primary server in response to determining that the state of the data on the secondary server does not permit the backup operation; andperforming the backup operation at the secondary server in response to determining that the state of the secondary server permits the backup operation.17. The method of claim 16 , further comprising:starting a failover delay timer in response to determining that the force failover parameter is not set and that the primary server is not available; andreattempting to connect to the primary server to perform the backup operation at the primary server in response to determining that the failover delay timer has not expired when the state of the secondary server permits the backup operation,wherein the backup operation is performed with respect to the secondary server in response to ...

Подробнее
04-02-2016 дата публикации

Proactive Failure Recovery Model for Distributed Computing

Номер: US20160034362A1
Автор: AL-WAHABI Khalid S.
Принадлежит:

This disclosure generally describes methods and systems, including computer-implemented methods, computer-program products, and computer systems, for providing a proactive failure recovery model for distributed computing. One computer-implemented method includes building a virtual tree-like computing structure of a plurality of computing nodes, for each computing node of the virtual tree-like computing structure, performing, by a hardware processor, a node failure prediction model to calculate a mean time between failure (MTBF) associated with the computing node, determining whether to perform a checkpoint of the computing node based on a comparison between the calculated MTBF and a maximum and minimum threshold, migrating a process from the computing node to a different computing node acting as a recovery node, and resuming execution of the process on the different computing node. 1. A computer-implemented method , comprising:building a virtual tree-like computing structure of a plurality of computing nodes;for each computing node of the virtual tree-like computing structure, performing, by a hardware processor, a node failure prediction model to calculate a mean time between failure (MTBF) associated with the computing node;determining whether to perform a checkpoint of the computing node based on a comparison between the calculated MTBF and a maximum and minimum threshold;migrating a process from the computing node to a different computing node acting as a recovery node; andresuming execution of the process on the different computing node.2. The method of claim 1 , further comprising:collecting at least a computing power and node location parameter value for each computing node;dividing the computing nodes into collections based on their node location parameter; andsorting the nodes within each collection based on the computing power parameter.3. The method of claim 2 , further comprising:identifying the upper-limit and lower-limit to determine levels of the ...

Подробнее
04-02-2016 дата публикации

MANAGING BACKUP OPERATIONS FROM A CLIENT SYSTEM TO A PRIMARY SERVER AND SECONDARY SERVER

Номер: US20160034366A1
Принадлежит:

Provided are techniques for managing backup operations from a client system to a primary server and secondary server. A determination is made at the client system of whether a state of the data on the secondary server permits a backup operation in response to determining that the primary server is unavailable when a force failover parameter is not set. The client system reattempts to connect to the primary server to perform the backup operation at the primary server in response to determining that the state of the data on the secondary server does not permit the backup operation. The client system performs the backup operation at the secondary server in response to determining that the state of the secondary server permits the backup operation. 1. A computer program product for replicating client data from a client system between a primary server and a secondary server , wherein the computer program product comprises at least one computer readable storage medium including a client program embodied therewith , wherein the client program is executable by a processor to cause operations , the operations comprising:determining, by the client program, whether a state of the data on the secondary server permits a backup operation in response to determining that the primary server is unavailable when a force failover parameter is not set;reattempting, by the client program, to connect to the primary server to perform the backup operation at the primary server in response to determining that the state of the data on the secondary server does not permit the backup operation; andperforming, by the client program, the backup operation at the secondary server in response to determining that the state of the secondary server permits the backup operation.2. The computer program product of claim 1 , wherein the at least one computer readable storage medium includes a primary server program and a secondary server program claim 1 , wherein the operations further comprise:replicating ...

Подробнее
01-02-2018 дата публикации

LOAD BALANCING AND FAULT TOLERANT SERVICE IN A DISTRIBUTED DATA SYSTEM

Номер: US20180032382A1
Принадлежит:

Techniques for load balancing and fault tolerant service are described. An apparatus may comprise load balancing and fault tolerant component operative to execute a load balancing and fault tolerant service in a distributed data system. The load balancing and fault tolerant service distributes a load of a task to a first node in a cluster of nodes using a routing table. The load balancing and fault tolerant service stores information to indicate the first node from the cluster of nodes is assigned to perform the task. The load balancing and fault tolerant service detects a failure condition for the first node. The load balancing and fault tolerant service moves the task to a second node from the cluster of nodes to perform the task for the first node upon occurrence of the failure condition. 1. A method , comprising:creating relationships between a quorum of nodes in a cluster;adding a new node to the quorum of nodes;adding a new user space process to the new node; andreassigning a relationship handled by the new user space process based upon the user space process failing.2. The method of claim 1 , comprising:assigning each user space process of each node within the quorum of nodes to handle a virtual server disaster recovery relationship of the cluster.3. The method of claim 1 , wherein no more than one user space process is assigned to each node.4. The method of claim 1 , wherein the new user space process comprises a virtual server disaster recovery process.5. The method of claim 1 , wherein the reassigning comprises:accessing a library of a replicated database (RDB) service to evaluate a set of classes indicative of nodes in the cluster that have not failed.6. The method of claim 5 , comprising:utilizing an RDB ring of a user space process to detect that a current node has failed.7. The method of claim 5 , comprising:utilizing the RDB ring of the user space process to detect that the current node has been activated.8. The method of claim 5 , comprising: ...

Подробнее
01-02-2018 дата публикации

RESUME HOST ACCESS BASED ON TRANSACTION LOGS

Номер: US20180032412A1
Принадлежит:

Examples disclosed herein relate to processing transaction logs for storage nodes. Multiple nodes manage transactions for storage units including transaction logs. A node assumes control over a set of storage units and blocks host access requests to the storage units. Transaction logs are processed to determine a subset of the set to perform recovery for. In this example, the subset of storage units are locked. Host access requests are resumed. 1. A system comprising:a plurality of nodes for managing transactions to and from a plurality of storage units and for maintaining transaction logs including details of the transactions,wherein a first one of the nodes controls a set of the storage units and includes write information for the set of storage units and maintains corresponding transaction logs for the write information,wherein a second one of the nodes includes a copy of the transaction logs, the second one node further comprising:a control engine to assume control over the set of storage units and to block host access requests to the set of storage units;a transaction engine to process the transaction logs to determine a subset of the set of the storage units to perform recovery for and to update a hash table to lock the subset of the storage units,wherein the control engine is further to resume host access requests.2. The system of claim 1 , the second node further comprising:a recovery engine to:initiate a plurality of recovery operations for the storage units from the subset, wherein each of the recovery operations is associated with one of a plurality of meta-data;for each of the recovery operations, determine that the respective meta-data is stored in a non-volatile memory; andbased on each determination, create, for each respective meta-data, a temporary meta-data data structure, wherein the temporary meta-data data structure includes an associated recovery transaction,wherein the temporary meta-data data structure are created before the host access ...

Подробнее
05-02-2015 дата публикации

AVAILABLE BANDWIDTH SEARCH RANGE CONTROL METHOD AND AVAILABLE BANDWIDTH SEARCH RANGE CONTROL SYSTEM

Номер: US20150036534A1
Автор: OSHIBA Takashi
Принадлежит: NEC Corporation

A first terminal includes: a local terminal transmission rate acquisition unit for acquiring a transmission rate of an application in the first terminal ; a search range control unit for deciding an upper limit of a search range of an available bandwidth of a communication line, using the transmission rate; and a probe packet transmission unit for transmitting a probe packet to a second terminal in a bandwidth less than or equal to the upper limit. The second terminal includes: a probe packet receiving unit for receiving the probe packet; and an available bandwidth estimation unit for estimating the available bandwidth based on the received probe packet. 1. An available bandwidth search range control method comprising:acquiring a transmission rate of an application in a local terminal;deciding an upper limit of a search range of an available bandwidth of a communication line, using the transmission rate; andestimating the available bandwidth in the search range less than or equal to the upper limit.2. The available bandwidth search range control method according to claim 1 , comprisingsetting a value obtained by subtracting the transmission rate of the application in the local terminal from a link speed of the local terminal, as the upper limit of the search range of the available bandwidth.3. The available bandwidth search range control method according to claim 1 , comprising:acquiring a reception rate of an application in a remote terminal; andcomparing a value obtained by subtracting the transmission rate of the application in the local terminal from a link speed of the local terminal with a value obtained by subtracting the reception rate of the application in the remote terminal from a link speed of the remote terminal, and setting a smaller one of the values as the upper limit of the search range of the available bandwidth.4. The available bandwidth search range control method according to claim 1 , comprising:acquiring a reception rate of the application in ...

Подробнее
04-02-2016 дата публикации

AUTOMATIC CLOUD-BASED DISASTER RECOVERY SYSTEM

Номер: US20160036623A1
Автор: Clarkson David B.
Принадлежит:

Restoration devices in a cloud storage system are paired with source containers associated with a mainframe computer, and series of commands are generated based on the pairings to cause copies of data at the source containers to be stored to the restoration devices. A point-in-time copy of the copy of the data at the source containers may be stored to some restoration devices, and a second copy of the data may be stored to other restoration devices. The restoration devices may be reallocated from inactive source containers. Execution of the commands is monitored, and the commands are modified if the execution of the commands does not satisfy one or more desired conditions. For example, a cycle time associated with copying data to a restoration device may be measured, and if the cycle time exceeds a threshold, the command may be modified. 1. A method comprising:identifying, by a processor, a first restoration device included in a plurality of restoration devices associated with a cloud storage system, wherein the first restoration device is paired with a first source container during a first time period, and wherein data stored by the first source container is copied to the first restoration device during the first time period based on the first restoration device being paired with the first source container;determining, by the processor, that a second source container is storing data to be backed up during a second time period that is subsequent to the first time period;pairing, by the processor, the second source container with the first restoration device during the second time period based on determining that the second source container is storing data to be backed up during the second time period, wherein data stored by the first source container is not copied to the first restoration device during the second time period based on the first restoration device being paired with the second source container;generating, by the processor, a first command based on ...

Подробнее