会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • OFFLOADING VIRTUAL MACHINE FLOWS TO PHYSICAL QUEUES
    • 将虚拟机卸载到物理系列中
    • US20130343399A1
    • 2013-12-26
    • US13529747
    • 2012-06-21
    • Srikanth KandulaChanghoon KimAlireza DabaghDeepak BansalDavid A. Maltz
    • Srikanth KandulaChanghoon KimAlireza DabaghDeepak BansalDavid A. Maltz
    • H04L12/56
    • G06F9/5077G06F9/45533H04L41/0893H04L45/38H04L45/586H04L49/70H04L49/90H04L49/9068
    • The present invention extends to methods, systems, and computer program products for offloading virtual machine flows to physical queues. A computer system executes one or more virtual machines, and programs a physical network device with one or more rules that manage network traffic for the virtual machines. The computer system also programs the network device to manage network traffic using the rules. In particular, the network device is programmed to determine availability of one or more physical queues at the network device that are usable for processing network flows for the virtual machines. The network device is also programmed to identify network flows for the virtual machines, including identifying characteristics of each network flow. The network device is also programmed to, based on the characteristics of the network flows and based on the rules, assign one or more of the network flows to at least one of the physical queues.
    • 本发明扩展到用于将虚拟机流卸载到物理队列的方法,系统和计算机程序产品。 计算机系统执行一个或多个虚拟机,并且利用管理虚拟机的网络流量的一个或多个规则对物理网络设备进行编程。 计算机系统还使用规则对网络设备进行编程以管理网络流量。 特别地,网络设备被编程为确定在网络设备处可用于处理虚拟机的网络流的一个或多个物理队列的可用性。 网络设备也被编程为识别虚拟机的网络流,包括识别每个网络流的特征。 网络设备还被编程为基于网络流的特征并且基于规则,将一个或多个网络流分配给至少一个物理队列。
    • 5. 发明授权
    • Inferring candidates that are potentially responsible for user-perceptible network problems
    • 推测可能对用户感知的网络问题负责的候选人
    • US08015139B2
    • 2011-09-06
    • US12039703
    • 2008-02-28
    • Paramvir BahlRanveer ChandraSrikanth KandulaDavid A. MaltzMing ZhangAlbert Greenberg
    • Paramvir BahlRanveer ChandraSrikanth KandulaDavid A. MaltzMing ZhangAlbert Greenberg
    • G06N5/04
    • G06N5/043
    • Candidates that are potentially responsible for user-perceptible network problems may be inferred. In an example embodiment, a system includes an inference engine to produce a list of candidates that are potentially responsible for user-perceptible network problems, with the candidates being network components that may include both services and network elements. A response to a service request may be a non response, an incorrect response, an untimely correct response, or a timely correct response. The user-perceptible network problems may include the untimely correct response as well as the non response and the incorrect response. In another example embodiment, a method includes monitoring a network and producing a list of candidates that are potentially responsible for user-perceptible network problems. The candidates of the list may include both services and network elements of the monitored network.
    • 可能推断可能对用户可感知的网络问题负责的候选者。 在示例实施例中,系统包括推理引擎,以产生潜在地负责用户可感知的网络问题的候选者的列表,候选者是可以包括服务和网络元件的网络组件。 对服务请求的响应可以是非响应,不正确的响应,不合时宜的响应或及时的正确响应。 用户可感知的网络问题可能包括不合时宜的响应以及非响应和不正确的响应。 在另一示例性实施例中,一种方法包括监视网络并产生潜在地负责用户可感知网络问题的候选者列表。 该列表的候选者可以包括被监视网络的服务和网络元件。
    • 6. 发明申请
    • Automated controlling of host over network
    • 通过网络自动控制主机
    • US20130346968A1
    • 2013-12-26
    • US13530064
    • 2012-06-21
    • Yousef A. KhalidiDeepak BansalChanghoon KimSrikanth KandulaDavid A. Maltz
    • Yousef A. KhalidiDeepak BansalChanghoon KimSrikanth KandulaDavid A. Maltz
    • G06F15/177G06F9/455G06F21/00
    • G06F8/61G06F9/5072
    • The provisioning of a host computing system by a controller located over a wide area network. The host computing system has power-on code that automatically executes upon powering up, and causes the host to notify the controller of the host address. In a first level of bootstrapping, the controller instructs the host to download a maintenance operating system. The host responds by downloading and installing a maintenance operating system, enabling further bootstrapping. The persistent memory may further have security data, such as a public key, that allows the host computing system to securely identify the source of the download instructions (and subsequent instructions) as originating from the controller. A second level of bootstrapping may accomplish the configuring of the host with a hypervisor and a host agent. A third level of bootstrapping may accomplish the provisioning of virtual machines on the host.
    • 由位于广域网上的控制器提供主计算系统。 主机计算系统具有在上电时自动执行的上电代码,并使主机向控制器通知主机地址。 在第一级自举中,控制器指示主机下载维护操作系统。 主机通过下载和安装维护操作系统进行响应,实现进一步的自举。 持久存储器还可以具有诸如公开密钥的安全数据,其允许主计算系统将源自该控制器的下载指令(和后续指令)的源安全地标识。 第二级引导可以使用管理程序和主机代理完成主机的配置。 第三级引导可以完成主机上虚拟机的配置。
    • 8. 发明授权
    • Constructing an inference graph for a network
    • 为网络构建推理图
    • US08443074B2
    • 2013-05-14
    • US12039714
    • 2008-02-28
    • Paramvir BahlSrikanth KandulaRanveer ChandraDavid A. MaltzMing ZhangAlbert Greenberg
    • Paramvir BahlSrikanth KandulaRanveer ChandraDavid A. MaltzMing ZhangAlbert Greenberg
    • G06F15/16G06F17/00
    • H04L41/5058H04L41/12
    • Constructing an inference graph relates to the creation of a graph that reflects dependencies within a network. In an example embodiment, a method includes determining dependencies among components of a network and constructing an inference graph for the network responsive to the dependencies. The components of the network include services and hardware components, and the inference graph reflects cross-layer components including the services and the hardware components. In another example embodiment, a system includes a service dependency analyzer and an inference graph constructor. The service dependency analyzer is to determine dependencies among components of a network, the components including services and hardware components. The inference graph constructor is to construct an inference graph for the network responsive to the dependencies, the inference graph reflecting cross-layer components including the services and the hardware components.
    • 构造推理图与创建反映网络中依赖关系的图形有关。 在示例实施例中,一种方法包括确定网络的组件之间的依赖关系,并响应于依赖关系构建网络的推理图。 网络的组件包括服务和硬件组件,推理图反映了跨层组件,包括服务和硬件组件。 在另一示例实施例中,系统包括服务依赖性分析器和推理图构造器。 服务依赖性分析器是确定网络组件之间的依赖关系,包括服务和硬件组件在内的组件。 推理图构造函数是响应于依赖关系构建网络的推理图,反映包括服务和硬件组件在内的跨层组件的推理图。