Patent application number | Description | Published |
20080313109 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR EVELUATING A STORAGE POLICY - A method for generating a storage policy, the method includes: receiving a storage system target function; and generating, by a machine learning entity, the storage policy in response to: (a) a set of file-related storage operation requests, (b) a state of the storage system before responding to the set of file-related storage operation requests, and (c) the storage system target function. A method for evaluating a storage policy, the method includes: simulating an application of the storage policy by the storage system during a first period, in response to a set of file-related storage operation requests that was provided to the storage system during the first period, to provide a simulation result; wherein the first period starts before the simulating. | 12-18-2008 |
20090113082 | Device, System, and Method of Speculative Packet Transmission - Device, system and method of speculative packet transmission. For example, an apparatus for speculative packet transmission includes: a credit-based flow control interconnect device to initiate speculative transmission of a Transaction Layer Packet if a number of available flow control credits is insufficient for completing the transmission. | 04-30-2009 |
20090204960 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ACCESSING A MEMORY SPACE ALLOCATED TO A VIRTUAL MACHINE - A method for accessing a memory space allocated to a virtual machine, the method includes: receiving a request from the virtual machine to generate, for another virtual machine, a memory credential associated with a certain memory space allocated to the virtual machine; generating, in response to the request, a cryptographically signed credential; sending the cryptographically signed credential to the other virtual machine; receiving from the other virtual machine an access request to access at least one memory entry within the certain memory space; and accessing the at least one memory entry, if the access request complies with the memory credential. | 08-13-2009 |
20090216998 | Apparatus for and Method of Processor to Processor Communication for Coprocessor Functionality Activation - A novel and useful mechanism enabling a processor in a multiprocessor complex to function as a coprocessor to execute a specific function. The method includes a mechanism for activating a coprocessor to function as a coprocessor as well as a mechanism to execute a coprocessor request on the system. The present invention also provides a mechanism for efficient processor to processor communication for processors coupled to a common bus. Overall system performance is enhanced by significantly reducing the use of hardware interrupts for processor to processor communication. | 08-27-2009 |
20090276571 | Enhanced Direct Memory Access - A method for facilitating direct memory access in a computing system in response to a request to transfer data is provided. The method comprises selecting a thread for transferring the data, wherein the thread executes on a processing core within the computing system; providing the thread with the request, wherein the request comprises information for carrying out a data transfer; and transferring the data according to the request. The method may further comprise: coordinating the request with a memory management unit, such that virtual addresses may be used to transfer data; invalidating a cache line associated with the source address or flushing a cache line associated with the destination address, if requested. Multiple threads can be selected to transfer data based on their proximity to the destination address. | 11-05-2009 |
20100049883 | METHOD AND SYSTEM FOR MEMORY ADDRESS TRANSLATION AND PINNING - A method and system for memory address translation and pinning are provided. The method includes attaching a memory address space identifier to a direct memory access (DMA) request, the DMA request is sent by a consumer and using a virtual address in a given address space. The method further includes looking up for the memory address space identifier to find a translation of the virtual address in the given address space used in the DMA request to a physical page frame. Provided that the physical page frame is found, pinning the physical page frame as long as the DMA request is in progress to prevent an unmapping operation of said virtual address in said given address space, and completing the DMA request, wherein the steps of attaching, looking up and pinning are centrally controlled by a host gateway. | 02-25-2010 |
20100169494 | Virtualizing Sockets to Enable the Migration of a System Environment - Techniques for maintaining connectivity between a remote application stored on a remote device and an application being executed in a system environment, wherein the system environment is migrated from a first device to a second device, are provided. A first connection between the remote application stored on the remote device and the application being executed in the system environment stored on the first device is established via a first communication over a first negotiation channel. The first negotiation channel connects a first socket layer interface linked to the application being executed in the system environment to a second socket layer interface linked to the remote application. The first connection between the remote application and the application being executed in the system environment is disconnected for migration of the system environment from the first device to the second device. Disconnecting the first connection is coordinated via the first negotiation channel. A second connection between the remote application stored on the remote device and an application being executed in the migrated system environment stored on the second device is established via a second communication over a second negotiation channel. The second negotiation channel connects a third socket layer interface linked to the application being executed in the migrated system environment to the second socket layer interface linked to the remote application. | 07-01-2010 |
20100242108 | METHOD AND SYSTEM FOR MEMORY PROTECTION AND SECURITY USING CREDENTIALS - A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory. | 09-23-2010 |
20110099135 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR EVALUATING A STORAGE POLICY BASED ON SIMULATION - A computer implemented method for generating a storage policy for a storage system based on simulation results associated with a state of the storage system is provided. The method comprises receiving a target function applicable to a storage system, wherein the target function represents a measure of values associated with storage parameters related to productivity and loss tolerance of the storage system; wherein the simulation results for a state of the storage system are calculated based on a least one of (a) the storage system simulated response to a set of simulated file-related storage operation requests generated based on one or more simulation rules, (b) the state of the storage system before responding to the set of simulated file-related storage operation requests, (c) the storage system target function; and (d) rules for simulating file-related storage operation requests. | 04-28-2011 |
20120131575 | DEVICE EMULATION IN A VIRTUALIZED COMPUTING ENVIRONMENT - Systems and methods for optimizing operation of a physical device in a virtualized computing environment are provided. The method comprises monitoring instructions issued by an application running on a virtual machine's (VM) operating system, wherein the VM is hosted by a hypervisor providing access to a physical device connected to a virtualized computing environment; wherein a device driver supported by the operating system issues one or more instructions to an emulated device supported by the hypervisor to control the physical device according to the issued instructions, wherein the emulated device's registers are implemented in memory of the hypervisor and the instructions issued by the device driver are stored in said registers, wherein the hypervisor handles the instructions, in response to learning that the instructions are stored in said registers. | 05-24-2012 |
20120159486 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ACCESSING A MEMORY SPACE ALLOCATED TO A VIRTUAL MACHINE - A method for accessing a memory space allocated to a virtual machine, the method includes: receiving a request from the virtual machine to generate, for another virtual machine, a memory credential associated with a certain memory space allocated to the virtual machine; generating, in response to the request, a cryptographically signed credential; sending the cryptographically signed credential to the other virtual machine; receiving from the other virtual machine an access request to access at least one memory entry within the certain memory space; and accessing the at least one memory entry, if the access request complies with the memory credential. | 06-21-2012 |
20120159610 | MEMORY PROTECTION AND SECURITY USING CREDENTIALS - A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory. | 06-21-2012 |
20130051222 | IMPLEMENTING REDUNDANCY ON INFINIBAND (IB) NETWORKS - Methods, systems, and physical computer-readable storage medium are provided to improve efficiency of systems operating on internet protocol (IP) over Infiniband (IB) networks. In an embodiment, by way of example only, a method is provided for implementing redundancy for IB networks. The method includes detecting a failure at a first source port of a source node having a plurality of source ports, selecting a new source port, sending an address resolution protocol (ARP) message to one or more other nodes in communication with the source node including an IP address of the source node and IB address of the new source port of the source node, and re-balancing host traffic. | 02-28-2013 |
20130051232 | MANAGING DATA ON INFINIBAND (IB) NETWORKS - Methods, systems, and physical computer-readable storage medium are provided to improve efficiency of systems operating on internet protocol (IP) over Infiniband (IB) networks. A method includes multicasting a first ARP request from a source node, the first ARP request including an IP address of a source port of the source node, and performing load-balancing of host traffic across a plurality of ports of a plurality of nodes by sending a reply from a destination node corresponding to the IP address included in the first ARP request, the reply being sent over the source port to the source node. | 02-28-2013 |
20130170338 | IMPLEMENTING REDUNDANCY ON INFINIBAND (IB) NETWORKS - Method embodiments are provided to improve efficiency of systems operating on internet protocol (IP) over Infiniband (IB) networks. In an embodiment, by way of example only, a method is provided for implementing redundancy for IB networks. The method includes detecting a failure at a first source port of a source node having a plurality of source ports, selecting a new source port, sending an address resolution protocol (ARP) message to one or more other nodes in communication with the source node including an IP address of the source node and IB address of the new source port of the source node, and re-balancing host traffic. | 07-04-2013 |
20130170494 | OPERATING AN INFINIBAND NETWORK HAVING NODES AND AT LEAST ONE IB SWITCH - To improve efficiency of systems operating on internet protocol (IP) over Infiniband (IB) networks, mechanisms are provided for operating a system including a plurality of nodes, each connected to at least one IB switch. A determination is made whether an IP address of a node is included in a first level of a global ARP cache. An IP over IB GUID corresponding to the IP address of the node is identified. A determination is made whether an entry in a second level of the global ARP cache includes the identified IP over IB GUID of the node, and corresponding the IP over IB GUID of the node to IB address information of the node. | 07-04-2013 |
20130229919 | MANAGING DATA ON INFINIBAND (IB) NETWORKS - Mechanisms are provided to improve efficiency of systems operating on internet protocol (IP) over Infiniband (IB) networks. One mechanism includes multicasting a first ARP request from a source node, the first ARP request including an IP address of a source port of the source node, and performing load-balancing of host traffic across a plurality of ports of a plurality of nodes by sending a reply from a destination node corresponding to the IP address included in the first ARP request, the reply being sent over the source port to the source node. | 09-05-2013 |
20140334290 | IMPLEMENTING REDUNDANCY ON INFINIBAND (IB) NETWORKS - Methods, systems, and physical computer-readable storage medium are provided to improve efficiency of systems operating on internet protocol (IP) over Infiniband (IB) networks. In an embodiment, by way of example only, a method is provided for implementing redundancy for IB networks. The method includes detecting a failure at a first source port of a source node having a plurality of source ports, selecting a new source port, sending an address resolution protocol (ARP) message to one or more other nodes in communication with the source node including an IP address of the source node and IB address of the new source port of the source node, and re-balancing host traffic. | 11-13-2014 |