Dakshi Agrawal - Monsey NY, US Douglas Morgan Freimuth - New York NY, US Sivaram Gottimukkala - Durham NC, US Lap Thiet Huynh - Apex NC, US Dinakaran B. Joseph - Durham NC, US John J. Majikes - Apex NC, US David Paul Olshefski - Danbury CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707 2, 707 3, 707100
Abstract:
A fast policy classification method and system. A policy differentiator can be provided which can include a policy repository configured to store hierarchical policy classification trees. The policy differentiator further can include a hashing module configured to produce integer values for string based selector attributes. In one aspect of the invention, the hashing module can include a longest string hashing function. A policy matching engine can be provided which is configured to locate policy rules in the hierarchical policy classification trees according to the integer values produced for the string based selector attributes. Finally, a policy matching engine interface can be provided through which policy queries and resulting policy decisions of the policy matching engine can be communicated between the policy matching engine and the policy enforcement entity.
State Recovery And Failover Of Intelligent Network Adapters
Douglas Morgan Freimuth - New York NY, US Ronald Mraz - South Salem NY, US Erich Nahum - New York NY, US Prashant Pradhan - New Rochelle NY, US Sambit Sahu - Mahopac NY, US John Michael Tracey - Yonkers NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
714 13, 714 4, 714 15, 370220
Abstract:
The present invention provides a method, computer program product, and data processing system for efficiently recovering state and performing failover of a network offload engine. The present invention distinguishes between the hard state and the soft state of a protocol. Hard state is state information that, when lost, leads to incorrect protocol behavior. Soft state is state information that may be lost or become inconsistent without loss of correctness. The present invention ensures correctness by always being able to recover the hard state of the protocol. A preferred embodiment of the present invention performs a failover of a network offload engine by temporarily blocking the reception of network packets, recovering hard state from host information, resuming network operation using a substitute network offload engine, and recovering soft state from the subsequent network activity.
Douglas Morgan Freimuth - New York NY, US Ashish Mehra - Mountain View CA, US Renu Tewari - San Jose CA, US Thiemo Voigt - Uppsala, SE
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16 G06F 7/04
US Classification:
709224, 709217, 726 3
Abstract:
The increasing number of Internet users and innovative new services such as e-commerce are placing new demands on Web servers. It is becoming essential for Web servers to provide performance isolation, have fast recovery times, and provide continuous service during overload at least to preferred customers. The invention describes a kernel-based architecture for content-aware service differentiation that protects Web servers against overload by controlling the amount and rate of work entering the system. We have invented a mechanism that provides admission control and service differentiation based on connection and application level information. The application header-based connection control uses application-level information (such as URIs and cookies for HTTP) to define different service differentiation actions. The present invention provides the kernel mechanisms that are more efficient and scalable than application level controls implemented in current Web servers.
Method, Apparatus, And Computer Program Product For Routing Packets Utilizing A Unique Identifier, Included Within A Standard Address, That Identifies The Destination Host Computer System
William T. Boyd - Poughkeepsie NY, US Douglas M. Freimuth - New York NY, US William G. Holland - Cary NC, US Steven W. Hunter - Raleigh NC, US Renato J. Recio - Austin TX, US Steven M. Thurber - Austin TX, US Madeline Vega - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 13/00
US Classification:
710316, 370389
Abstract:
A computer-implemented method, apparatus, and computer program product are disclosed in a data processing environment that includes host computer systems that are coupled to adapters utilizing a switched fabric for routing packets between the host computer systems and the adapters. A unique destination identifier is assigned to one of the host computer systems. A portion of a standard format packet destination address is selected. Within a particular packet, the portion is set equal to the unique identifier that is assigned to the host computer system. The particular packet is then routed through the fabric to the host computer system using the unique destination identifier.
Method Using A Master Node To Control I/O Fabric Configuration In A Multi-Host Environment
William T. Boyd - Poughkeepsie NY, US Douglas M. Freimuth - New York NY, US William G. Holland - Cary NC, US Steven W. Hunter - Raleigh NC, US Renato J. Recio - Austin TX, US Steven M. Thurber - Austin TX, US Madeline Vega - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 13/00
US Classification:
710316, 709220
Abstract:
A method is directed to use of a master root node, in a distributed computer system provided with multiple root nodes, to control the configuration of routings through an I/O switched-fabric. One of the root nodes is designated as the master root node or PCI Configuration Manager (PCM), and is operable to carry out the configuration while each of the other root nodes remains in a quiescent or inactive state. In one useful embodiment pertaining to a system of the above type, that includes multiple root nodes, PCI switches, and PCI adapters available for sharing by different root nodes, a method is provided wherein the master root node is operated to configure routings through the PCI switches. Respective routings are configured between respective root nodes and the PCI adapters, wherein each of the configured routings corresponds to only one of the root nodes. A particular root node is enabled to access each of the PCI adapters that are included in any configured routing that corresponds to the particular root node.
Routing Mechanism In Pci Multi-Host Topologies Using Destination Id Field
William T. Boyd - Poughkeepsie NY, US Douglas M. Freimuth - New York NY, US William G. Holland - Cary NC, US Steven W. Hunter - Raleigh NC, US Renato J. Recio - Austin TX, US Steven M. Thurber - Austin TX, US Madeline Vega - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 13/00 G06F 13/12 G06F 13/38
US Classification:
710316, 710104
Abstract:
Method and system for address routing in a distributed computing system, such as a distributed computing system that uses PCI Express protocol to communicate over an I/O fabric. A destination identifier is provided to identify a physical or virtual host or end point. When a physical or virtual host or end point receives a PCI data packet it compares a list of source identifiers with destination identifiers to determine if a source identifier included in the transaction packet is associated with a destination identifier included in the transaction packet to determine if the transaction packet has a valid association. If the transaction packet has a valid association, it is routed to the target device. The present invention enables each host that attaches to PCI bridges or switches and shares a set of common PCI devices to have its own PCI 64-bit address space and enables the routing of PCI transaction packets between multiple hosts and adapters, through a PCI switched-fabric bus using a destination identifier.
System And Method For Adaptive Admission Control And Resource Management For Service Time Guarantees
Douglas Morgan Freimuth - New York NY, US Prashant Pradhan - New Rochelle NY, US Sambit Sahu - Mahopac NY, US Renu Tewari - San Jose CA, US Donna N. Dillenberger - Yorktown Heights NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709203, 709217, 709223, 709224, 3703954
Abstract:
A method and system architecture to manage system resources in such a way as to provide service time guarantees to various classes of work using the system. In the case that the system resources are not sufficient to provide the specified service time guarantees, a method and system architecture is provided to limit work into the system such that the guarantees are satisfied and the revenue derived from the system is maximized.
Method Of Routing I/O Adapter Error Messages In A Multi-Host Environment
William T. Boyd - Poughkeepsie NY, US Douglas M. Freimuth - New York NY, US William G. Holland - Cary NC, US Steven W. Hunter - Raleigh NC, US Renato J. Recio - Austin TX, US Steven M. Thurber - Austin TX, US Madeline Vega - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04B 7/212
US Classification:
370242, 714 48, 714 57
Abstract:
A method and apparatus is provided for routing error messages in a distributed computer system comprising multiple root nodes, and further comprising one or more PCI switches and one or more I/O adapters, wherein each root node includes one or more system images. In one useful embodiment, a method is provided for routing I/O error messages to root nodes respectively associated with the errors contained in the messages. The method includes detecting occurrence of an error at a specified one of the adapters, wherein the error affects one of the system images, and generating an error message at the specified adapter. The method further comprises routing the error message from the specified adapter to the particular root node that includes the affected system image. The error message is then selectively processed at the particular root node, in order to identify the affected system image. Usefully, the step of routing the error message includes using a bus/device/function number associated with the error, together with a routing table located in one of the PCI switches, to route the error message to the correct root node and system image.
News
Breakthrough Elastic Cloud-to-Cloud Networking Unveiled by AT&T, IBM ...
"This technology not only represents a new ability to scale big data workloads and cloud computing resources in a single environment but the elastic bandwidth model removes the inefficiency in consumption versus cost for cloud-to-cloud connectivity," said Douglas Freimuth, IBM Research Senior Techni
Date: Jul 29, 2014
Category: Sci/Tech
Source: Google
Youtube
Scappoose Vision Dance Team 2010 Modern
this is the Poose DT dancing our modern routine at our first competiti...