Patent application number | Description | Published |
20080215698 | Method and Apparatus for Adding Recipients to Sent Email - A data processing system for resending a previously sent email message. A new recipient for the previously sent email message is selected. The new recipient of the previously sent email message is added in response to selecting the new recipient, wherein the previously sent email message is directed to the new recipient and a previous recipient. An indicator to the previously sent email message is added in response to selecting the new recipient, wherein the indicator indicates that the new recipient has been added to a form a new version of the previously sent email message. The new version of the previously sent email message is sent in response to adding the indicator, wherein the indicator causes the new version of the previously sent email message to replace the previously sent email message at an email program of the previous recipient. | 09-04-2008 |
20080222266 | REDIRECTING CLIENT CONNECTION REQUESTS AMONG SOCKETS PROVIDING A SAME SERVICE - A method, system, and program for redirecting client connection requests among sockets providing a same service are provided. An application requests multiple sockets from a kernel. In addition, the application generates a socket call option to bind the sockets to a particular port number and passes a list of the sockets to the kernel, where the list indicates that the sockets will all provide access to server systems providing the same service. In response, the kernel sets up the sockets, bound to the same port, and set to reference one another. Then, when a connection request is received for a first socket in the list with a queue that is full, the kernel redirects the connection request to a second socket in the list with available queue space. Thus, rather than drop the connection request from the first socket when it lacks available queue space, the connection request is redirected to another socket providing access to the same service. | 09-11-2008 |
20080222292 | Method for Allowing Multiple Authorized Applicants to Share the Same Port - In a method comprising an embodiment of the invention, an original application initially binds to a port, and selects or designates a confidential key, which usefully may be a conventional cookie. The invention also sets a socket option, referred to by way of example, as SO_SECURE_REUSEPORT. The confidential key, together with the port number, is then registered with the operating system of a host associated with the port. In order for another application to subsequently bind to the port, such application must provide the operating system with a key that is identical to the confidential key. In one useful embodiment of the invention, a first application binds a socket to a particular port associated with the host. A specified key is registered with the operating system, and a second application is allowed to bind to the particular port only if the second application can furnish the operating system with a key that matches the specified key. | 09-11-2008 |
20080225700 | Protocol Definition for Software Bridge Failover - A method, data processing system, and computer usable code are provided for protocol definition for software bridge failover. In a first aspect of the present invention, a first software bridge determines the proper working operation of a physical adapter. Limbo packets are sent to a second software bridge alerting the second software bridge that the first software bridge is no longer bridging traffic responsive to the physical adapter failure in the first software bridge. The second software bridge receives the limbo packets, and, in response to receiving the limbo packets, asserts primary control and initiates bridging of traffic. In an alternative aspect of the present invention a first software bridge sends keep-alive packets. A second software bridge monitors the keep-alive packets from the first software bridge and, in response to a failure to detect the keep-alive packets from the first software bridge, the second software bridge initiates bridging of traffic. | 09-18-2008 |
20080225847 | ARTICLE FOR IMPROVED NETWORK PERFORMANCE BY AVOIDING IP-ID WRAP-AROUNDS CAUSING DATA CORRUPTION ON FAST NETWORKS - The reassembly timer in a TCP/IP receiver is dynamically set to avoid data corruption on fast networks caused by IP identification wrap-around. A sender generates IP packets with a special option specifying a reassembly time for fragments based on the subnet of the destination or on the calculated round-trip time of the connection. A receiver sets the reassembly timer to the reassembly time specified in the option. A sender can generate IP packets with an alternative option setting a time stamp for the generated packet. A receiver calculates a traversal time based on the difference between the arrival time of the fragment and this time stamp, and sets the reassembly timer based on this traversal time. A receiver can independently set the reassembly timer to a first reassembly time set by the user for fast networks or to a second reassembly timer set by the user for slow networks based on whether the receiver and sender are on the same subnet. | 09-18-2008 |
20080228931 | Method to Reduce the Learning Curve of a Transmission Control Protocol Connection - A method in a data processing system for reducing the learning curve of a transmission control protocol connection. A domain name system is queried for information. The information and a previously used transmission control protocol parameter for a transmission control protocol connection are received from the domain name system. The information and the previously used transmission control protocol parameter are used to configure a current transmission control protocol connection. | 09-18-2008 |
20080256221 | Method and Apparatus for a Secure Network Install - A method, an apparatus, and computer instructions are provided for a secure network install. One aspect of the present invention provides a proxy server within the same subnet of the client for performing a lookup of the boot image file and downloading the boot image file from a boot file server in a secure manner. The client in turn downloads the file from the proxy TFTP server. Another aspect of the present invention modifies the client remote boot code to include a secure boot file download discovery (SBDD) mode. The client starts the SBDD mode by sending a request for a boot image file to a subnet broadcast address and port, which is listened by a proxy TFTP server. The proxy TFTP server receives the client request and downloads the boot image file. The client in turn downloads the boot image file from the proxy TFTP server. | 10-16-2008 |
20080301312 | Tunneling IPv6 Packets - Methods, systems, and products are provided for tunneling IPv6 packets. Embodiments include receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv6 packet having an IPv6 destination address; receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv4 address for a destination IPv6 border router retrieved from a data structure associating IPv6 destination addresses with IPv4 addresses for destination IPv6 border routers; encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet; and sending the encapsulated packet to a destination IPv6 border router at the IPv4 address. In many embodiments, encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet is carried out by adding an IPv4 header to the IPv6 packet. | 12-04-2008 |
20080307532 | SECURELY MAINTAINING COMMUNICATIONS NETWORK CONNECTION DATA - An apparatus and computer-readable medium for securely maintaining communications network connection data is disclosed. According to one embodiment, an apparatus is disclosed according to which a user is prompted for network element address substitution data which specifies a substitute network element address for a network element address associated with a network element of a first communications network. The network element address substitution data is then stored within a first storage element, wherein access to the first storage element outside of the first communications network is restricted. Connection monitor data associated with the first communications network is processed utilizing the network element address substitution data. According to the described embodiment, such connection monitor data processing includes a means for identifying metadata of the connection monitor data which specifies the described network element address, and a means for substituting the metadata with metadata which specifies the substitute network element address. | 12-11-2008 |
20090016369 | ACCESSING DATA PROCESSING SYSTEMS BEHIND A NAT ENABLED NETWORK - A method, system, and program for accessing data processing systems behind a NAT enabled network are provided. According to one aspect of the present invention, a NAT data processing system is located behind a NAT enabled network with a NAT device as a gateway to the NAT enabled network. A client system located outside the NAT enabled network queries the NAT device for the address of the NAT data processing system located behind the NAT enabled network. The query is automatically routed through the NAT device to a DNS server. The DNS server then returns an address for the NAT data processing system and source routing for the NAT device. The NAT device forwards the address and source routing to the client system. Then, the client system sends packets to the NAT data processing system at the address with source routing through the NAT device, such that the NAT data processing system behind the NAT enabled network is directly accessed by the client system from outside the NAT enabled network. | 01-15-2009 |
20090024723 | Method and Apparatus for Centralization Configuration of Data Processing Systems - A computer implemented method, apparatus, and computer usable program code for configuring a remote data processing system. A configuration is identified for the remote data processing system to form an identified configuration. The hardware for the remote data processing system is configured. An installation application is sent to the remote data processing system across a communications link after the hardware in the remote data processing system has been configured, wherein the installation application executes on the remote data processing system to configure the remote data processing system. Installation files are sent across the communications link to the installation application executing on the remote data processing system. The installation program uses the installation files to configure install a set of operating systems, install applications, and configure software on the remote data processing system. | 01-22-2009 |
20090094352 | Method and Apparatus for a Secure Network Install - A method, an apparatus, and computer instructions are provided for a secure network install. One aspect of the present invention provides a proxy server within the same subnet of the client for performing a lookup of the boot image file and downloading the boot image file from a boot file server in a secure manner. The client in turn downloads the file from the proxy TFTP server. Another aspect of the present invention modifies the client remote boot code to include a secure boot file download discovery (SBDD) mode. The client starts the SBDD mode by sending a request for a boot image file to a subnet broadcast address and port, which is listened by a proxy TFTP server. The proxy TFTP server receives the client request and downloads the boot image file. The client in turn downloads the boot image file from the proxy TFTP server. | 04-09-2009 |
20090125615 | ADDRESS RESOLUTION PROTOCOL CHANGE ENABLING LOAD-BALANCING FOR TCP-DCR IMPLEMENTATIONS - Data processing systems, computer implemented methods, and computer program products are provided for updating an address resolution protocol table. Updates received for the address resolution protocol table are comprised of an internet protocol address, a media access control address, and a unique identifier. | 05-14-2009 |
20090135840 | METHOD FOR ADJUSTING MSS OR PACKETS SENT TO A BRIDGE DEVICE POSITIONED BETWEEN VIRTUAL AND PHYSICAL LANS - A method and apparatus are provided for use with a SEA or other bridge device, which is positioned between virtual and physical LANS and is adapted to monitor connection setup packets. If the SEA detects such a packet, it determines whether it can accommodate the MSS value listed in the packet. In one embodiment, a method is provided for implementation by a bridge device positioned to transfer data packets between a specified LPAR system arid a specified host. The method comprises the step of detecting a packet that is transmitted to the bridge device, in order to set up a connection between the LPAR system and the host. The method further comprises determining whether the detected packet indicates an initial MSS value for the connection that is greater than a prespecified MSS value. Upon determining that the detected packet indicates an initial MSS value that exceeds the prespecified MSS value, the packet is altered to establish the prespecified MSS value as the MSS value for the connection. | 05-28-2009 |
20090150510 | SYSTEM AND METHOD FOR USING REMOTE MODULE ON VIOS TO MANAGE BACKUPS TO REMOTE BACKUP SERVERS - A system, method, and program product is provided that receives a backup request at a virtual input/output server (VIOS) from a client of the VIOS. The backup request corresponds to a virtual nonvolatile storage that is used by the client. The VIOS retrieves data from the nonvolatile storage device where the virtual nonvolatile storage is stored. The VIOS transmits the retrieved data to a backup server via a computer network, such as the Internet. In one embodiment, a backup software application runs on the VIOS client and a backup proxy software application runs on the VIOS. | 06-11-2009 |
20090187899 | METHOD FOR INTELLIGENT PATCH SCHEDULING USING HISTORIC AVERAGES OF VIRTUAL I/O UTILIZATION AND PREDICTIVE MODELING - A method for intelligent patch scheduling for a virtual (I/O) server is provided. Virtual I/O performance indicators of a virtual I/O server are monitored. The performance indicators are stored in a database. Historic averages of the performance indicators are maintained in the database. Patches to be applied to a client partition of the virtual I/O server are received. A reboot window is received for the client partition and is an allowed time frame for rebooting to apply the patches. Future virtual I/O utilization is predicted by running predictive modeling utilizing the historic averages of the performance indicators, and based on the predictive modeling, a specific time within the allowed time frame is determined for rebooting the client partition of the virtual I/O server to apply the patches. The virtual I/O server is rebooted to apply the patches to the client partition at the specific time within the reboot window. | 07-23-2009 |
20090210872 | METHOD TO ENHANCE THE SCALABILITY OF NETWORK CACHING CAPABILITY IN VIRTUALIZED ENVIRONMENT - A mechanism is provided to enhance the scalability of network caching capabilities. All network client applications running on a partition in a virtualized environment are configured to query information from a single virtual input/output server (VIOS) network caching daemon. Thus, the illustrative embodiments provide a 1:n model where a VIOS partition has a network caching daemon, and each of the n partitions uses the network caching daemon of the VIOS partition. The mechanism of the illustrative embodiments only requires the system administrator to control one copy of the local files on the VIOS server. The system administrator does not need to monitor all of these local files on each individual partition. The system administrator consolidates the entries used by the different individual partitions into one single file on the VIOS server side. | 08-20-2009 |
20090217066 | CONTROLLING CONNECTION STATUS OF NETWORK ADAPTERS - A method, medium and implementing processing system are provided for controlling the number of Ethernet adapters connected in an EtherChannel depending upon the current bandwidth requirements of the system. This system reduces power consumption, inter alia, wherever possible while not sacrificing performance or flexibility of an EthernetChannel. An exemplary embodiment EtherChannel's total bandwidth utilization is monitored and controlled. When the bandwidth utilization is a predetermined amount less than or more than a predetermined threshold level, power supplied to one or more of the physical Ethernet adapters that are part of the EtherChannel is adjusted, i.e. reduced or increased, accordingly. In another embodiment, in systems where ethernet devices support different levels of power, the power supplied to one or more adapters can be systematically incrementally reduced or increased in response to reduced or increased bandwidth utilization. | 08-27-2009 |
20090307330 | Method for Moving Operating Systems Between Computer Electronic Complexes Without Loss of Service - A system and method for migrating a client partition between computer electronic complexes (CECs) while maintaining access to a Storage Area Network. An active and inactive world wide port name are generated for a client virtual channel adapter. A query is sent to a name server from the VIOS on the source CEC. The name server creates a list of small computer system interface (SCSI) targets that are available. The list is used by the VIOS on the destination CEC to verify whether any physical ports in the destination CEC have access to the same SCSI target. The client partition may be migrated between a source CEC and a destination CEC and the access to the Storage Area Network access may be maintained. | 12-10-2009 |
20090307378 | METHOD AND APPARATUS FOR A FIBRE CHANNEL N-PORT ID VIRTUALIZATION PROTOCOL - Disclosed is a computer implemented method, data processing system and computer program product to discover an SCSI target. The method comprises a client adapter transmitting an N_port ID virtualization (NPIV) login to a virtual I/O server (VIOS). The client adapter receives a successful login acknowledgement from the VIOS and issues a discover-targets command to the fabric. Upon determining that the SCSI target information is received, wherein the SCSI target information includes at least one SCSI identifier. Responsive a determination that SCSI target information is received the client adapter issues a port login to a target port, wherein the target port is associated with the at least one SCSI target. The client adapter makes a process login to form an initiator/target nexus between a client and at least one SCSI target. The client adapter queries the SCSI target by using a world wide port name associated with the target port. | 12-10-2009 |
20090307444 | Systems and Methods For Virtualizing Storage For WPAR Clients Using Node Port ID Virtualization - Systems, methods and media for providing to a plurality of WPARs private access to physical storage connected to a server through a VIOS are disclosed. In one embodiment, a server is logically partitioned to form a working partition comprising a WPAR manager and individual WPARs. Each WPAR is assigned to a different virtual port. The virtual ports are created by using NPIV protocol between the WPAR and VIOS. Thereby, each WPAR has private access to the physical storage connected to the VIOS. | 12-10-2009 |
20090307456 | MIGRATING MEMORY DATA BETWEEN PARTITIONS - A method, system, and computer usable program product for migrating memory data between partitions are provided in the illustrative embodiments. All or a portion of a memory data of the source partition is written to a data storage unit, which may be a shared paging space, or a shared area of a data storage unit other than a paging space. The writing uses a first data communication path configured for paging the memory data. The portion of the memory data from the data storage unit is read at a destination partition. The reading uses a second data communication path configured for paging a second memory data. The read portion of the memory data may be used for executing a migrated application. The writing and reading may use a third and a fourth data communication paths respectively that may be configured for paging memory data to the shared area. | 12-10-2009 |
20090307457 | Systems and Methods for Entitlement of Virtual Real Memory for Applications - Systems, methods and media for dynamic reallocation of memory to an application, the memory from a pool of virtual real memory allocated to a virtual client that executes the application are disclosed. In one embodiment, a virtual client is allocated a pool of virtual real memory. A subset of this pool of virtual real memory is a block of memory allocated for use by an application. The allocation may be stated as a range of allocated memory with an upper and lower limit. The application calls a kernel service when it thinks it needs a new allocation of memory. The new allocation is established by a power hypervisor connected to the virtual client. Memory is exported by way of a Paging Space Partition. | 12-10-2009 |
20090307458 | VIRTUAL REAL MEMORY EXPORTATION FOR LOGICAL PARTITIONS - A computer implemented method, apparatus, and program product for extending virtual memory associated with logical partitions. A hosting partition receives a paging request from a logical partition on a logically partitioned data processing. The hosting partition identifies a location of the physical memory space on a remote computing device assigned to the logical partition and sends an extended virtual memory paging request to an extended virtual memory manager located on the remote computing device using a network connection. The extended virtual memory paging request comprises the instructions for the memory page-in or the memory page-out and the location of the physical memory space on the remote computing device that is being paged-in or paged-out. The extended virtual memory manager performs a page-in operation or a page-out operation in accordance with the instructions for the memory page-in or memory page-out. | 12-10-2009 |
20090307461 | Arrangements for Storing and Retrieving Blocks of Data Having Different Dimensions - A method for storing and retrieving blocks of data having different dimensions is disclosed. The method can include receiving a first data segment to be stored in a block storage device where the first data segment has an address. The method can also include determining if the first data segment conforms to a standard dimension and sorting the first data segment according to the destination address if it does not have a standard dimension. The method can further include placing a non-standard data segment into a unfilled block allocation and placing a second non-standard data segment into the unfilled block allocation when the second data segment has the destination identifier. Other embodiments are also disclosed. | 12-10-2009 |
20090307716 | Block storage interface for virtual memory - A method for interfacing block storage devices is disclosed. The method can include receiving communications from an initiator at a block storage device interface, translating the received communications, transmitting the translated communications to a native storage device driver, forwarding the translated communication to a physical adapter, and controlling physical storage devices in response to the communications received from the initiator. Other embodiments are also disclosed | 12-10-2009 |
20090313401 | Method and System for Providing Multiple Paths to User Data Stored on a SCSI disk - A method and system for providing multiple input/output paths for accessing storage devices includes providing two or more logical paths between a virtual I/O client partition and a storage device and establishing a physical path between the virtual I/O client partition and the storage device by assigning the storage device to a first logical path of the two or more logical paths. The method further includes reestablishing the physical path by dynamically assigning the storage device to a second logical path of the two or more logical paths in an event of unavailability of the first logical path. | 12-17-2009 |
20100030706 | EFFICIENT AUCTIONING OF ELECTRONIC BILLBOARDS BY USING TRAFFIC ESTIMATION DATA FROM MOBILE PHONE SERVICE - The present disclosure is a method for determining an auction reserve price for a display time slot on a billboard. The method may comprise requesting traffic information of an area in proximity of the location of the billboard from a mobile phone service provider and determining the auction reserve price for the display time slot utilizing a pricing model based on the traffic information. | 02-04-2010 |
20110258636 | ADDRESSING A WORKLOAD PARTITION - A method, system, and computer usable program product for addressing a workload partition are provided in the illustrative embodiments. A packet of data directed to the WPAR and including a combined address is received at a software stack. A determination is made whether the combined address includes an identifier that is reserved. If the identifier is not reserved, the identifier is used to identify the WPAR in the data processing system and the packet is sent to the WPAR. The software stack is an application configured to enable data communication using a protocol of the packet, and is modified to detect, recognize, and process the combined address for routing the packet to the WPAR. The combined address may be logically formed using an identifier associated with the data processing system and an identifier associated with the WPAR, which may be located in different portions of the packet. | 10-20-2011 |
20110314248 | STORING AND RETRIEVING BLOCKS OF DATA HAVING DIFFERENT DIMENSIONS IN/FROM BLOCK STORABE DEVICES - A method for storing and retrieving blocks of data having different dimensions is disclosed. The method can include receiving a first data segment to be stored in a block storage device where the first data segment has an address. The method can also include determining if the first data segment conforms to a standard dimension and sorting the first data segment according to the destination address if it does not have a standard dimension. The method can further include placing a non-standard data segment into a unfilled block allocation and placing a second non-standard data segment into the unfilled block allocation when the second data segment has the destination identifier. Other embodiments are also disclosed. | 12-22-2011 |
20120036214 | ALTERNATIVE TRANSFER OF LOGICAL PARTITIONS (LPAR) FROM ONE LPAR COMPUTER SYSTEM TO ANOTHER - An alternative migration of an LPAR from one server system to another when either or both of the server systems cannot access a Storage Area Network (SAN) or like external storage network. If said source and destination server system do not have access to the same SAN, then a mirror image of said all data storage supporting the transferred LPAR is created and transmitted to local storage supporting the destination server system and then the logical partition (LPAR) is transmitted over the connecting network from the source server system to the destination server system. | 02-09-2012 |
20120084071 | Mechanism for NPIV Client Recovery When NPIV Server Goes Down - With N_Port ID Virtualization (NPIV), a managed system can be configured so that multiple logical partitions (LPARs) can access independent physical storage through the same physical fibre channel adapter. An NPIV client recovery component of a virtualization management component, such as a Power Hypervisor (pHYP), provides the emulation mapping between server and client virtual fibre channel adapters. The pHYP also provides a mechanism that prevents client partition crashes when the NPIV server (e.g., a VIOS logical partition) goes down. When the NPIV server is rebooted or powers down, the pHYP handles the client LPARs to avoid a crash by removing processing resources from the client logical partition. Thereby, the client logical partition is prevented from attempting to access a root volume group in physical storage via the NPIV server. The pHYP allocates processor resources to the client LPAR when the NPIV server is again available for UO processing. | 04-05-2012 |
20120110274 | Operating System Image Management - In a data processing system including multiple logical partitions (LPARs), an application executes on a first logical partition (LPAR) of the multiple LPARs, where the application uses a first operation system stored in a first memory partition of a shared pool memory of the data processing system. A virtualization management component (a) initiates an update process that quiesces operations of the first LPAR, (b) pages in, via a virtual input/output server coupled to a first paging device, a first image of a second operating system from the first paging device to the shared pool memory; (c) changes one or more pointers associated with the application to point to one or more portions of the second operating system, such that the application uses the second operating system, when resumed; and (b) resumes execution the application. | 05-03-2012 |
20120110275 | Supporting Virtual Input/Output (I/O) Server (VIOS) Active Memory Sharing in a Cluster Environment - A method, system, and computer program product provide a shared virtual memory space via a cluster-aware virtual input/output (I/O) server (VIOS). The VIOS receives a paging file request from a first LPAR and thin-provisions a logical unit (LU) within the virtual memory space as a shared paging file of the same storage amount as the minimum required capacity. The VIOS also autonomously maintains a logical redundancy LU (redundant LU) as a real-time copy of the provisioned/allocated LU, where the redundant LU is a dynamic copy of the allocated LU that is autonomously updated responsive to any changes within the allocated LU. Responsive to a second VIOS attempting to read a LU currently utilized by a first VIOS, the read request is autonomously redirected to the logical redundancy LU. The redundant LU can be utilized to facilitate migration of a client LPAR to a different computing electronic complex (CEC). | 05-03-2012 |
20120150805 | Efficient Backup and Restore of a Cluster Aware Virtual Input/Output Server (VIOS) Within a VIOS Cluster - In a Virtual Input/Output (I/O) Server (VIOS) partition within a data processing system that comprises cluster-aware VIOSes, a method includes: performing, via a backup/restore utility of a cluster aware (CA) operating system (OS) executing on a processor resource of the first VIOS partition, a backup operation on the first VIOS partition, which creates a first configuration backup file having configuration information about the hardware, logical and virtual devices of the VIOS partition; storing the configuration backup file within local storage; and responsive to receipt of a VIOS restore command: retrieving the configuration backup file from the local storage; and restoring the configuration of the hardware, logical and virtual devices of the first VIOS to a state that existed at a time at which the backup operation creating the configuration backup file was performed. | 06-14-2012 |
20120150815 | EFFICIENT BACKUP AND RESTORE OF VIRTUAL INPUT/OUTPUT SERVER (VIOS) CLUSTER - A method enables cluster-level backup and restore functionality of all Virtual Input/Output Server (VIOS) configuration data within a VIOS cluster and the data of a shared VIOS cluster database. The method comprises: performing, via a backup/restore utility of a VIOS partition, a cluster level backup, which creates a first VIOS cluster configuration backup file having configuration information about hardware, logical and virtual devices of each VIOS partition within a VIOS cluster and all cluster data from the shared VIOS database of the VIOS cluster; storing the VIOS cluster configuration backup file within a storage location; and responsive to receipt of a VIOS restore command at a VIOS partition: retrieving the configuration backup file from the storage location; restoring a configuration of the hardware, logical and virtual devices of each VIOS within the VIOS cluster to prior state; and restoring the shared VIOS database with the backed-up cluster data. | 06-14-2012 |
20120150816 | METHOD AND TOOL TO OVERCOME VIOS CONFIGURATION VALIDATION AND RESTORATION FAILURE DUE TO DRC NAME MISMATCH - In a Virtual Input/Output (I/O) Server (VIOS) partition, a method comprises a cluster aware (CA) operating system (OS) of a VIOS partition performing the functions of: responsive to a restore command: retrieving a configuration backup file from storage; comparing a DRC name from the retrieved file with a DRC name of the current VIOS partition performing the restore operation; in response to an occurrence of a DRC name mismatch: retrieving an initial UUID of the VIOS from the configuration backup file; accessing a UUID table within a management tool; locating a matching UUID to the initial UUID within the UUID table; and in response to locating the matching UUID: verifying that the configuration data file belongs to the current VIOS initiating the restore operation; and performing the restore operation to restore the configurations of the hardware, logical and virtual devices of the first VIOS to an earlier configuration state. | 06-14-2012 |
20120150985 | VIOS Cluster Alert Framework - In a data processing system including a virtual I/O server (VIOS) cluster and multiple logical partitions (LPARs), at least one VIOS of the VIOS cluster performs functions of: receiving first registration information from one or more entities within the VIOS cluster; registering, based on the first registration information, a handler associated with a first message type; responsive to receiving second registration information, registering, based on the second registration information, a listener associated with a second message type; receiving a first message associated with a first alert event of the cluster; determining, based on the first message, that the handler is associated with the first message type; and calling the handler. In one embodiment, the handler is associated with a pointer to a subroutine, and registering the handler includes storing the pointer in a data structure that associates the handler with the first message type. | 06-14-2012 |
20120151095 | ENFORCING LOGICAL UNIT (LU) PERSISTENT RESERVATIONS UPON A SHARED VIRTUAL STORAGE DEVICE - A method, system, and computer program product utilizes cluster-awareness to effectively maintain and update Persistent Reserve (PR) state data and provide nodes with notification of changes to PR state data within a Virtual Input/Output (I/O) Server (VIOS) cluster. A Persistent Reserve (PR) utility identifies a database that is accessible to other VIOSes in the cluster, in which database information about the current state of the Persistent Reservation is maintained. The PR utility checks the current Persistent Reserve state in the database to verify whether an initiator of a PR command is allowed to perform the command. If the initiator is allowed to perform the command, the PR utility modifies/updates the Persistent Reserve state in the database to reflect the received Persistent Reserve command. The PR utility updates the initiator's local copy of the modified PR state data and sends a corresponding notification message to other VIOSes in the cluster. | 06-14-2012 |
20120151265 | SUPPORTING CLUSTER LEVEL SYSTEM DUMPS IN A CLUSTER ENVIRONMENT - A method, system, and computer program product provides simultaneous debugging of multiple OS image and/or system dump pairs in a distributed storage repository. A management console receives a terminal debugging session request and a cluster selection from an interface and starts a debugger instance. The debugger instance autonomously identifies client LPARs and loads the system dump images assigned to the client LPARs. In response to receiving a selection of a first and second client LPARs, the debugger analyzes the first and second system dump images, respectively, and calculates relational information between the first analysis and the second analysis via one or more logical reasoning utilities of the management console. The debugger then loads the relational information to the management console interface with an analysis of one or more similarities between the first and second system dumps. | 06-14-2012 |
20120179771 | SUPPORTING AUTONOMOUS LIVE PARTITION MOBILITY DURING A CLUSTER SPLIT-BRAINED CONDITION - A method, data processing system, and computer program product autonomously migrate clients serviced by a first VIOS to other VIOSes in the event of a VIOS cluster “split-brain” scenario generating a primary sub-cluster and a secondary sub-cluster, where the first VIOS is in the secondary sub-cluster. The VIOSes in the cluster continually exchange keep-alive information to provide each VIOS with an up-to-date status of other VIOSes within the cluster and to notify the VIOSes when one or more nodes loose connection to or are no longer communicating with other nodes within the cluster, as occurs with a cluster split-brain event/condition. When this event is detected, a first sub-cluster assumes a primary sub-cluster role and one or more clients served by one or more VIOSes within the secondary sub-cluster are autonomously migrated to other VIOSes in the primary sub-cluster, thus minimizing downtime for clients previously served by the unavailable/uncommunicative VIOSes. | 07-12-2012 |
20120179798 | AUTONOMOUS PRIMARY NODE ELECTION WITHIN A VIRTUAL INPUT/OUTPUT SERVER CLUSTER - In a data processing system having a plurality of virtual input/output servers (VIOSes) configured within a VIOS cluster, a method, data processing system and computer program product provide for autonomous election of a primary node within a virtual input/output server (VIOS) cluster. A first VIOS performs the functions of: detecting that a primary node is required for the VIOS cluster; and autonomously initiating an election process to elect a next primary node from among the VIOSes within the VIOS cluster. When the first VIOS meets the pre-established requirements for becoming a primary node, the first VIOS obtains a lock on a primary node ID field within a VIOS database (DB) and then initiates a primary node commit process to assign the first VIOS as the primary node. The first VIOS issues a notification to the VIOS cluster to notify the other VIOSes that a primary node has been elected. | 07-12-2012 |
20120179837 | COMMUNICATION PROTOCOL FOR VIRTUAL INPUT/OUTPUT SERVER (VIOS) CLUSTER COMMUNICATION - A first Virtual Input/Output Server (VIOS) of a VIOS cluster performs the functions of: generating, at a sending daemon of the first VIOS, a send message that is to be transmitted to a receiving daemon at a second VIOS; in response to completion of the generating of the send message, forwarding the send message to a sending virtual small computer systems interface (vscsi) kernel extension (VKE) via a system call interface; and in response to the sending VKE receiving the send message from the sending daemon, forwarding the send message to one or more second VIOSes within the VIOS cluster utilizing a kcluster interface. The sending VKE parses at least one of a message header and a sub-header of the send message; and responsive to detection of a broadcast setting for the send message, the VKE forwards the send message to all nodes within the cluster via a cluster broadcast. | 07-12-2012 |
20120180070 | SINGLE POINT, SCALABLE DATA SYNCHRONIZATION FOR MANAGEMENT OF A VIRTUAL INPUT/OUTPUT SERVER CLUSTER - A method, data processing system and computer program product provide scalable data synchronization for a virtual input/output server (VIOS) cluster and one or more registered callers. A first VIOS is commits as a primary node of the VIOS cluster and performs the functions of: registering one or more callers to receive notification from the first VIOS of specific events occurring within the cluster; receiving notification of an occurrence of one of the specific events; and in response to receiving notification of the specific events, a deamon of the first VIOS retrieving a message payload file from a message payload file directory within the shared VIOS DB and passing the message payload file to the API, which forwards/posts the relevant event notification information from the message payload file to the TCP socket of each registered caller. | 07-12-2012 |
20120207166 | ADDRESSING A WORKLOAD PARTITION - A method for addressing a workload partition is provided in the illustrative embodiments. A packet of data directed to the WPAR and including a combined address is received at a software stack. A determination is made whether the combined address includes an identifier that is reserved. If the identifier is not reserved, the identifier is used to identify the WPAR in the data processing system and the packet is sent to the WPAR. The software stack is an application configured to enable data communication using a protocol of the packet, and is modified to detect, recognize, and process the combined address for routing the packet to the WPAR. The combined address may be logically formed using an identifier associated with the data processing system and an identifier associated with the WPAR, which may be located in different portions of the packet. | 08-16-2012 |
20120246517 | PROVIDING FIRST FIELD DATA CAPTURE IN A VIRTUAL INPUT/OUTPUT SERVER (VIOS) CLUSTER ENVIRONMENT WITH CLUSTER-AWARE VIOSES - A first virtual I/O server (VIOS) provides a cluster aware (CA) operating system (OS) executing on a processor resource of the first VIOS to register the first VIOS within a VIOS cluster. The first VIOS comprises a first field/failure data capture (FFDC) module that executes within the first VIOS and performs the functions of: receiving from an event listener a signal indicating that an FFFDC event/condition has been detected by the first VIOS; and automatically transmitting FFDC data to the shared storage repository for storage of the FFDC data within the shared storage repository. The FFDC module further performs the functions of: transmitting to one or more second VIOSes within the VIOS cluster, one or more messages to inform the one or more second VIOSes of an occurrence of the FFDC event/condition that was detected by the first VIOS. | 09-27-2012 |
20120246642 | Management of File Images in a Virtual Environment - A method, system, and computer program product provides effective management and deployment of image files within a Virtual Input/Output (I/O) Server (VIOS) cluster. An Image Management (IM) utility utilizes a discovery process to establish connections with objects in order to manage these objects. Following discovery of an ICP client, the IM utility enables creation of a virtual server partition and initiates the importing of a captured image to a VIOS cluster Storage Pool (SP). The IM utility creates logical units (LUs) within the Image Management Fileset (IMF) for each file within the captured image. The IM utility maps the LUs to the VIOS Cluster SP using unique image file handles. The IM utility configures the new storage that comprises the created LUs. The IM utility copies image files to the appropriate storage device/LU. When import/copy of the image is completed, the IM utility activates the virtual server partition. | 09-27-2012 |
20120278156 | Optimal Trading in Online Loyalty Point Exchanges - A mechanism is provided for completing a loyalty program transaction. The mechanism forms a coalition of a plurality of customers, including the requesting customer. Each customer within the plurality of customers requests to exchange loyalty points for a reward in a loyalty program. Each customer within the plurality of customers participates in a plurality of loyalty programs. Combined loyalty points of the plurality of customers in the plurality of loyalty programs are sufficient to be exchanged for the rewards requested by the plurality of customers. The mechanism further completes a transaction for each customer within the plurality of customers to exchange an amount of loyalty points in a respective one of the plurality of loyalty programs for a reward, such that completing the transactions for the plurality of customers results in a number of residual points. The mechanism further distributes the number of residual points among the plurality of customers. | 11-01-2012 |
20120331245 | Virtualizing Storage for WPAR Clients - Systems, methods and media for providing to a plurality of WPARs private access to physical storage connected to a server through a VIOS are disclosed. In one embodiment, a server is logically partitioned to form a working partition comprising a WPAR manager and individual WPARs. Each WPAR is assigned to a different port. The virtual ports are created by using NPIV protocol between the WPAR and VIOS. Thereby, each WPAR has private access to the physical storage connected to the VIOS. | 12-27-2012 |
20120331246 | Virtualizing Storage for WPAR Clients Using Node Port ID Virtualization - Systems, methods and media for providing to a plurality of WPARs private access to physical storage connected to a server through a VIOS are disclosed. In one embodiment, a server is logically partitioned to form a working partition comprising a WPAR manager and individual WPARs. Each WPAR is assigned to a different virtual port. The virtual ports are created by using NPIV protocol between the WPAR and VIOS. Thereby, each WPAR has private access to the physical storage connected to the VIOS. | 12-27-2012 |
20120331256 | Virtualizing Storage for WPAR Clients Using Key Authentication - Systems, methods and media for providing to a plurality of WPARs private access to physical storage connected to a server through a VIOS are disclosed. In one embodiment, a server is logically partitioned to form a working partition comprising a WPAR manager and individual WPARs. Each WPAR is assigned to a different virtual port. The virtual ports are created by using NPIV protocol between the WPAR and VIOS. Thereby, each WPAR has private access to the physical storage connected to the VIOS. | 12-27-2012 |
20120331533 | Virtualizing Storage for WPAR Clients that Share a Common Operating System of Logical Partition - Systems, methods and media for providing to a plurality of WPARs private access to physical storage connected to a server through a VIOS are disclosed. In one embodiment, a server is logically partitioned to form a working partition comprising a WPAR manager and individual WPARs. Each WPAR is assigned to a different virtual port. The virtual ports are created by using NPIV protocol, between the WPAR and VIOS. Thereby, each WPAR has private access to the physical storage-connected to the VIOS. | 12-27-2012 |
20130013285 | Mechanism for NPIV Client Recovery When NPIV Server Goes Down - With N_Port ID Virtualization (NPIV), a managed system can he configured so that multiple logical partitions (LPARs) can access independent physical storage through the same physical fibre channel adapter. An NPIV client recovery component of a virtualization management component, such as a Power Hypervisor (pHYP), provides the emulation mapping between server and client virtual fibre channel adapters. The pHYP also provides a mechanism that prevents client partition crashes when the NPIV server (e.g., a VIOS logical partition) goes down. When the NPIV server is rebooted or powers down, the pHYP handles the client LPARs to avoid a crash by removing processing resources from the client logical partition. Thereby, the client logical partition is prevented from attempting to access a root volume group in physical storage via the NPIV server. The pHYP allocates processor resources to the client LPAR when the NPIV server is again available for I/O processing. | 01-10-2013 |
20130013569 | Efficient Backup and Restore of Virtual Input/Output Server (VIOS) Cluster - A method enables cluster-level backup and restore functionality of all Virtual Input/Output Server (VIOS) configuration data within a VIOS cluster and the data of a shared VIOS cluster database. The method comprises: performing, via a backup/restore utility of a VIOS partition, a cluster level backup, which creates a first VIOS cluster configuration backup file having configuration information about hardware, logical and virtual devices of each VIOS partition within a VIOS cluster and all cluster data from the shared VIOS database of the VIOS cluster; storing the VIOS cluster configuration backup file within a storage location; and responsive to receipt of a VIOS restore command at a VIOS partition: retrieving the configuration backup file from the storage location; restoring a configuration of the hardware, logical and virtual devices of each VIOS within the VIOS cluster to prior state; and restoring the shared VIOS database with the backed-up cluster data. | 01-10-2013 |
20130031341 | Hibernation and Remote Restarting Hibernation Data in a Cluster Environment - Hibernation and remote restore functions of a client logical partition (LPAR) that exists within a data processing system having cluster-aware Virtual Input/Output (I/O) Servers (VIOSes) is performed via receipt of commands via a virtual control panel (VCP) through an underlying hypervisor. The client hibernation data file is stored in a shared repository by a source/original VIOS assigned to the client. The hypervisor receives a remote restart command and assigns a target/remote client LPAR and a target VIOS. The source I/O adapters and target I/O adapters are locked and the target VIOS gathers adapter configuration information from the source VIOS and configures the target adapters to be able to perform the I/O functionality provided by the source adapters to the client LPAR. The target VIOS then retrieves the client's hibernation data file, and the client LPAR is restored at the remote LPAR with the target VIOS providing the client's I/O functionality. | 01-31-2013 |
20130117481 | FIBRE CHANNEL N-PORT ID VIRTUALIZATION PROTOCOL - Disclosed is a computer implemented method, data processing system and computer program product to discover an SCSI target. The method comprises a client adapter transmitting an N_port ID virtualization (NPIV) login to a virtual I/O server (VIOS). The client adapter receives a successful login acknowledgement from the VIOS and issues a discover-targets command to the fabric. Upon determining that the SCSI target information is received, wherein the SCSI target information includes at least one SCSI identifier. Responsive a determination that SCSI target information is received the client adapter issues a port login to a target port, wherein the target port is associated with the at least one SCSI target. The client adapter makes a process login to form an initiator/target nexus between a client and at least one SCSI target. The client adapter queries the SCSI target by using a world wide port name associated with the target port. | 05-09-2013 |
20130132945 | VIRTUAL MACHINE UPDATES - Various systems, processes, and products may be used to update virtual machines. In particular implementations, a system, process, and product for updating virtual machines may include the ability to determine whether a change to a portion of an operating system for a virtual machine is available and identify a virtual machine using the operating system. The system, process, and product may also include the ability to determine when the virtual machine is modifiable and update the portion of the operating system for the virtual machine when it is modifiable. | 05-23-2013 |
20130185405 | USE OF A SYSTEMS MANAGEMENT TOOL TO MANAGE AN INTEGRATED SOLUTION APPLIANCE - An embodiment of the invention comprises a method for use with an integrated solution appliance under control of a management tool, the appliance having at least a console and a plurality of servers. The method includes providing the management tool with a CAM configured to participate in managing the appliance when used to implement a deployed solution. The CAM is furnished with a CTM for use in acquiring appliance level information, which includes specified metadata pertaining to each server. The CAM is also furnished with a COM, wherein the COM is operable to interact with components of the management tool, and is further operable to use information acquired by the CTM to selectively modify one or more commands issued by the management tool, which respectively affect operation of the appliance. | 07-18-2013 |
20130254165 | Efficient Backup and Restore of a Cluster Aware Virtual Input/Output Server (VIOS) Within a VIOS Cluster - In a Virtual Input/Output (I/O) Server (VIOS) partition within a data processing system that comprises cluster-aware VIOSes, a method includes: performing, via a backup/restore utility of a cluster aware (CA) operating system (OS) executing on a processor resource of the first VIOS partition, a backup operation on the first VIOS partition, which creates a first configuration backup file having configuration information about the hardware, logical and virtual devices of the VIOS partition; storing the configuration backup file within local storage; and responsive to receipt of a VIOS restore command: retrieving the configuration backup file from the local storage; and restoring the configuration of the hardware, logical and virtual devices of the first VIOS to a state that existed at a time at which the backup operation creating the configuration backup file was performed. | 09-26-2013 |
20140074872 | Managing Workload Optimized Systems using Relational Database Modeling and Triggers - Relational database modeling and triggers are employed and coordinated to maintain and manage tunable parameters and characteristics of a Workload Optimized System. The database model is initialized with pre-defined values as per definition of Workload Optimized Systems, which models the optimal configuration of the workload-optimized system, capturing various performance configurations, security and other related system and software configuration. The values present the optimal values for the entire solution. A daemon is run to monitor for changes in the tunable configuration settings, which also updates the current values of the configuration parameters on the RDBMS. SQL Triggers are implemented on the database to identify cases where corrective actions are required to the configuration parameters. | 03-13-2014 |
20140129716 | MOBILITY OPERATION RESOURCE ALLOCATION - According to one aspect of the present disclosure, a method and technique for mobility operation resource allocation is disclosed. The method includes: receiving a request to migrate a running application from a first machine to a second machine; displaying an adjustable resource allocation mobility setting interface indicating a plurality of mobility settings comprising at least one performance-based mobility setting and at least one concurrency-based mobility setting; receiving, via the interface, a selection of a mobility setting defining a resource allocation to utilize for the migration; and migrating the running application from the first machine to the second machine utilizing resources as set by the selected mobility setting. | 05-08-2014 |
20140129958 | MOBILITY OPERATION RESOURCE ALLOCATION - According to one aspect of the present disclosure a system and technique for mobility operation resource allocation is disclosed. The system includes a first machine having a running application, and a management console operable to manage migrating the running application from the first machine to a second machine. The management console is operable to: display an interface indicating a plurality of selectable mobility settings, each mobility setting corresponding to a desired resource allocation to utilize for the migration; receive via the interface, a selection of a mobility setting to apply for migrating the running application; and initiate migration of the running application from the first machine to the second machine utilizing resources as set by the selected mobility setting. | 05-08-2014 |
20150040126 | Utilizing Multiple Memory Pools During Mobility Operations - A mechanism is provided in a data processing system for performing a logical partition migration utilizing multiple paths. Responsive to a virtual machine monitor initiating a logical partition migration operation to move a logical partition from a source system to a destination system, the mechanism allocates a plurality of memory pools and a plurality of threads from a mover service partition to the virtual machine monitor. The virtual machine monitor performs the logical partition migration operation utilizing each of the plurality of threads to transfer a corresponding one of the plurality of memory pools from the source system to the destination system to effect the logical partition migration operation. | 02-05-2015 |
20150040128 | Utilizing Multiple Memory Pools During Mobility Operations - A mechanism is provided in a data processing system for performing a logical partition migration utilizing multiple paths. Responsive to a virtual machine monitor initiating a logical partition migration operation to move a logical partition from a source system to a destination system, the mechanism allocates a plurality of memory pools and a plurality of threads from a mover service partition to the virtual machine monitor. The virtual machine monitor performs the logical partition migration operation utilizing each of the plurality of threads to transfer a corresponding one of the plurality of memory pools from the source system to the destination system to effect the logical partition migration operation. | 02-05-2015 |
20150046589 | Utilizing Multiple Mobile Service Partitions During Mobility Operations - A mechanism is provided in a data processing system for performing a logical partition migration utilizing multiple mover service partition pairs. Responsive to a virtual machine monitor initiating a logical partition migration operation to move a logical partition from a source system to a destination system, the mechanism establishes a plurality of input/output paths between a plurality of mover service partition pairs. The virtual machine monitor performs the logical partition migration operation using the plurality of mover service partition pairs to transfer a memory image of the logical partition from the source system to the destination system to effect the logical partition migration operation. | 02-12-2015 |