H04L41/0889

CONSISTENT HASHING FOR NETWORK TRAFFIC DISPATCHING

A method is provided that uses a consistent hashing technique to dispatch incoming packets in a stable system prior to adding of a node. The method uses a hash table and assigns hash buckets in the table to each network node. A set of fields in each incoming packet is hashed and is used to identify the corresponding hash bucket. The packets are then dispatched to the network nodes based on the nodes' hash buckets. During an observation period, the method identifies the ongoing sessions by creating a bit vector table that is used to identify the old and new sessions during a re-dispatching period. The method uses the consistent hashing method and the probabilistic method dispatch the incoming packets such that each packet that belongs to an old session is dispatched to the same old node that has been processing the other packets of the session.

Server system

A server system comprising storage devices, processing devices and a storage fabric all operating according to a storage fabric protocol. The storage fabric comprises a plurality of individual switches having a modular design from which an overall switch is built, and the individual switches have individual respective configuration settings which determine which processing devices are allocated to use which of the storage devices. The system comprises an API enabling a software control function to configure the overall switch. The API is operable to receive from the control function an overall mapping of the storage devices to the processing devices instead of requiring the individual configuration settings of each of the individual switches to be specified by the control function, the API being configured to convert the overall mapping into the individual configuration settings of the individual switches to produce the overall mapping.

Hierarchical API for a SDDC

Some embodiments of the invention provide a method for deploying software-implemented resources in a software defined datacenter (SDDC). The method initially receives a hierarchical API command that, in a declarative format, specifies several operation requests for several software-defined (SD) resources at several resource levels of a resource hierarchy in the SDDC. The method parses the API command to identify the SD resources at the plurality of resource levels. Based on the parsed API command, the method deploys the SD resources by using a deployment process that ensures that any first SD resource on which a second SD resource depends is deployed before the second resource. In some embodiments, a second SD resource depends on a first SD resource when the second SD resource is a child of the first SD resource. Alternatively, or conjunctively, a second SD resource can also depend on a first SD resource in some embodiments when the second SD resource has some operational dependency on the first SD resource. In some embodiments, the method parses the API command by identifying several sets of SD resources, with each set having one or more SD resources at one resource level. The deployment in some embodiments deploys the identified SD resource sets at higher resource levels before deploying SD resources at lower resource levels.

Rapid configuration propagation in a distributed multi-tenant platform

Disclosed are different implementations for rapid configuration propagation across multiple servers of a distributed platform. One implementation is a push based distribution of update segments that are generated from a onetime differential analysis of an updated particular configuration relative to a previous instance of the particular configuration. Sequence numbers attached to the updated segments identify is a server's copy of a configuration is up-to-date and can receive a new updated segment or if missing intervening segments are to be retrieved from peers and applied prior to applying the new updated segment. Another implementation is a pull based distribution of compressed images of the configurations. A complete set of configurations are distributed as a compressed file system that is loaded into server memory. Individual configurations are read out of the file system and loaded into memory when implicated by client requests.

ACCELERATION OF NODE CONFIGURATION FOR TWAMP WITH A LARGE NUMBER OF TEST SESSIONS
20200322220 · 2020-10-08 · ·

The disclosed methods for reducing the port setup time for a large number of TWAMP test sessions for performance measurement testing of telecommunication transport networks include parsing a configuration file to populate an accept-port data structure with proposed receiver ports for communication from a session-sender to session-reflectors; repeatedly and in parallel, from a control client, communicating with receiving servers to set up pairwise test sessions using receiver port allocations from the accept-port data structure, and receiving and checking blocks of Accept-Session messages from the receiving server and handling either case of acceptance of the proposed receiver port or of counter proposal of an alternate-and-available port to be used for the measurement session; and allocating the alternate-and-available port and updating the accept-port data structure by storing the alternate-and-available port received in the particular Accept-Session message; and using the stored ports to initiate TWAMP messages in the pairwise test sessions.

Dynamic burn slot allocator

An information handling system receives a media access control address associated with a device installed in a burn slot, and determines a virtual private network that is associated with the media access control address. The system also determines a switch port in a network switch that corresponds to the virtual private network, and dynamically assigns the switch port that corresponds to the virtual private network to the device installed in the burn slot. The system instructs the network switch to route packets of data associated with the virtual private network via the switch port to the device installed in the burn slot.

SUPPORTING NEAR REAL TIME SERVICE LEVEL AGREEMENTS
20200313980 · 2020-10-01 ·

A controller device manages a plurality of network devices. The controller device includes one or more processing units implemented in circuitry and configured to determine that one or more stateful intents used to manage the plurality of network devices and represented by a graph model are degraded due to assigned resources for the stateful intents having become degraded; in response to determining that the one or more stateful intents are degraded, determine resources for the stateful intents, the resources corresponding to vertices of the graph model; provision the stateful intents using the determined resources; determine whether the provisioning of the stateful intents was successful; compile at least one of the stateful intents that was successful into low-level configuration data for at least one network device of the plurality of network devices; and configure the at least one network device using the low-level configuration data.

SOFTWARE UPGRADE DEPLOYMENT IN MIXED NETWORK OF IN-SERVICE SOFTWARE UPGRADE (ISSU)-CAPABLE AND ISSU-INCAPABLE DEVICES

Techniques are disclosed for deploying software upgrades to a mixed network of In-Service Software Upgrade (ISSU)-capable and ISSU-incapable network devices without interrupting network traffic serviced by the mixed network. In one example, a centralized controller for a network determines that first network devices of a plurality of network devices for the network are In-Service Software Upgrade (ISSU)-capable and second network devices of the plurality of network devices are not ISSU-capable. The centralized controller transmits messages instructing the first network devices to perform an ISSU operation. Further, the centralized controller transmits messages instructing each network device of the second network devices to transmit a message to peer network devices of the network device, the message indicating that the network device is not ISSU-capable. In response to receiving the message indicating that the network device is not ISSU-capable, the peer network devices redirect traffic to avoid the network device.

METHOD AND SYSTEM FOR VIRTUAL SERVER DORMANCY

A method for providing a dormant state for content management servers is provided. Client devices are allowed to conduct transactions with servers when the servers are active. However, in a dormant state, the servers are not allowed to accept new transactions. Thus, by utilizing the dormant state, software upgrades can be made to one server at a time. Alternatively, all servers can be taken down for major upgrades, with the servers still operated in a read-only mode based on a file image from a point in time just prior to the shutdown. When the upgrade is completed, the servers can be returned to the active state.

Communication system, communication device, and communication method
10764140 · 2020-09-01 · ·

Provided is a communication device capable of minimizing effects on a continuously operated service after control software is updated. In a communication device (10), a control unit (11) stores information about the communication device (10) in a storage unit (12) before control software is updated. The control unit (11) compares, after updating the control software, information about the communication device (10) stored in the storage unit (12) with information about the communication device (10) obtained after updating the control software, and performs predetermined processing based on a result of the comparison.