Patent application number | Description | Published |
20080201403 | Maintaning a View of a Cluster's Membership - A method for maintaining a current view of a cluster's membership comprising the steps of maintaining a list of member nodes and updating the list when a modification thereto is noticed by a first node by receiving a first update message from the first node in a second node, thereafter, sending a second update message from the second node to a third node to propagate the modification and sending to the first node a first confirm message from the second or the third node. A node member of a cluster capable of maintaining a first list of neighboring nodes, maintaining a second list of neighboring nodes sharing a current view therewith and ensuring that the first list matches the second by exchanging messages with neighboring nodes, wherein each message comprises topology information. Upon confirmation that both lists match, the node being capable of sending a confirmation message toward neighboring nodes. | 08-21-2008 |
20080244552 | UPGRADING SERVICES ASSOCIATED WITH HIGH AVAILABILITY SYSTEMS - Service upgrade methods and systems for HA applications are described. System level and application level techniques for routing service requests before, during and after service upgrades are illustrated. | 10-02-2008 |
20080275973 | DYNAMIC CLI MAPPING FOR CLUSTERED SOFTWARE ENTITIES - Techniques for mapping availability management (AM) functions to software installation locations are described. An availability management function (AMF) can look-up a component type and determine software associated with that component. For a selected AMF node, the AMF software entity can then determine a pathname prefix associated with that software. The pathname prefix can then be used for various AM functions, e.g., instantiation of a new component or service unit. | 11-06-2008 |
20080307426 | DYNAMIC LOAD MANAGEMENT IN HIGH AVAILABILITY SYSTEMS - Techniques for dynamic load management in processing systems are described. Tuples or vectors, for example, can be used to characterize loads and capacities. Assignments of tasks and redistribution of tasks in the system can be made using the tuples or vectors. | 12-11-2008 |
20090113408 | SYSTEM SYNCHRONIZATION IN CLUSTER - A machine, cluster, computer program product and method for choosing an attribute, based on an occurrence of a predetermined event, to be used in a machine of a cluster that includes plural machines. The method includes storing a runtime variable and a configuration variable for each machine of the cluster, selecting, upon the occurrence of the predetermined event, an attribute from a first list of at least one attribute included in the runtime variable in the cluster, accessing, if the runtime variable is not available, the configuration variable, where the configuration variable includes a second list of at least one attribute and selecting an attribute from the second list, and using the selected attribute in the machine. | 04-30-2009 |
20090164767 | METHODS AND SYSTEMS FOR GENERATING AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATIONS - Techniques for generating a system model for use by an availability management function (AMF) are described. Inputs are received, processed and mapped into outputs which are further processed into a configuration file in an Information Model Management (IMM) Service external Markup Language (XML) format which can be used as a system model by an AMF. | 06-25-2009 |
20090164832 | METHODS AND SYSTEMS FOR GENERATING AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATIONS - Techniques for generating a system model for use by and availability management framework (AMF) are described. Inputs are received, processed and mapped into outputs which are further processed into a configuration file in an Information Model Management (IMM) Service external Markup Language (XML) format which can be used as a system model by an AMF. | 06-25-2009 |
20090265699 | METHODS AND SYSTEMS FOR EMBEDDING UPGRADE STEPS FOR LAYERED ARCHITECTURES - Techniques for upgrading software associated with layered architectures are described. Based on runtime and/or installation dependencies between the layers, upgrade operations are ordered and performed. | 10-22-2009 |
20100235479 | DEVICE AND METHOD FOR IDENTIFYING ENTITIES TO BE UPGRADED, ADDED OR REMOVED - Node, computer software and method for identifying a target set of entities associated with a first configuration of a computer system that are to be modified for arriving at a second configuration of the computer system. The method includes selecting a single service, determining a characteristic of the single service, wherein the characteristic of the service is indicative of whether the single service is provided in both the first and second configurations, only in the first configuration or only in the second configuration, identifying, based on the selected service and its characteristic, one or two corresponding entity groups that are related to the single service, and mapping subsets of entities associated with the identified corresponding entity groups for transitioning the computer system from the first configuration to the second configuration. | 09-16-2010 |
20110035738 | METHOD FOR GENERATING AN UPGRADE CAMPAIGN FOR A SYSTEM - A node, computer readable medium and method for generating an upgrade campaign for a system. The method includes receiving a current configuration of the system and a set of modifications to be implemented into the system to arrive at a new configuration of the system, automatically selecting an upgrade procedure for each modification in the set of modifications to be either a rolling upgrade procedure or a single step upgrade procedure, or a combination of these and generating the automatically selected upgrade procedure for each modification of the set of modifications. | 02-10-2011 |
20110197198 | LOAD AND BACKUP ASSIGNMENT BALANCING IN HIGH AVAILABILITY SYSTEMS - Among other things, embodiments described herein enable systems, e.g., Availability Management Forum (AMF) systems, having service units to operate with balanced loads both before and after the failure of one of the service units. A configuration can be generated which provides for distributed backup roles and balanced active loads. When a failure of a service unit occurs, the active loads previously handled by that service unit are substantially evenly picked up as active loads by remaining service units. | 08-11-2011 |
20110270595 | MODEL DRIVEN APPROACH FOR AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATION GENERATION - A method and system for generating an Availability Management Framework (AMF) configuration based on a model driven approach. The AMF configuration is an instance of an AMF sub-profile that can be used to model resources and services to be protected, and is generated from an instance of the Entity Type Files (ETF) sub-profile and an instance of the Configuration Requirements (CR) sub-profile. The ETF sub-profile can be used to model the resources provided by vendors, and the CR sub-profile can be used to model configuration requirements. Each of the AMF sub-profile, the ETF sub-profile and the CR sub-profile is a specialization of pre-defined Unified Modeling Language (UML) meta-classes. An input that includes an ETF model and a CR model, which are instances of the ETF sub-profile and the CR sub-profile, respectively, is transformed into an AMF model as the AMF configuration. | 11-03-2011 |
20120192157 | HEURISTIC APPROACH ON CHECKING SERVICE INSTANCE PROTECTION FOR AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATIONS - A configuration including Service Instances (SIs) and a list of Service Units (SUs) is to be validated. The SIs are to be allocated to the SUs for protection of the service represented by the SIs. A set of heuristics is applied to determine whether, for each of the SI assignments, the SI can be allocated to one of the SUs whose capacities support the required capacities of the SI. The heuristic then walks the list in order, to find a first SU that supports a current SI. If none of the SUs in the list can support the current SI, the heuristic indicates that the configuration is not validated. In response to a result that at least one of the heuristics in the set indicates the SUs can support all of the SIs, a final result is generated indicating that the configuration is valid. | 07-26-2012 |
20120233501 | Configuration Based Service Availability Analysis of AMF Managed Systems - An Availability Management Framework (AMF) configuration describes how configuration entities of a highly available system are grouped and includes information on service provision and service protection policies against resource failure. The AMF configuration defines a set of failure types for each component and each node, and specifies a failure rate and a recommended recovery for each failure type. A method for evaluating service availability receives the AMF configuration as input, and analyzes it to obtain an actual recovery that the highly available system is to perform when the given component fails. The method maps the AMF configuration to a stochastic model that captures the dependencies among the components and among the configuration entities at multiple levels of the hierarchy. The method utilizes the model to calculate the service availability of the AMF configuration based on the failure rate, the actual recovery and the dependencies. | 09-13-2012 |
20120233608 | Virtualization Support in Platform Management (PLM) Information Model - A method and system for protecting against failure of hardware elements (HEs) in a virtual machine system using an information model with virtualization support. Based on the information model, the method boots virtual machine monitors (VMMs), virtual machines (VMs) and operating systems (OSes). The information model includes a graph of objects representing configured relationships between the hardware elements (HEs), VMMs, VMs, and OSes through parent child relationships between the graph's objects. The graph of objects includes: a domain object, HE objects, VMM objects, VM objects, and OS objects. The VM objects of a migration-enabled type represent those of the VMs that may migrate between the VMMs. Based on the runtime associations between the VMM objects and the VM objects of the migration-enabled type, the method identifies which of the migration-enabled VMs are hosted by a same HE and are therefore vulnerable to hardware failure of the same HE. | 09-13-2012 |
20120240129 | RANKING SERVICE UNITS TO PROVIDE AND PROTECT HIGHLY AVAILABLE SERVICES USING N+M REDUNDANCY MODELS - Among other things, embodiments described herein enable systems, e.g., Availability Management Forum (AMF) systems, having service units to operate with balanced loads both before and after the failure of one of the service units. A method for balancing standby workload assignments and active workload assignments for a group of service units in a system which employs an N+M redundancy model, wherein N service units are active service units and M service units are standby service units is described. An active workload that the N active service units need to handle is calculated and each of the N active service units in the group is provided with an active workload assignment based on the calculated active workload. Standby workload assignments are distributed among the M standby service units substantially equally. | 09-20-2012 |
20120317437 | Ranking Service Units to Provide and Protect Highly Available Services Using the Nway Redundancy Model - Presented are methods and apparatus for protecting a plurality of High Availability (HA) Service Instances (SIs) with a plurality of Service Units (SUs) with an Nway redundancy model. Any of the SUs associated with the Nway redundancy model can simultaneously be assigned an active HA state for some of the SIs and a standby HA state for other SIs. However, only one SU can have the active state for any given SI. The Nway redundancy model is a configured prior to runtime operation. | 12-13-2012 |
20130091485 | BRIDGING THE GAP BETWEEN HIGH LEVEL USER REQUIREMENTS AND AVAILABILITY MANAGEMENT FRAMEWORK CONFIGURATIONS - Configuration requirements for an Availability Management Framework (AMF) configuration are generated from high level user requirements that specify a subset of properties of an AMF configuration. The user requirements are first mapped into entity prototypes defined in an extended Entity Types File (ETF) model. A computer system identifies additional entity prototypes and dependency thereof that support functionalities of the mapped entity prototypes under a set of grouping conditions. The computer system calculates the required number of component service instances (CSIs) and service instances (SIs) that satisfy the user requirements. The calculation is based on the subset of the properties specified by the user requirements and measurements associated with the entity prototypes in the extended ETF model. The computer system then forms configuration requirements including the required number of CSIs and SIs for generating the AMF configuration that satisfies the user requirements. | 04-11-2013 |
20140053158 | COMPARING REDUNDANCY MODELS FOR DETERMINATION OF AN AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATION AND RUNTIME ASSIGNMENT OF A HIGH AVAILABILITY SYSTEM - Redundancy models are compared to determine or assist in determining an Availability Management Framework (AMF) configuration of a highly available system based on quantified service availability of the system. Each redundancy model defines assignments of service-instances to service-units. An analysis model of the system is constructed to capture recovery behaviors of the system for each redundancy model. Service availability of the system is quantified based on the analysis model under one or more scenarios including failure scenarios and recovery scenarios. Based on a comparison of service availability levels provided by the redundancy models and subject to constraints of the HA system, one of the redundancy models is identified that provides a required level of service availability for the system. | 02-20-2014 |
20140101634 | ONTOLOGY-BASED USER REQUIREMENT DECOMPOSITION FOR COMPONENT SELECTION FOR SERVICE PROVISION - Configuration requirements that specify the provision of services using a system-level description are automatically generated from user requirements. The user requirements are decomposed into one or more levels of decomposed functionalities using an ontology as input. The ontology stores known decompositions of functionalities and relations between the known decompositions. The lowest level of the decomposed functionalities is mapped into a set of components provided by vendors, and additional components on which the set of components depend are identified. Based on the set of components and the additional components, a required number of instances of service workload is calculated to generate the configuration requirements of the system that satisfy the user requirements. | 04-10-2014 |
20140157261 | Ensuring Hardware Redundancy in a Virtualized Environment - An Availability Management Framework (AMF) configuration is generated, in which service units of a service group are allocated to node groups and the node groups are allocated to physical nodes. Each service unit is a unit of redundancy for services provided and protected by the service group. Each node group includes a group of virtual machines. Each node group is mapped to a different host group that includes one or more physical nodes. Collocation and separation rules are generated for the virtual machines to specify which virtual machines are collocated in a same node group and which virtual machines are separated by different node groups. Each service unit of the service group is mapped to a different node group to guarantee hardware separation in the AMF configuration for different service units of the service group and for the virtual machines allocated to the different service units. | 06-05-2014 |
20140258999 | System Upgrade Under High Availability Constraints - An embedded step is executed to upgrade multiple layers of a system. The embedded step includes multiple nested steps, and each nested step includes a sequence of actions for upgrading one of the layers. A finite state machine defines the state transitions for each nested step. During the execution of the nested steps, an outer step of the nested steps is transitioned from an executing state into a waiting state after the outer step completes a tear-down. During the transitioning of the outer step, the outer step sends a trigger to an inner step of the nested steps to cause the inner step to transition into the executing state. When the inner step is completed, the outer step is transitioned out of the waiting state to execute a build-up phase. Execution of the embedded step is completed when an outermost step of the nested steps is completed. | 09-11-2014 |
20140259002 | Staging Calculation for Upgrade Campaign Generation - An upgrade campaign is generated for software deployment configuration, based on a source configuration and a target configuration for a software subsystem. A delta between the source configuration and the target configuration is determined. The delta includes a first set, a second set and a third set of the entities to be removed, added and upgraded, respectively, in the software subsystem. Based on dependencies among the entities, a sequence of stages is generated for removing, adding and upgrading the first, second and third sets of the entities, such that the entities are removed, added and upgraded according to a temporal order defined by the sequence of stages. | 09-11-2014 |
20140325036 | Defining Disjoint Node Groups for Virtual Machines with Pre-Existing Placement Policies - Disjoint node groups are generated for a node cluster to guarantee hardware redundancy for each service group to be configured on the node cluster. Each service group includes service units, and each service unit is a unit of redundancy for services provided and protected by the service group. Hardware dependency is identified between virtual machines in the node cluster and hardware elements to host the virtual machines. A first node group set (NG set) is formed using a first criterion to select the virtual machines into different node groups based on the hardware dependency, such that there is no common hardware element between any two node groups in the first NG set. The first NG set is mapped to a first set of service groups. Different node groups of the first NG set are mapped to different service units in each service group of the first set of service groups. | 10-30-2014 |