Patent application number | Description | Published |
20090144250 | Efficient Paging of Search Query Results - Methods and computer-readable media provide for efficient paging of search results in accordance with the access rights of a user. According to various implementations, a request for a search query results in a calculated number of search results being retrieved and analyzed for user access rights. As documents having user access rights are located, session state information corresponding to the number of located documents having user access rights and to the number of analyzed documents required to locate the number of documents having user access rights is maintained. This information is used to dynamically alter the number of subsequent documents that are retrieved in order to fill a page of results. This minimizes redundant determinations of user access rights and minimizes the number of documents required to be retrieved and analyzed in order to fulfill a search query request. | 06-04-2009 |
20090171679 | BUSINESS DATA ACCESS CLIENT FOR ONLINE/OFFLINE CLIENT USE - Architecture for uninterrupted access to business data by enabling work on rich client machines to be stored in a local business data cache that is always available. A dispatching mechanism executes read/write requests against the local cache transparently to a client application, an automatic synchronization mechanism propagates changes bi-directionally when the client goes online and a live connection with the corresponding backend data source is available. A declarative data access model is employed based on operation stereotyping and grouping that enables client applications to transparently execute create, read, update, delete, query (CRUDQ) and association operations against the local cache as if executed against the actual business data source. The architecture supports the offline creation of entities and sets of related entities when the entity identifiers are generated by the business data source and offline navigation of entity associations when foreign keys are not present in the related entities. | 07-02-2009 |
20120089645 | Efficient Paging of Search Query Results - Methods and computer-readable media provide for efficient paging of search results in accordance with the access rights of a user. According to various implementations, a request for a search query results in a calculated number of search results being retrieved and analyzed for user access rights. As documents having user access rights are located, session state information corresponding to the number of located documents having user access rights and to the number of analyzed documents required to locate the number of documents having user access rights is maintained. This information is used to dynamically alter the number of subsequent documents that are retrieved in order to fill a page of results. This minimizes redundant determinations of user access rights and minimizes the number of documents required to be retrieved and analyzed in order to fulfill a search query request. | 04-12-2012 |
20130117749 | Provisioning and Managing an Application Platform - Platform management may be provided. First, a package may be received. The received package may then be separated into a plurality of deployment groups. Next, a plurality of tasks may be created for deploying the plurality of deployment groups. Then the plurality of tasks may be executed. | 05-09-2013 |
20130124481 | UPGRADE OF HIGHLY AVAILABLE FARM SERVER GROUPS - A machine manager controls the deployment and management of machines (physical and virtual) for an online service. Multi-tier server groups are arranged in farms that each may include different configurations. For example, their may be content farms, federated services farms and SQL farms that are arranged to perform operations for the online service. When the multiple farms are upgraded, new farms are deployed and the associated content databases from the old farms are moved to the newly deployed farms. During the upgrade of the farms, requests may continue to be processed by the farms. The farms may be automatically load balanced during an upgrade. As content becomes available on the new farm, requests for the content may be automatically redirected to the new farm. | 05-16-2013 |
20140053144 | SERVICE ENVIRONMENT UPGRADES BASED ON UPGRADE HEALTH OF SERVICE UNITS - Disclosed herein are systems, methods, and software for facilitating technology upgrades. In at least one implementation, an incomplete upgrade to service units within a service environment is initiated. An upgrade health of each of the service units is evaluated based at least in part on results of the incomplete upgrade. A complete upgrade of the service environment is then initiated based at least in part on the upgrade health of each of the plurality of service units. | 02-20-2014 |
20150058681 | MONITORING, DETECTION AND ANALYSIS OF DATA FROM DIFFERENT SERVICES - A fault monitoring, detection and analysis system obtains data (e.g. online service facts) from different data sources. Many times the data obtained from the different data sources is in different formats. The data is classified (e.g. into error, performance and usage events/facts) based on user configured multi-dimensional (time, topology, functional area) filter criteria. The data from the different data sources is normalized into a standard format and stored. The data may also be grouped and duplicates may be removed before and/or after the normalized data is stored. Analysis is performed on the normalized data. For example, the analysis may monitor for expected events, unexpected events, detect abnormal behavior of the system, and the like. Different users may submit different jobs to the system to obtain data from the data store. A reporting service exposes one or more views of the data and/or the analysis of the data. | 02-26-2015 |
20150370767 | CONSISTENT VIEWS OF PARTITIONED DATA IN EVENTUALLY CONSISTENT SYSTEMS - A consistent user view system. The system incorporates any changes made by a user in any views shown to that user even when the changes have not propagated to the partitions supplying the view. The system separates the authority for edits from the replicated storage allowing efficient transactions and linear scalability. Documents are read from view-based partitions of a store. Document writes are written to a document-specific partition in a journal and applied to the store. The system stores a copy of pending changes in a user-specific partition. When a user requests a view, the system checks that user's cache for any pending changes applicable to the view. If any applicable changes are found, the changes are applied before showing the view to the user. Pending changes that have been successfully applied to the store are trimmed from the user-specific partition to free up resources. | 12-24-2015 |
20150370825 | SCALABLE EVENTUAL CONSISTENCY SYSTEM USING LOGICAL DOCUMENT JOURNALING - A scalable eventual consistency system. The system uses logical document journaling to provide eventual consistency across partitions in a large-scale service. The system allows for transactional edits to massively interconnected graphs of documents documents through parallelization without sacrificing linear scalability. The system separates the authority for edits from the replicated storage allowing efficient transactions and linear scalability. All document writes are written to document-specific partitions in a journal where they are queued until the changes are propagated to view-based partitions of a store. By continually checking the journal and attempting to replicate any pending document writes to the store, the system provides eventual consistency without complicated synchronization mechanisms. The system models membership and containment relationships between documents in manner allowing document writes ultimately impacting more than one document to be efficiently handled through the journal as an edit to a single document. | 12-24-2015 |
Patent application number | Description | Published |
20110238696 | Associating Security Trimmers with Documents in an Enterprise Search System - Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored. | 09-29-2011 |
20110314047 | SUBSCRIPTION FOR INTEGRATING EXTERNAL DATA FROM EXTERNAL SYSTEM - Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields. | 12-22-2011 |
20110314085 | OFFLINE MODIFICATION OF BUSINESS DATA - Concepts and technologies for offline modification of business data are disclosed. A client device caches a cached version of business data. A business connectivity services (“BCS”) application executing on the client device reviews modifications made to the cached version of the business data and generates one or more operations corresponding to the modifications. The BCS application maintains a queue of operations. The BCS application reviews the operations in the queue and combines or removes operations that can be combined or removed without affecting the dependencies between related operations. The client device accesses a business data server that hosts the business data, and transmits the operations to the business data server in the determined order. | 12-22-2011 |
20140075248 | Failure Mode Identification and Reporting - When a software component is starting ( | 03-13-2014 |
20150081732 | SUBSCRIPTION FOR INTEGRATING EXTERNAL DATA FROM EXTERNAL SYSTEM - Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields. | 03-19-2015 |
20160034337 | Failure Mode Identification and Reporting - When a software component is starting, such as but not limited to a task or a subtask, the component pushes its identification (ID) onto a stack. The component executes its other instructions. If the component completes its instructions so that it can terminate normally, it pops the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, it will not be able to pop the stack so its ID will remain in the stack. Another software process can read the IDs in the stack to identify which components have failed and can automatically take a specified action, such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component. | 02-04-2016 |
Patent application number | Description | Published |
20080249397 | APPARATUS AND METHOD FOR TARGETING A BODY TISSUE - An apparatus for targeting a desired target site on a body tissue that separates a first body cavity from a second body cavity of a patient includes a catheter having a longitudinally extending catheter lumen and adapted to provide access to the first body cavity. A framing member has a collapsed condition in which the framing member is adapted for insertion into the first body cavity through the catheter lumen and an expanded condition in which the framing member is adapted for placement within the first body cavity. At least one target point is carried by the framing member and is adapted for placement adjacent the body tissue to indicate the desired target site. A method of using the apparatus is also described. | 10-09-2008 |
20110313283 | APPARATUS AND METHOD FOR TARGETING A BODY TISSUE - An apparatus for targeting a desired target site on a body tissue that separates a first body cavity from a second body cavity of a patient includes a catheter having a longitudinally extending catheter lumen and adapted to provide access to the first body cavity. A framing member has a collapsed condition in which the framing member is adapted for insertion into the first body cavity through the catheter lumen and an expanded condition in which the framing member is adapted for placement within the first body cavity. The framing member has a framing member body. At least one target point is carried by the framing member and is adapted for placement adjacent the desired target site. At least one target pathway is attached to at least one target point. At least a portion of the target pathway extends through the catheter lumen. The target pathway is substantially spaced apart from the framing member body. A method of using the apparatus is also described. | 12-22-2011 |
20120022427 | METHOD FOR INCREASING BLOOD FLOW IN OR ABOUT A CARDIAC OR OTHER VASCULAR OR PROSTHETIC STRUCTURE TO PREVENT THROMBOSIS - A method is provided for increasing blood flow in or about a cardiac structure to prevent thrombosis. One step of the method includes providing an implantable sprayer having an elongated tubular body with proximal and distal end portions. The distal end portion includes at least one opening and an anchoring mechanism. The distal end portion of the implantable sprayer is inserted into a cardiac chamber that includes the cardiac structure. The anchoring mechanism is then deployed so that the distal end portion of the implantable sprayer is secured in or about the cardiac structure. Next, the proximal end portion is anastomosed with an artery so that blood flows through the elongated tubular body of the implantable sprayer and is sprayed out of the at least one opening to continuously circulate blood in or about the cardiac structure. | 01-26-2012 |
20130190798 | APPARATUS, SYSTEM, AND METHOD FOR TREATING A REGURGITANT HEART VALVE - An apparatus for treating regurgitation of blood through a diseased heart valve having at least two leaflets includes a lollipop-shaped body member having a proximal end portion, a distal end portion, and an intermediate portion extending between the end portions. The intermediate portion includes an expandable occluding member having an adjustable diameter so that, during at least a portion of the cardiac cycle, at least one of the heart leaflet coapts with a portion of the occluding member to mitigate or prevent regurgitation of blood through the diseased heart valve. The proximal end portion is physically connected to the occluding member and includes a connecting mechanism for operably mating with an adjustment member for adjusting the position and diameter of the occluding member within the diseased heart valve. The distal end portion includes an anchoring member for securing the apparatus in a heart chamber containing the diseased heart valve. | 07-25-2013 |
20140114244 | APPARATUS AND METHOD FOR TARGETING A BODY TISSUE - An apparatus for targeting a desired target site on a body tissue comprising a wall of a first body cavity of a patient includes a target catheter. The framing member has a longitudinal framing member core defining a central framing member axis. At least one target point is carried by the framing member and is adapted for placement adjacent the desired target site. The framing member comprises a plurality of longitudinally extending multi-segment framing strands. | 04-24-2014 |
20140114245 | APPARATUS AND METHOD FOR TARGETING A BODY TISSUE - An apparatus for targeting a desired target site on a body tissue comprising a wall of a first body cavity of a patient includes a target catheter. A framing member has a collapsed condition and an expanded condition. The framing member has a framing member body which includes a bulbous portion defining a maximum body footprint having proximal and distal body ends which are both longitudinally spaced from the maximum body footprint. The framing member is comprised of a plurality of framing member beams. At least three framing member beam arrays of framing member beams are arranged in non-overlapping longitudinal sequence to form at least a portion of the framing member. The framing member beams that make up the framing member substantially each have a width-to-thickness fractional ratio in the range of 0.6-3.0. | 04-24-2014 |
20140114246 | APPARATUS AND METHOD FOR TARGETING A BODY TISSUE - An apparatus for targeting a desired target site on a body tissue comprising a wall of a first body cavity of a patient includes a target catheter. The framing member, when deployed into an expanded condition, has a framing member body which includes a three-dimensionally bulbous portion defining a maximum body footprint in a lateral dimension and has longitudinally spaced proximal and distal body ends which are both longitudinally spaced from the maximum body footprint. The proximal body end is attached to the target catheter. A protrusion has a diameter which is smaller than the maximum body footprint diameter. At least one target point is carried by the framing member and is adapted for placement adjacent the desired target site. At least one target pathway is attached to at least one target point. At least a portion of the target pathway is substantially spaced apart from the framing member body. | 04-24-2014 |
20140155993 | DEVICE FOR MITIGATING OR PREVENTING PARAVALVULAR LEAKS - One aspect of the present disclosure relates to a device for preventing or mitigating paravalvular leakage associated with a valve replacement procedure. The device can include a first ring, a second ring axially spaced apart from the first ring, at least one pad section extending between the first and second rings, and a plurality of centering wires attached to at least one of the first and second rings. | 06-05-2014 |
20140171870 | APPARATUS AND METHOD FOR TARGETING A BODY TISSUE - An apparatus for targeting a desired target site on a body tissue that separates a first body cavity from a second body cavity of a patient includes a catheter having a longitudinally extending catheter lumen and adapted to provide access to the first body cavity. A framing member has a collapsed condition in which the framing member is adapted for insertion into the first body cavity through the catheter lumen and an expanded condition in which the framing member is adapted for placement within the first body cavity. The framing member has a framing member body. At least one target point is carried by the framing member and is adapted for placement adjacent the desired target site. At least one target pathway is attached to at least one target point. At least a portion of the target pathway extends through the catheter lumen. The target pathway is substantially spaced apart from the framing member body. A method of using the apparatus is also described. | 06-19-2014 |
20140243994 | APPARATUS AND METHOD FOR DELIVERING A STRUCTURE TO A DESIRED TARGET SITE - An apparatus for delivering an implanted structure to a desired target site within a body lumen of a patient includes a catheter having a longitudinally extending catheter lumen and adapted to provide access to the body lumen. A framing member has a collapsed condition in which the framing member is adapted for insertion into the body lumen through the catheter lumen and an expanded condition in which the framing member is adapted for placement within the body lumen. At least one target point is carried by the framing member and is adapted for placement adjacent the desired target site. A holding mechanism is carried by the framing member and is adapted to releasably grasp the implanted structure. At least one target pathway is attached to at least one target point. At least a portion of the target pathway extends through the catheter lumen. | 08-28-2014 |
20150359632 | DEVICE, SYSTEM, AND METHOD FOR TREATING A REGURGITANT HEART VALVE - In one aspect of the present disclosure, a device for treating a regurgitant heart valve in a subject can include a flexible, elongated body having a central chordae support portion disposed between first and second arms. The first and second arms can include first and second lumens, respectively, extending longitudinally therethrough. A method of treating a regurgitant heart valve in a subject is also provided. | 12-17-2015 |
20150367084 | APPARATUS AND METHOD FOR TARGETING A BODY TISSUE - An apparatus for targeting a desired target site on a body tissue comprising a wall of a first body cavity of a patient includes a target catheter. The framing member has a longitudinal framing member core defining a central framing member axis. At least one target point is carried by the framing member and is adapted for placement adjacent the desired target site. The framing member comprises a plurality of longitudinally extending multi-segment framing strands. | 12-24-2015 |
20150374932 | APPARATUS AND METHOD FOR TARGETING A BODY TISSUE - An apparatus for targeting a desired target site on a body tissue comprising a wall of a first body cavity of a patient includes a target catheter. A framing member has a collapsed condition and an expanded condition. The framing member has a framing member body which includes a bulbous portion defining a maximum body footprint having proximal and distal body ends which are both longitudinally spaced from the maximum body footprint. The framing member is comprised of a plurality of framing member beams. At least three framing member beam arrays of framing member beams are arranged in non-overlapping longitudinal sequence to form at least a portion of the framing member. The framing member beams that make up the framing member substantially each have a width-to-thickness fractional ratio in the range of 0.6-3.0. | 12-31-2015 |
20150374933 | APPARATUS AND METHOD FOR TARGETING A BODY TISSUE - An apparatus for targeting a desired target site on a body tissue comprising a wall of a first body cavity of a patient includes a target catheter. The framing member, when deployed into an expanded condition, has a framing member body which includes a three-dimensionally bulbous portion defining a maximum body footprint in a lateral dimension and has longitudinally spaced proximal and distal body ends which are both longitudinally spaced from the maximum body footprint. The proximal body end is attached to the target catheter. A protrusion has a diameter which is smaller than the maximum body footprint diameter. At least one target point is carried by the framing member and is adapted for placement adjacent the desired target site. At least one target pathway is attached to at least one target point. At least a portion of the target pathway is substantially spaced apart from the framing member body. | 12-31-2015 |
20160030166 | APPARATUS, SYSTEM, AND METHOD FOR TREATING A REGURGITANT HEART VALVE - An apparatus for treating regurgitation of blood through a diseased heart valve having at least two leaflets includes a lollipop-shaped body member having a proximal end portion, a distal end portion, and an intermediate portion extending between the end portions. The intermediate portion includes an expandable occluding member having an adjustable diameter so that, during at least a portion of the cardiac cycle, at least one of the heart leaflet coapts with a portion of the occluding member to mitigate or prevent regurgitation of blood through the diseased heart valve. The proximal end portion is physically connected to the occluding member and includes a connecting mechanism for operably mating with an adjustment member for adjusting the position and diameter of the occluding member within the diseased heart valve. The distal end portion includes an anchoring member for securing the apparatus in a heart chamber containing the diseased heart valve. | 02-04-2016 |
20160058978 | METHOD AND APPARATUS FOR GUIDING A CATHETER - An apparatus ( | 03-03-2016 |
Patent application number | Description | Published |
20130007218 | Network Assisted Tracker for Better P2P Traffic Management - Embodiments described herein may disclose systems and methods to employ an enhanced tracker in a P2P scenario to increase P2P performance and efficiency. After receiving a request for content the tracker may assist in obtaining as many chunks of the requested content as possible from the plurality of peers on the local network and may obtain any chunks of the requested content not obtained from the plurality of peer on the local network from a randomly selected list of remote peers. | 01-03-2013 |
20130308455 | METHODS AND APPARATUS FOR LOAD BALANCING ACROSS MEMBER PORTS FOR TRAFFIC EGRESSING OUT OF A PORT CHANNEL - Methods and apparatus for load balancing across member ports for traffic egressing out of a port channel are provided herein. An example method according to one implementation may include: assigning a quantized value based on current load to each of the network ports in the port channel; receiving a data packet addressed to egress through the port channel; identifying a traffic flow with which the received data packet is associated; determining whether the identified traffic flow is a new traffic flow; and selecting one of the network ports in the port channel as an egress port. Selection of the egress port may be weighted according to the quantized value of each of the network ports in the port channel. | 11-21-2013 |
20130329730 | Scaling IPv4 in Data Center Networks Employing ECMP to Reach Hosts in a Directly Connected Subnet - Systems and methods are provided for scaling IPv4 networks for large data centers to reach hosts in a directly connected subnet. ToRs may be dynamically selected in a load balanced manner to ensure that any host may deliver packets to any other host in two or less hops. | 12-12-2013 |
20140050217 | Two-Stage Port-Channel Resolution in a Multistage Fabric Switch - In some embodiments, a data packet may be received at a leaf switch. A port-channel associated with a destination port for the data packet may be identified, and the data packet may be transmitted to the destination port via the identified port-channel. | 02-20-2014 |
20140064104 | Host Detection by Top of Rack Switch Devices in Data Center Environments - Techniques are provided for detecting and identifying host devices in a network. At a switch device, a packet is received from a server that is interfaced with a switch device and is configured to host a virtual machine that is a source of the packet. A Media Access Control (MAC) address or an Internet Protocol (IP) address is identified. The MAC address and IP address are associated with the virtual machine. In response to identifying the MAC or IP addresses, the switch device determines whether a binding between the IP and MAC addresses of the virtual machine is present in a database of addresses accessible by the switch device. If the association is not present, based on the fields obtained from the packet header, a request message is sent to the virtual machine to resolve the association between the IP address and the MAC address of the virtual machine. | 03-06-2014 |
20140064270 | Using Fabric Port-Channels to Scale IP Connectivity to Hosts in Directly Connected Subnets in Massive Scale Data Centers - Systems and methods are provided for using fabric port-channels for Switched Virtual Interfaces (SVIs) to scale IP connectivity for hosts in directly connected subnets in massive scale data centers. By representing SVIs by internal fabric port-channels, ToRs hosting the SVI can share routed traffic directed toward hosts within the associated vlan in a load-balanced manner without frequent updates to the FIB/Adjacency tables. | 03-06-2014 |
20140092901 | SYSTEM AND METHOD FOR HARDWARE-BASED LEARNING OF INTERNET PROTOCOL ADDRESSES IN A NETWORK ENVIRONMENT - A method is provided one example embodiment and includes receiving a packet including a source /32 address and a destination /32 address. The source /32 address can indicate an Internet Protocol (IP) address of a source host that sent the packet. The destination /32 address can indicate an IP address of a destination host to which the packet is destined. The method may also include looking up the destination /32 address and the source /32 address in a Forwarding Information Base/adjacency (FIB)/(ADJ) table implemented in a hardware of a leaf switch in a network. Additionally, the method may include adding the source /32 address and corresponding adjacency information to the FIB/ADJ table if the destination /32 address is found in the FIB/ADJ table, and the source /32 address is not found in the FIB/ADJ table. The method may also include forwarding the packet to the destination host. | 04-03-2014 |
20140098823 | Ensuring Any-To-Any Reachability with Opportunistic Layer 3 Forwarding in Massive Scale Data Center Environments - Techniques are provided for updating routing tables of switch devices. At a first switch device of a first rack unit in a network, information is received about addresses of host devices in the network. The addresses are stored in a software cache. A packet is received from a first host device assigned to a first subnet and housed in the first rack unit. The packet is destined for a second host device assigned to a second subnet and housed in a second rack unit in the network. The packet is forwarded using the subnet entry and it may remain sub-optimal during a period before which an entry can be installed form a software cache. The software cache is evaluated to determine the address of the second host device. The packet is then forwarded optimally. This will ensure any-to-any communications in the network initially sub-optimally and subsequently optimally. | 04-10-2014 |
20140112122 | SYSTEM AND METHOD FOR OPTIMIZING NEXT-HOP TABLE SPACE IN A DUAL-HOMED NETWORK ENVIRONMENT - A method for optimizing next-hop table space in a dual-homed network environment is provided and includes associating an Emulated Switch Internet Protocol (ES-IP) address and an Emulated Switch Media Access Control (ES-MAC) address with an Emulated Switch Identifier (ES-ID) of an emulated switch connected to a dual-homed host having a host IP address in a network environment, and populating a host route table with a mapping between the host IP address and the ES-IP address. The method further includes receiving an outgoing packet with the host IP address as a destination address, determining the ES-IP address corresponding to the host IP address, sending out an ARP request for a MAC address corresponding to the ES-IP address, receiving the ES-MAC address, determining the ES-ID corresponding to the ES-MAC address, encapsulating the outgoing packet with the ES-ID, and forwarding the packet. | 04-24-2014 |
20140140244 | SYSTEM AND METHOD FOR OPTIMIZING WITHIN SUBNET COMMUNICATION IN A NETWORK ENVIRONMENT - A method for optimizing within subnet communication in a network environment is provided and includes receiving, at a Top-Of-Rack (ToR) switch, an advertisement from an attached host belonging to a subnet of a network environment, seeking a Media Access Control (MAC) address of a remote host in the subnet, looking up a host information database in a control plane of the ToR switch, and responding to the advertisement with the MAC address of the remote host. If the MAC address is not found, the ToR switch may not respond to the advertisement. The method can further include receiving, at the ToR switch from a remote ToR switch in the subnet, a host information of the remote host in the subnet, including an IP address and the MAC address of the remote host, the Layer 2 broadcast domain it belongs to, and storing the host information in the host information database. | 05-22-2014 |
20140153573 | SYSTEM AND METHOD FOR SCALING IPV6 ADDRESSES IN A NETWORK ENVIRONMENT - An example method is provided and includes receiving, at an ingress switch in a network, a packet from an attached host that is coupled to a destination host, where the packet includes an Internet Protocol version 6 (IPv6) address of a destination host, comparing the IPv6 address with a plurality of entries in a longest prefix match (LPM) table, in which each entry includes a value string and a corresponding mask string configured to detect a match for a specific combination of a segment prefix and a switch-id in the IPv6 address, identifying an egress switch from a matching entry in the LPM table, and forwarding the packet to the egress switch. The IPv6 address includes a combination of segment prefix and switch-id associated with the egress switch. The segment prefix corresponds to an identifier of a network segment, and the switch-id corresponds to an identifier of a switch in the network. | 06-05-2014 |
20140156667 | Increasing Internet Protocol Version 6 Host Table Scalability in Top of Rack Switches for Data Center Deployments - Techniques are provided for optimizing storage of address information in switch device databases. A control packet is received from a source host. An address associated with a host is determined. The address comprises a first and second address component. The first address component is stored in a first database and is mapped to an index value that is stored in the first database. The index value is also stored in a second database along with the second address component. The first database may also be examined to determine whether the first address component is stored in the first database. If the first address component is stored in the first database, the index value mapped to the first address component is retrieved. The second database is examined to determine whether the index value and the second address component are stored in the second database. | 06-05-2014 |
20140219079 | PROVISIONING OF A NEW NODE JOINING AN EXISTING CLUSTER IN A DATA CENTER ENVIRONMENT - A method is provided in one example embodiment and includes identifying for a new node added to a communications network a plurality of existing network nodes respectively connected to one of a plurality of ports of the new node and capable of implementing a particular routing protocol; selecting one of the identified existing network nodes to serve as a designated forwarder (“DF”) for the new node; performing a power on auto provisioning (“PoAP”) procedure in connection with the new node; and opening the ports of the new node to which the identified existing network nodes are connected. | 08-07-2014 |
20140250220 | Optimizing Handling of Virtual Machine Mobility in Data Center Environments - Techniques are provided for sending address information of virtual machines to a physical switch. A migration of a virtual machine to a physical server is detected. The physical server obtains address information of the virtual machine, and upon obtaining the address information of the virtual machine, the physical server sends the address information to a first physical switch that is connected to the physical server. | 09-04-2014 |
20140254589 | "Slow-Start" Problem in Data Center Networks and a Potential Solution - Systems and methods are provided for a multicast based solution to solving the slow-start problem that ensures both optimal (1-hop) and in-sequence delivery of packets to the destination. Packets are hardware switched thereby completely eliminating the slow software switching path. | 09-11-2014 |
20140254590 | SCALABLE MULTICAST ROUTE DISTRIBUTION IN A MULTITENANT DATA CENTER FABRIC IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes determining a route target (“RT”) membership for a network element; determining at least one attribute for the RT membership; and advertising the RT membership with the at least one attribute to other network elements. The at least one attribute may include an RT membership type attribute for indicating whether the RT membership is due to a local virtual network connection, transit support, or both. Additionally or alternatively, the at least one attribute may include a distribution tree binding attribute for indicating a distribution tree for the RT membership. | 09-11-2014 |
20140328343 | ROUTING INTERNET PROTOCOL VERSION 6 LINK-LOCAL ADDRESSES IN A NETWORK ENVIRONMENT - An example method for routing IPv6 link-local addresses in a network environment is provided and includes receiving a packet at a first switch from an attached first host in a virtual local area network (VLAN) associated with a virtual routing and forwarding (VRF) instance of a network environment, where the packet is destined to an Internet Protocol version 6 (IPv6) link-local address of a remote second host in the VLAN, and routing the packet at Layer 3 to a second switch, to which the second host is attached. In specific embodiments, the second switch routes the packet at Layer 3 to the second host if the VRF does not include duplicate IPv6 link-local addresses corresponding to the IPv6 link-local address of the second host; the second switch bridges the packet at Layer 2 to the second host if the VRF includes at least one duplicate IPv6 link-local address. | 11-06-2014 |
20140347994 | METHODS AND APPARATUS FOR LOAD BALANCING ACROSS MEMBER PORTS FOR TRAFFIC EGRESSING OUT OF A PORT CHANNEL - Methods and apparatus for load balancing across member ports for traffic egressing out of a port channel are provided herein. An example method according to one implementation may include: assigning a quantized value based on current load to each of the network ports in the port channel; receiving a data packet addressed to egress through the port channel; identifying a traffic flow with which the received data packet is associated; determining whether the identified traffic flow is a new traffic flow; and selecting one of the network ports in the port channel as an egress port. Selection of the egress port may be weighted according to the quantized value of each of the network ports in the port channel. | 11-27-2014 |
20140348166 | OPTIMAL FORWARDING FOR TRILL FINE-GRAINED LABELING AND VXLAN INTERWORKING - An example method for determining an optimal forwarding path across a network having VxLAN gateways configured to implement both FGL networking and VxLAN capabilities can include learning RBridge nicknames associated with the VxLAN gateways in the network. Additionally, the method can include determining a path cost over the FGL network between each of the VxLAN gateways and a source node and a path cost over the VxLAN between each of the VxLAN gateways and a destination node. Further, the method can include determining an encapsulation overhead metric associated with the VxLAN and selecting one of the VxLAN gateways as an optimal VxLAN gateway. The selection can be based on the computed path costs over the FGL network and the VxLAN and the encapsulation overhead metric. | 11-27-2014 |
20150016300 | SUPPORT FOR VIRTUAL EXTENSIBLE LOCAL AREA NETWORK SEGMENTS ACROSS MULTIPLE DATA CENTER SITES - A method is provided in one example embodiment and includes establishing a virtual trunk link between a first network element and a second network element. The first and second network elements are located at a first site and the first site and a second site comprise at least a portion of an overlay network. The method further includes receiving data traffic at the first network element, which data traffic is associated with a segment of the overlay network, and mapping a first network identifier allocated to the overlay network segment at the first network element to a virtual trunk link and a VLAN ID. The method additionally includes forwarding the data traffic from the first network element to the second network element via the virtual trunk link with the VLAN ID. | 01-15-2015 |
20150043581 | Intelligent Handling of Virtual Machine Mobility in Large Data Center Environments - At a physical device in a network configured to host a virtual switch and one or more virtual machines, a packet is received at the virtual switch from a source virtual machine that is directly attached to that virtual switch. A destination Media Access Control (MAC) address is identified from the packet indicating a destination virtual machine for the packet. In response to determining that the destination MAC address of the packet is not present in a database of MAC addresses accessible by the virtual switch, the destination MAC address of the packet is replaced with a shared MAC address associated with a plurality of physical switches in the network. | 02-12-2015 |
20150046572 | Extending Virtual Station Interface Discovery Protocol (VDP) and VDP-Like Protocols for Dual-Homed Deployments in Data Center Environments - Techniques are provided for provisioning network resources for virtual machines. At a first switch device, a configuration request message is received from a virtual switch to provision virtual network segmentation resources for a virtual machine managed by the virtual switch. The first switch device provisions the virtual network segmentation resources for the virtual machine. The first switch devices sends to a second switch device a first synchronization message that includes information describing the virtual network segmentation resources. The second switch device is a peer of the first switch device. The first switch device also sends to the second switch device a second synchronization message that includes state information indicating that the first switch device is in an active state for servicing the virtual machine and that the second switch device is to be placed in a dormant state for servicing the virtual machine. | 02-12-2015 |
20150063353 | IMPLEMENTATION OF VIRTUAL EXTENSIBLE LOCAL AREA NETWORK (VXLAN) IN TOP-OF-RACK SWITCHES IN A NETWORK ENVIRONMENT - An example method for implementation of virtual extensible local area network (VXLAN) in top-of-rack (ToR) switches in a network environment is provided and includes receiving a packet encapsulated with a VXLAN header having an unknown virtual tunnel endpoint (VTEP) Internet Protocol (IP) address in a network environment, and installing an entry at an index location of a forwarding table. The index location includes an encoding of the VTEP-IP address as a VTEP index (VTEP-IDX), and the entry maps a VXLAN interface to an IP address associated with a VXLAN network interface (VNI). In specific embodiments, the VTEP-IDX is logN bits, where N is a size of the forwarding table. The forwarding table indicates a destination VTEP IP address when encapsulating the packet, and the source VTEP IP address when decapsulating the packet. | 03-05-2015 |
20150085859 | Two-Stage Port-Channel Resolution in a Multistage Fabric Switch - In some embodiments, a data packet may be received at a leaf switch. A port-channel associated with a destination port for the data packet may be identified, and the data packet may be transmitted to the destination port via the identified port-channel. | 03-26-2015 |
20150103692 | Host Traffic Driven Network Orchestration within Data Center Fabric - Presented herein are techniques to handle data packets received at a top-of-rack (ToR) switch in an underlay network hosting one or more tenant networks. The underlay network may comprise a plurality of ToR switches each connected to each of a plurality of spine switches. The data packet may be received from a virtual machine in a tenant network, and have a header with a data packet identifier. A mobility domain identifier may be determined that corresponds to the network portion within which the virtual machine can be migrated. The mobility domain may be configured on the ToR switch on a per-port basis based on the virtual machine connected to the ToR switch port. A unique identifier may be formed based on the data packet identifier and mobility domain identifier. Using this unique identifier, provisioning information may be obtained for the tenant network on the ToR switch. | 04-16-2015 |
20150124814 | ENABLING SCALABLE VIRTUAL MACHINE TRACKING IN A DATA CENTER FABRIC - A method is provided in one example embodiment and includes receiving at a first network element a packet from a second network element; processing the packet at the first network element to obtain information regarding an identity of a virtual machine (“VM”) hosted by the second network element contained within the packet; and storing at the first network element the identifying information. The identifying information stored at the first network element is accessible by at least one third network element. In some embodiments, the first network element comprises a physical switch and the second network element comprises a virtual switch. | 05-07-2015 |
20150139035 | Dynamic Virtual Port Instantiation for Scalable Multitenant Network - A leaf switch of a switch fabric includes multiple ports to connect with respective ones of multiple servers. Virtual local area networks (VLANs) are configured on the leaf switch. Dynamic creation of virtual ports is enabled on the leaf switch for at least one of the VLANs on an as needed basis. The leaf switch receives from a particular server connected to a corresponding one of the ports a notification message that a virtual machine is hosted on the particular server. Responsive to the notification message, the leaf switch dynamically creates a virtual port that associates the corresponding one of the ports with the at least one of the VLANs. | 05-21-2015 |
20150180721 | AUTOMATIC RESOLUTION OF VIRTUAL NETWORK INSTANCE TO VLAN MAPPING CONFLICTS IN DUAL-HOMED DEPLOYMENTS IN A DYNAMIC FABRIC AUTOMATION NETWORK ARCHITECTURE - In accordance with one example embodiment, there is provided a system configured for virtual local area network (VLAN) blocking on a virtual port channel (vPC) member link to handle discrepant virtual network instance (VNI) to VLAN mappings. In other embodiments, the system can be configured for providing Virtual Switch Interface Discovery Protocol (VDP) and virtual switch enhancements to accommodate discrepant VNI to VLAN mappings. In another example embodiment, an apparatus is provided that includes a processor, and a memory coupled to the processor, where the apparatus is configured such that if a server is connected through a virtual port channel, a VDP is used to notify the server of different VNI to VLAN mappings. In another embodiment, the apparatus can extend a VDP Filter Info Field to carry a set of VLANs mapped to a VNI, keyed by leaf MAC addresses that serve as bridge identifiers. | 06-25-2015 |
20150180722 | AUTOMATIC RESOLUTION OF VIRTUAL NETWORK INSTANCE TO VLAN MAPPING CONFLICTS IN DUAL-HOMED DEPLOYMENTS IN A DYNAMIC FABRIC AUTOMATION NETWORK ARCHITECTURE - In accordance with one example embodiment, there is provided a system configured for virtual local area network (VLAN) blocking on a virtual port channel (vPC) member link to handle discrepant virtual network instance (VNI) to VLAN mappings. In other embodiments, the system can be configured for providing Virtual Switch Interface Discovery Protocol (VDP) and virtual switch enhancements to accommodate discrepant VNI to VLAN mappings. In another example embodiment, an apparatus is provided that includes a processor, and a memory coupled to the processor, where the apparatus is configured such that if a server is connected through a virtual port channel, a VDP is used to notify the server of different VNI to VLAN mappings. In another embodiment, the apparatus can extend a VDP Filter Info Field to carry a set of VLANs mapped to a VNI, keyed by leaf MAC addresses that serve as bridge identifiers. | 06-25-2015 |
20160028656 | Extending Virtual Station Interface Discovery Protocol (VDP) and VDP-Like Protocols for Dual-Homed Deployments in Data Center Environments - Techniques are provided for provisioning network resources for virtual machines. At a first switch device, a configuration request message is received from a virtual switch to provision virtual network segmentation resources for a virtual machine managed by the virtual switch. The first switch device provisions the virtual network segmentation resources for the virtual machine. The first switch devices sends to a second switch device a first synchronization message that includes information describing the virtual network segmentation resources. The second switch device is a peer of the first switch device. The first switch device also sends to the second switch device a second synchronization message that includes state information indicating that the first switch device is in an active state for servicing the virtual machine and that the second switch device is to be placed in a dormant state for servicing the virtual machine. | 01-28-2016 |
20160080247 | OPTIMAL FORWARDING IN A NETWORK IMPLEMENTING A PLURALITY OF LOGICAL NETWORKING SCHEMES - An example method for determining an optimal forwarding path across a network having gateways configured to implement a plurality of logical networking protocols can include determining a path cost over a first logical network between each of the gateways and a source node and a path cost over the a second logical network between each of the gateways and a destination node. Additionally, the method can include determining an encapsulation cost difference between switching packets over the first and second logical networks. The method can also include determining an encapsulation overhead metric associated with one of the first or second logical networks, and weighting one of the first or second path cost by the encapsulation overhead metric. Further, the method can include selecting one of the gateways as an optimal gateway. The selection can be based on the computed path costs. | 03-17-2016 |
Patent application number | Description | Published |
20140067737 | Multivariate Transaction Classification - Embodiments relate to classification of transactions based upon analysis of multiple variables. For a purchase transaction, such variables can include but are not limited to: buying location, source system, line of business, cost center, functional area, supplier capabilities, item description, account description, organization, department, custom parameters, and others. Embodiments may rely upon one or more classification schemes, such as statistical classification, semantic classification, and/or knowledge base classification, taken alone or in combination. In a purchase transaction, classification based on multivariate analysis facilitates identification of a purchased item or service, and hence accuracy in classifying and assigning a central classification code. Particular embodiments may include a feature allowing user review/revision of category assignments via a feedback loop linked to past classification. This revision feature may add clarity to a current transaction, allow modification of future classification for ongoing improvement, and provide a user-driven measure of system performance. | 03-06-2014 |
20140067803 | Data Enrichment Using Business Compendium - Embodiments relate to enrichment of a data warehouse utilizing a business compendium. Embodiments may employ a process comprising data standardization and cleansing, de-duplication of entries, and matching and enrichment, followed by manual review of an enriched record by a user. During standardization, data may be transformed into consistent content, placing correct data elements into appropriate fields, removing invalid characters, and/or standardizing names and addresses. Duplicate records are then detected and marked. During matching and enrichment, the existence of an entity (such as a supplier), may be verified by progressive matching against the business compendium. Enrichment may provide additional information regarding the entity (e.g. related to risk, diversity, and bankruptcy). The enriched record is available for manual review, allowing the user to change duplicates, matches, and parent/child linkages. Feedback from the user review may enhance accuracy of subsequent enrichment by self-learning aspects, reducing over time a need for manual review. | 03-06-2014 |