H04L49/356

Detecting single points of failure on a storage system

Single points of failure (SPoFs) may be determined for I/O connectivity on a storage network. I/O path information may be determined for a storage device, for example, as a result of a host system logging into the storage network, and may be updated in response to events on the storage network. From this determined I/O path information, one or more SPoFs between a storage device and an application layer may be determined if, for the I/O path information collectively, it is determined that there is only one of any of the path components between the storage device and the application layer. The I/O path information may be displayed in a manner that facilitates a user identifying that there is an SPoF on an I/O path between a storage device and an application layer of a host system. Based on the determination of an SPoF, an alert may be issued.

NVMe-over-fabrics gateway system

An NVMeoF gateway system includes a physical host device that communicates using a host NVMeoF protocol, and a physical target device that communicates using a target NVMeoF protocol. A networking device generates proxy host and target devices that are included in the same zone for the physical host and target devices, respectively. The networking device then converts first host NVMeoF protocol communications from the physical host device to first target NVMeoF protocol communications and provides them to the physical target device using the proxy host device, and converts second target NVMeoF protocol communications from the physical target device to second host NVMeoF protocol communications and provides them to the physical host device using the proxy target device. The first target NVMeoF protocol communications and the second host NVMeoF protocol communications configure the physical host device to exchange data with the physical target device.

SYSTEM AND METHOD FOR PROVIDING BANDWIDTH CONGESTION CONTROL IN A PRIVATE FABRIC IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT

Systems and methods for providing bandwidth congestion control in a private fabric in a high performance computing environment. An exemplary method can provide, at one or more microprocessors, a first subnet, the first subnet comprising a plurality of switches, and a plurality of host channel adapters, wherein each of the host channel adapters comprise at least one host channel adapter port, and wherein the plurality of host channel adapters are interconnected via the plurality of switches, and a plurality of end nodes. The method can provide, at a host channel adapter, an end node ingress bandwidth quota associated with an end node attached to the host channel adapter. The method can receive, at the end node of the host channel adapter, ingress bandwidth, the ingress bandwidth exceeding the ingress bandwidth quota of the end node.

METHODS AND APPARATUS RELATED TO A FLEXIBLE DATA CENTER SECURITY ARCHITECTURE

In one embodiment, edge devices can be configured to be coupled to a multi-stage switch fabric and peripheral processing devices. The edge devices and the multi-stage switch fabric can collectively define a single logical entity. A first edge device from the edge devices can be configured to be coupled to a first peripheral processing device from the peripheral processing devices. The second edge device from the edge devices can be configured to be coupled to a second peripheral processing device from the peripheral processing devices. The first edge device can be configured such that virtual resources including a first virtual resource can be defined at the first peripheral processing device. A network management module coupled to the edge devices and configured to provision the virtual resources such that the first virtual resource can be migrated from the first peripheral processing device to the second peripheral processing device.

METHODS AND APPARATUS RELATED TO A FLEXIBLE DATA CENTER SECURITY ARCHITECTURE

In one embodiment, edge devices can be configured to be coupled to a multi-stage switch fabric and peripheral processing devices. The edge devices and the multi-stage switch fabric can collectively define a single logical entity. A first edge device from the edge devices can be configured to be coupled to a first peripheral processing device from the peripheral processing devices. The second edge device from the edge devices can be configured to be coupled to a second peripheral processing device from the peripheral processing devices. The first edge device can be configured such that virtual resources including a first virtual resource can be defined at the first peripheral processing device. A network management module coupled to the edge devices and configured to provision the virtual resources such that the first virtual resource can be migrated from the first peripheral processing device to the second peripheral processing device.

Violation detection and isolation of endpoint devices in soft zoning environment

Systems and methods for handling soft zoning violations comprise assigning a first target device and an endpoint device that is coupled to a switch port of a Fibre Channel (FC) switch to a zone(s). In embodiments, in response to the endpoint device logging into the FC switch, sampled traffic that originates at the endpoint device and ingresses at the switch port may be obtained. In response to determining that the sampled traffic comprises a second traffic that is intended for a second target device that has not been assigned to the zone(s), some action to restrict the second traffic may be performed such as to restrict the non-assigned traffic and prevent devices from sending potentially harmful traffic to other devices that are not assigned to a same zone.

Memcached server functionality in a cluster of data processing nodes

A method is performed by a first server on a chip (SoC) node that is one instance of a plurality of nodes within a cluster of nodes. An operation is performed for determine if a second one of the SoC nodes in the cluster has data stored thereon corresponding to a data identifier in response to receiving a data retrieval request including the data identifier. An operation is performed for determining if a remote memory access channel exists between the SoC node and the second one of the SoC nodes. An operation is performed for access the data from the second one of the SoC nodes using the remote memory access channel after determine that the second one of the SoC nodes has the data stored thereon and that the remote memory access channel exists between the SoC node and the second one of the SoC nodes.

Plastic drive caddy assembly

A drive caddy assembly comprises a plastic frame and a plastic faceplate that includes a plastic tab and a plastic spring that moves along a spring axis that is perpendicular to a longitudinal axis of the drive caddy assembly. The plastic spring is configured to compress from a resting state along the spring axis without moving perpendicular to the spring axis during insertion of the drive caddy assembly into a drive receptacle of a storage server, and is further configured to return to the resting state when the drive caddy assembly is fully seated in the drive receptacle. The plastic tab extends from a side of the plastic spring and is configured to engage with the drive receptacle in a manner that translates a force on the drive caddy assembly along the longitudinal axis into a force on the plastic spring along the spring axis.

System and method for supporting scalable representation of switch port status in a high performance computing environment

System and method for supporting scalable representation of switch port status in a high performance computing environment. In accordance with an embodiment, a scalable representation of switch port status can be provided. By adding a scalable representation of switch port status at each switch (both physical and virtual)—instead of getting all switch port changes individually, the scalable representation of switch port status can combine a number of ports that can scale by just using a few bits of information for each port's status.

System and method for supporting fast hybrid reconfiguration in a high performance computing environment

A hybrid reconfiguration scheme can allow for fast partial network reconfiguration with different routing algorithms of choice in different subparts of the network. Partial reconfigurations can be orders of magnitude faster than the initial full configuration, thus making it possible to consider performance-driven reconfigurations in lossless networks.