US20170126619A1 - Determination of a suitable target for an initiator by a control plane processor - Google Patents
Determination of a suitable target for an initiator by a control plane processor Download PDFInfo
- Publication number
- US20170126619A1 US20170126619A1 US15/405,223 US201715405223A US2017126619A1 US 20170126619 A1 US20170126619 A1 US 20170126619A1 US 201715405223 A US201715405223 A US 201715405223A US 2017126619 A1 US2017126619 A1 US 2017126619A1
- Authority
- US
- United States
- Prior art keywords
- target
- dhcp
- initiator
- response
- computational device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 239000003999 initiator Substances 0.000 title claims description 93
- 230000004044 response Effects 0.000 claims abstract description 122
- 238000012545 processing Methods 0.000 claims description 31
- 238000000034 method Methods 0.000 claims description 20
- 238000010586 diagram Methods 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 101100521334 Mus musculus Prom1 gene Proteins 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- WBEJYOJJBDISQU-UHFFFAOYSA-N 1,2-Dibromo-3-chloropropane Chemical compound ClCC(Br)CBr WBEJYOJJBDISQU-UHFFFAOYSA-N 0.000 description 1
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- -1 RAM Proteins 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 239000012620 biological material Substances 0.000 description 1
- 239000011248 coating agent Substances 0.000 description 1
- 238000000576 coating method Methods 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 229910010272 inorganic material Inorganic materials 0.000 description 1
- 239000011147 inorganic material Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000011368 organic material Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 239000011232 storage material Substances 0.000 description 1
Images
Classifications
-
- H04L61/2015—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
- H04L61/5014—Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
Definitions
- iSCSI Internet Small Computer System Interface
- W Internet Protocol
- SAN Storage Area Network
- IETF Internet Engineering Task Force
- RRC Request for Comments
- SCSI Small Computer System Interface
- IP Internet Protocol
- SAM SCSI Architecture Model
- SPC SCSI Primary Commands
- SBC SCSI Block Commands
- SAS Serial Attached SCSI
- SES SCSI Enclosure Standard
- SCC SCSI Controller Commands
- iSCSI Initiators are the iSCSI devices that start an input/output (I/O process) and iSCSI targets are the iSCSI devices that respond to a request to perform an I/O process using SCSI standard commands.
- an initiator device transmits data or commands over the network to a target device.
- the initiator functions as an iSCSI client.
- An iSCSI initiator may be a software initiator or a hardware initiator,
- the hardware initiator may use hardware, typically in combination with software or firmware running on that hardware, to implement iSCSI.
- a target device such as, a server, storage controller or host computer, may include an iSCSI target controller or subsystem to access the SCSI commands stored in the payload of an iSCSI packet, and to perform the SCSI commands
- the iSCSI target may comprise a dedicated network-connected hard disk storage device, a general-purpose computer, etc.
- an iSCSI target may reside in a large storage array.
- the storage array may provide distinct iSCSI targets for numerous clients.
- DH(P) Dynamic Host Configuration Protocol
- IP Internet Protocol
- DHCP Dynamic Host Configuration Protocol
- FIG. 1 illustrates a block diagram of a computing environment for the discovery of a target by an initiator via a control plane processor, in accordance with certain embodiments
- FIG. 2 illustrates a block diagram that shows how a control plane processor module configures switches to forward any Dynamic Host Control Protocol (DHCP) responses to the control plane processor module, in accordance with certain embodiments;
- DHCP Dynamic Host Control Protocol
- FIG. 3 illustrates a block diagram that shows how a control plane processor module generates a modified DHCP response that provides at least an IP address and the target name of an iSCSI target, to an iSCSI initiator, in accordance with certain embodiments;
- FIG. 4 illustrates a block diagram of a computing environment for the discovery of a target by an initiator via a control plane processor where a plurality of chassis enclose a plurality of switches, in accordance with certain embodiments;
- FIG. 5 illustrates first operations for the discovery of a target by an initiator, in accordance with certain embodiments
- FIG. 6 illustrates second operations, in accordance with certain embodiments
- FIG. 7 illustrates third operations, in accordance with certain embodiments.
- FIG. 8 illustrates a block diagram of a computer system that may implement certain components shown in FIG. 1 , in accordance with certain embodiments.
- Servers in a computing environment that supports iSCSI may be designed in various form factors such as tower servers, rack servers, blade servers, microservers, etc.
- Microservers comprise a class of server platforms based on Server System on Chip (SoC) processors deployed in a data center environment.
- SoC Server System on Chip
- the distributed nature of the workloads imposes a high performance per watt, and a high scale-out requirement, on the computing and storage infrastructure. Delivering services to a large number of nodes within a restrictive form factor and within a given restrictive power profile is a core system requirement. Additionally, this scaled out environment should be easy to manage to reduce the overall total cost of ownership.
- Microserver platforms are physically realized via micromodules that contain one or more independent SoC nodes.
- the micromodules are collectively deployed in a system container usually referred to as “Chassis”.
- Each node is a separate coherent domain comprising independent Serial Peripheral Interface (SPI) Flash Basic Input/Output System (BIOS), Boot disk, Voltage Rails (VR), VR controller etc.
- SPI Serial Peripheral Interface
- BIOS Flash Basic Input/Output System
- VR Voltage Rails
- iSCSI In a computing environment comprising of thousands of nodes, data centers may be reluctant to deploy iSCSI as it may impose significant network and infrastructure management requirements to enable iSCSI initiator nodes to discover their respective iSCSI boot target nodes.
- Certain embodiments provide a mechanism by which iSCSI initiator nodes are able to automatically discover iSCSI target nodes. Such embodiments do not impose any overhead to the data center management infrastructure, In addition, such embodiments are able to dynamically match iSCSI initiator nodes with iSCSI target boot nodes based on multiple policy considerations to deliver consistent boot times.
- FIG. 1 illustrates a block diagram of a computing environment 100 for the discovery of a target by an initiator via a control plane processor, in accordance with certain embodiments.
- the components of the computing environment 100 may be implemented in a data center.
- the computing environment 100 may include a compute node 102 that operates as an iSCSI initiator node, a control plane processor (CPP) 104 , a DHCP server 106 , a plurality or storage nodes 108 a . . . 108 m, 110 a . . . 110 n, where the compute node 102 , the control plane processor 104 , the DHCP server 106 and the plurality of storage nodes 108 a . . . 108 m, 110 a . . . 11 . 0 n are all nodes that are coupled via a plurality of switches 112 a . . . 112 p.
- CCP control plane processor
- the nodes within the computing environment 100 may comprise any suitable computing device, such as, a personal computer, a server computer, a mini computer, a mainframe computer, a blade computer, a tablet computer, a touch screen computing device, a telephony device, a cell phone, a mobile computational device, etc., that are implemented in certain embodiments in a plurality of form factors, such as, tower servers, rack servers, blade servers, microservers, etc,
- the compute node 102 , the control plane processor 104 , the DBCP server 106 , the plurality of storage nodes 108 a . . . 108 m, 110 a . . . 110 n, and the plurality of switches 112 a . . . 112 p are enclosed within racks and chassis within the data center within which the computing environment 100 is implemented.
- An exemplary rack comprises of a multiple number of chassis, where a chassis may have an Ethernet switch and multiple nodes.
- the nodes may comprise the compute node 102 , the control plane processor 104 , the DHCP server 106 and the plurality of storage nodes 108 a . . . 108 m, 110 a . . .
- the plurality of switches 112 a . . . 112 p may be Ethernet switches.
- the compute node 102 comprises an iSCSI initiator node.
- the control plane processor 104 configures the path or routing table of the ports of the plurality of switches 111 . 2 a . . . 112 p, and updates the routing tables based on messages from the switches 112 a . . . 112 p.
- the DHCP server 106 that is also referred to as an infrastructure node may be responsible for assigning Internet Protocol (IP) addresses to all nodes.
- IP Internet Protocol
- the switch configuration 114 of the plurality of switches 112 a . . . 112 p is such that a plurality of chassis are interconnected with each other in a fault tolerant manner, and at least one of the switches provide an aggregate uplink port through which one or more of the nodes communicate with other computing environments that are different from the computing environment 100 .
- control plane processor module 116 that executes within the control plane processor 104 .
- the CPP module 116 programs all switches to forward DHCP responses from the DHCP server 106 , generated on a request from a compute node 102 , to itself (i.e., the CPP module 116 ).
- the CPP module 116 then injects a “DHCP Option 17” command to the intercepted DHCP response and sends the modified DHCP response back to the compute node 102 .
- the injected “DHCP Option 17” command includes the path-name (e.g., the address) of an iSCSI target (e.g., an iSCSI target node selected from the storage nodes 108 a . .
- DHCP Option 17 Further details of the “DHCP Option 17” command may be found in section 3.19 of RFC 2132 (“DHCP Options and BOOTP Vendor Extensions”) published by IETF in March 2007.
- a Root Path option specifies the path-name that contains the client's root disk, where the path is formatted as a character string, and the code for the Root Path option is 17 .
- the CPP Module 116 is able to match an iSCSI initiator (i.e., the control node 102 ) with any iSCSI target (e.g., an iSCSI target node selected from the storage nodes 108 a . . . 108 m, 110 a . . . 110 n ) based on policy considerations.
- an iSCSI initiator i.e., the control node 102
- any iSCSI target e.g., an iSCSI target node selected from the storage nodes 108 a . . . 108 m, 110 a . . . 110 n based on policy considerations.
- the policy considerations may provide an iSCSI initiator node with an iSCSI target node that is both proximate to the iSCSI initiator node and has a low processing load, such that system performance within the computing environment 100 is improved in comparison to the situation where the iSCSI target node is relatively distant from the iSCSI initiator node or has a high processing load.
- Certain embodiments shown in FIG. 1 implement an iSCSI deployment such that no additional infrastructure such as an Internet Storage Name Server (iSNS) server is needed to match an initiator node to a target node. More importantly, the initiator to target matches generated by the CPP Module 116 are always bound by the physical scope of the rack. Such containment may not be possible by any other mechanism.
- the switches 112 a . . . 112 p may prioritize iSCSI traffic higher and provide greater performance guarantees for “boot” traffic.
- FIG. 2 illustrates a block diagram 200 that shows how a control plane processor module 202 included in a control plane processor 204 configures (reference numeral 206 ) a plurality of switches 208 a, 208 b , . . . , 208 s to forward all Dynamic Host Control Protocol (DHCP) responses to the control plane processor module 202 , in accordance with certain embodiments.
- DHCP Dynamic Host Control Protocol
- Each of the switches 208 a, 208 b , . . . , 208 s include a DHCP response filter module (e.g., 210 a, 210 b, 210 s ).
- the DEICP response filter modules 210 a, 210 b , . . . , 210 s avoid forwarding a DHCP response from a DHCP server to an iSCSI initiator node, and instead forwards the DHCP response either directly or indirectly to the CPP module 202 .
- FIG. 2 illustrates certain embodiments in which a CPP module 202 configures switches 208 a . . . 208 s to forward DHCP responses to the CPP module 202 instead of forwarding the DI-ICP responses to the iSCSI initiator node.
- FIG. 3 illustrates a block diagram 300 that shows how a control plane processor module 302 generates a modified DHCP response that provides at least an IP address and the target name of an iSCSI target, to an iSCSI initiator, in accordance with certain embodiments.
- the port and LUN are optional, and if not provided the port and UN may default to 3260 and 0 respectively in certain embodiments, multiple target names may be associated with a single iSCSI target, where different versions or types of operating system may be associated with different target names.
- a determination may be made as to which operating system image to use to boot on a particular node, by selecting the appropriate target name of the iSCSI target.
- the compute node 304 that comprises an iSCSI initiator requests a DHCP server 306 for a DHCP address where the request is transmitted to the DEICP server 306 via a switch configuration (as shown via reference numeral 308 ).
- the control plane processor 302 is configured to provide the iSCSI boot configurations to the iSCSI initiator 304 .
- the control plane processor 302 is configured to specify at least the root path in a “DHCP option 17” command in responding with the iSCSI target information back to the iSCSI initiator 304 .
- DHCP Option 17 the iSCSI root path option configuration string uses the following format:
- Server name DHCP server name or valid IPv4 address literal
- Protocol Transportation protocol used by iSCSI
- LUN Logical Unit
- ID Logical Unit
- Target name iSCSI target name to uniquely identify an iSCSI target.
- the DHCP server 306 In response to receiving the request for the DHCP address, the DHCP server 306 returns the DHCP response to the switch configuration, and one or more switches in the switch configuration forward the returned DHCP response to the control plane processor 302 (as shown via reference numeral 310 ).
- the CPP module 312 that executes within the control plane processor 302 receives the DHCP response and adds or modifies the “DHCP Option 17” command in the DHCP response to specify a root disk path to the compute node 304 , where the root disk path corresponds to an IP address and a target name of an iSCSI target node from which the compute node 304 can boot from.
- the CPP module 312 sends the modified DHCP response with the suitable iSCSI target IP address and a target name to the compute node 304 (shown via reference numeral 314 ), and the compute node 304 may boot by using the iSCSI target determined via the iSCSI target IP address and the target name.
- FIG. 3 illustrates certain embodiments in which the control plane processor 302 sends a modified DEICP response to the compute node 304 to indicate the iSCSI target location IP address and target name that is to be used by the compute node 304 to boot.
- FIG. 4 illustrates a block diagram of a computing environment 400 for the discovery of an iSCSI target by an iSCSI initiator via a control plane processor where a plurality of chassis enclose a plurality of switches, in accordance with certain embodiments.
- FIG. 4 shows four exemplary chassis 402 , 404 , 406 , 408 , where each chassis has one or more switches.
- Exemplary switches 410 , 412 , 414 , 416 are shown in FIG. 4 .
- switch 410 and switch 412 are configured to be in direct communication
- switch 412 and switch 416 are configured to be in direct communication
- switch 414 and switch 416 are configured to be in direct communication.
- a compute node 418 may send a DHCP request 420 for securing network operating parameters, such as IP address of the compute node, etc., to the DHCP server 422 via the switches 410 , 414 , 416 .
- the DHCP server 422 may receive the DHCP request 420 and send a DHCP response 424 that is forwarded by the DHCP response filters 426 , 428 , 430 to redirect (reference numeral 433 ) the DHCP response 424 to the control plane processor 434 .
- the CPP module 436 that executes in the control plane processor 434 sends a modified DHCP response (reference numeral 438 ) via a switch (e.g., switch 410 ) to the compute node 418 , where the modified DHCP response 438 indicates that storage node 440 a selected from the plurality of storage nodes 440 a . . . 440 p, 442 a . . . 442 q is to be used for booting by the compute node 418 .
- the storage node 440 a may be proximate to the compute node 418 and lightly loaded, and is preferred over other storage nodes for booting to ensure better system performance.
- the CPP Module 436 may either discover the iSCSI targets 440 a . . . 440 p , 442 a . . . 442 q or each iSCSI target may register with the CPP module 436 , such that based on information maintained by the CPP module 436 the CPP module 436 is able to determine w iSCSI target is most suitable for the compute node 418 to boot from.
- FIG. 4 illustrates certain embodiments in which the control plane processor 434 determines which iSCSI target is most suitable for an iSCSI initiator to boot from or to perform other operations.
- the control plane processor 434 sends a modified iDHCP response to the iSCSI initiator 418 to provide at least the IP address and the target name of the iSCSI target.
- FIG. 5 illustrates first operations 500 for the discovery of a target by an initiator, in accordance with certain embodiments.
- the operations shown in FIG. 5 may he performed by various nodes and switches in the computing environment 100 , 200 , 300 , 400 .
- Control starts at block 502 in which a CPP module 116 programs all switches to forward any DHCP response packets to itself (i.e., CPP Module) on rack power on, where a rack may include a plurality of switches included within a plurality of chassis,
- a compute node (iSCSI initiator) 102 generates (at block 504 ) a “DHCP Request” for securing network parameters, such as the IP address of the computer node, as part of its boot sequence.
- the DHCP server 106 On receipt of the DHCP request the DHCP server 106 generates (at block 506 ) a “DHCP Response” with Node FP Address, Gateway Address, etc., for sending to the iSCSI initiator 102 .
- Control proceeds to block 508 where one or more of the plurality of switches 112 a . . . 112 p trap the DHCP response and sends the DHCP response to the CPP Module 116 .
- the CPP module 116 adds or replaces “DHCP Option 17” in the DHCP response packet based on policy considerations. For example, CPP module 116 may select an iSCSI target coupled to switch 112 a or an iSCSI target coupled to switch 112 p.
- Control proceeds to block 512 , where the CPP module 116 sends the new DHCP response to the compute node 102 that made the original DHCP request.
- the compute node 102 uses (at block 514 ) the root path specified in the DHCP Option 17 command to determine the iSCSI Target EP address to boot from.
- FIG. 5 illustrates certain embodiments for the discovery of a target by an initiator, based on receiving a modified DEICP response from a control plane processor by an initiator, where the modified DHCP response may include the :EP address and target name of the target.
- FIG. 6 illustrates second operations, in accordance with certain embodiments.
- the operations shown in FIG. 6 may be performed by various nodes and switches in the computing environment 100 , 200 , 300 , 400 .
- Control starts at block 602 in which a first computational device (e.g., a control plane processor 104 ) receives a response generated by a second computational device e.g. a DHCP server 106 ) for a third computational device e.g., an iSCSI initiator node 102 ).
- a first computational device e.g., a control plane processor 104
- receives a response generated by a second computational device e.g. a DHCP server 106
- a third computational device e.g., an iSCSI initiator node 102
- Control proceeds to block 604 in which a target (e.g., iSCSI target node 108 a ′ that is suitable for use by the third computational device (e.g., the iSCSI initiator node 102 ) is determined.
- the response is then transmitted (at block 606 ) with an address of the target to the third computational device (e.g., the iSCSI initiator node 102 ).
- the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- FIG. 7 illustrates third operations, in accordance with certain embodiments.
- the operations shown in FIG. 5 may be performed by various nodes and switches in the computing environment 100 , 200 , 300 , 400 .
- Control starts at block 702 in which an initiator 102 transmits via a switch configuration 114 that includes one or more switches 112 a . . . 112 p , a request for a DHCP address to a DHCP server 106 .
- the DHCP server 106 transmits (at block 704 ) via the switch configuration 114 , a response comprising the IP address.
- the one or more switches 112 a . . . 112 p redirect (at block 706 ) the response to a control plane processor 104 instead of returning the response to the initiator 102 .
- Control proceeds to block 708 in which the control plane processor 104 receives the response generated by the DHCP server 106 for the initiator 102 .
- the control plane processor 104 determines (at block 710 ) a target (e.g., iSCSI target node 108 a ) that is suitable for use by the initiator 102 .
- the control plane processor 104 transmits (at block 712 ) the response with an address of the target (e.g., iSCSI target node 108 a ) to the initiator 102 .
- FIGS. 1-7 illustrate certain embodiments in which an automated discovery of iSCSI targets for boot and other operations is performed by initiators where the iSCSI targets are discovered by a control plane processor, and the discovered iSCSI targets are relatively more proximate to the initiators and have a relatively lighter processing load in comparison to other iSCSI targets.
- iSCSI based protocol instead of an iSCSI based protocol, other protocols may be used.
- the described operations may be implemented as a method, apparatus or computer program product using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof.
- the described operations may be implemented as code maintained in a “computer readable storage medium”, where a processor may read and execute the code from the computer storage readable medium.
- the computer readable storage medium includes at least one of electronic circuitry, storage materials, inorganic materials, organic materials, biological materials, a casing, a housing, a coating, and hardware.
- a computer readable storage medium may comprise, but is not limited to, a magnetic storage medium (e.g., hard disk drives, floppy disks, tape, etc., optical storage (CD-ROMs, DVDs, optical disks, etc.), volatile and non-volatile memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, DRAMs, SRAMs, Flash Memory, firmware, programmable logic, etc.), Solid State Devices (SSD), etc.
- the code implementing the described operations may further be implemented in hardware logic implemented in a hardware device (e.g., an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc.).
- the code implementing the described operations may be implemented in “transmission signals”, where transmission signals may propagate through space or through a transmission media, such as an optical fiber, copper wire, etc.
- the transmission signals in which the code or logic is encoded may further comprise a wireless signal, satellite transmission, radio waves, infrared signals, Bluetooth, etc.
- the program code embedded on a computer readable storage medium may be transmitted as transmission signals from a transmitting station or computer. to a receiving station or computer.
- a computer readable storage medium is not comprised solely of transmission signals.
- Computer program code for carrying out operations for aspects of the certain embodiments may be written in any combination of one or more programming languages, Blocks of the flowchart and block diagrams may be implemented by computer program Instructions.
- FIG. 8 illustrates a block diagram that shows certain elements that may be included in the nodes (e.g., the compute node 102 , the CPP 104 , the storage nodes 108 a . . . 108 m, 110 a . . . 110 n , the DHCP server 106 ) of the computing environments 100 , 200 , 300 , 400 in accordance with certain embodiments.
- the system 800 may correspond to any node in the computing environment 100 , 200 , 300 , 400 .
- the system 800 may include a circuitry 802 that may in certain embodiments include at least a processor 804 ,
- the system 800 may also include a memory 806 (e.g., a volatile memory device) and storage 808 .
- a memory 806 e.g., a volatile memory device
- the storage 808 may include a non-volatile memory device (e.g., EEPROM, ROM, PROM, RAM, DRAM, SRAM, flash, firmware, programmable logic, etc.), magnetic disk drive, optical disk drive, tape drive, etc.
- the storage 808 may comprise an internal storage device, an attached storage device and/or a network accessible storage device.
- the system 800 may include a program logic 810 including code 812 that may be loaded into the memory 806 and executed by the processor 804 or circuitry 802 .
- the program logic 810 including code 812 may be stored in the storage 808 .
- the program logic 810 may be implemented in the circuitry 802 . Therefore, while FIG. 8 shows the program logic 810 separately from the other elements, the program logic 810 may be implemented in the memory 806 and/or the circuitry 802 .
- Certain embodiments may be directed to a method for deploying computing instruction by a person or automated processing integrating computer-readable code into a computing system, wherein the code in combination with the computing system is enabled to perform the operations of the described embodiments.
- an embodiment means “one or more (but not all) embodiments” unless expressly specified otherwise.
- Devices that are in communication with each other need not be in continuous communication with each other, unless expressly specified otherwise.
- devices that are in communication with each other may communicate directly or indirectly through one or more intermediaries.
- Example 1 is a method in which a first computational device receives a response generated by a second computational device for a third computational device. A determination is made of a target that is suitable for use by the third computational device. The response is transmitted with an address of the target to the third computational device.
- example 2 the subject matter of example 1 may include that suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- the subject matter of example 1 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- the subject matter of example 1 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator,
- the subject matter of example 4 may include that the initiator transmits, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, and that the DHCP server transmits via the switch configuration, the response comprising the DHCP address.
- DHCP Dynamic Host Configuration Protocol
- example 6 the subject matter of example 5 may include redirecting, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- example 7 the subject matter of example 6 may include that the address of the target is added to the response by modifying a DHCP Option 17 command.
- Example 8 is a system, comprising a first computational device that is communicatively coupled to a second computational device and a third computational device, wherein the system comprises a memory, and a processor coupled to the memory, and wherein the processor is operable to receive a response generated by a second computational device for a third computational device, determine a target that is suitable for use by the third computational device, and transmit the response with an address of the target to the third computational device.
- example 9 the subject matter of example 8 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- the subject matter of example 8 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- the subject matter of example 8 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator.
- DHCP Dynamic Host Configuration Protocol
- example 12 the subject matter of example 11 may include that the initiator is configurable to transmit via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, and the DHCP server is configurable to transmit via the switch configuration, the response comprising the DHCP address.
- example 13 the subject matter of example 12 may include that the one or more switches are configurable to redirect the response to the control plane processor instead of returning the response to the initiator.
- example 14 the subject matter of example 13 may include that the processor is further operable to add the address of the target to the response by modifying a DHCP Option 17 command.
- Example 15 is a computer readable storage medium, wherein code stored in the computer readable storage medium when executed by a processor performs operations, the operations comprising receiving, via a first computational device, a response generated by a second computational device for a third computational device, determining a target that is suitable for use by the third computational device, and transmitting the response with an address of the target to the third computational device.
- the subject matter of example 15 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- the subject matter of example 15 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- example 18 the subject matter of example 15 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator.
- DHCP Dynamic Host Configuration Protocol
- example 19 the subject matter of example 18 may include that the initiator transmits, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, and the DHCP server transmits via the switch configuration, the response comprising the DHCP address.
- example 20 the subject matter of example 19 may include redirecting, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- example 21 the subject matter of example 20 may include that the address of the target is added to the response by modifying a DHCP Option 17 command.
- Example 22 is a system comprising a first computational device, a second computational device, and a third computational device, wherein the first, the second, and the third computational devices are communicatively coupled, and wherein the first computational device performs operations, wherein the system is operable to receive a response generated by the second computational device for the third computational device, determine a target that is suitable for use by the third computational device, and transmit the response with an address of the target to the third computational device.
- the subject matter of example 22 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target, wherein the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets, and wherein the system is operable to add the address of the target to the response by modifying a DHCP Option 17 command.
- Example 24 is a system, comprising means for receiving, via a first computational device, a response generated by a second computational device for a third computational device, means for determining a target that is suitable for use by the third computational device, and means for transmitting the response with an address of the target to the third computational device.
- the subject matter of example 24 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target, wherein the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- the system may further comprise means for adding the address of the target to the response by modifying a DHCP Option 17 command.
- Example 26 is a system comprising a first computational device, a second computational device, and a third computational device, wherein the first, the second, and the third computational devices are communicatively coupled, and wherein the first computational device is operable to receive a response generated by the second computational device for the third computational device, determine a target that is suitable for use by the third computational device, and transmit the response with an address of the target to the third computational device.
- the subject matter of example 26 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target, and wherein the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- the subject matter of example 26 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator.
- the system is further operable to transmit, by the initiator, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, transmit, by the DHCP server via the switch configuration, the response comprising the DHCP address, and redirect, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- DHCP Dynamic Host Configuration Protocol
- example 29 the subject matter of example 28 may include that the system is operable to add the address of the target to the response by modifying a DHCP Option 17 command.
- Example 30 is a computer readable storage medium, wherein code stored in the computer readable storage medium causes a processor to perform the method described in the subject matter of examples 1 3, 4, 5, 6, and 7.
- Example 31 is a system comprising means for receiving, via a first computational device, a response generated by a second computational device for a third computational device, means for determining a target that is suitable for use by the third computational device, and means for transmitting the response with an address of the target to the third computational device.
- the subject matter of example 31 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target, and wherein the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- the subject matter of example 31 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator.
- the system further comprises means for transmitting, by the initiator, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, means for transmitting, by the DHCP server via the switch configuration, the response comprising the DHCP address, and means for redirecting, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server
- the response comprising the DHCP address
- example 34 the subject matter of example 33 may include means for adding the address of the target to the response by modifying a DHCP Option 17 command.
- Example 35 is a method for target determination in which a first computational device receives a response generated by a second computational device for a third computational device. A determination is made of a target that is suitable for use by the third computational device. The response is transmitted with an address of the target to the third computational device.
- example 36 the subject matter of example 35 may include that suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- example 37 the subject matter of example 35 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- example 38 the subject matter of example 35 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator.
- DHCP Dynamic Host Configuration Protocol
- the subject, matter of example 38 may include that the initiator transmits, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, and that the DHCP server transmits via the switch configuration, the response comprising the DHCP address.
- example 40 the subject matter of example 39 may include redirecting, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- example 41 the subject matter of example 40 may include that the address of the target is added to the response by modifying a DHCP Option 17 command.
- Example 42 is a system for target determination comprising a first computational device that is communicatively coupled to a second computational device and a third computational device, wherein the system comprises a memory, and a processor coupled to the memory, and wherein the processor is operable to receive a response generated by a second computational device for a third computational device, determine a target that is suitable for use by the third computational device, and transmit the response with an address of the target to the third. computational device.
- example 43 the subject matter of example 42 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- example 44 the subject matter of example 43 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- the subject matter of example 43 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator.
- the initiator is configurable to transmit via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server.
- the DHCP server is configurable to transmit via the switch configuration, the response comprising the DHCP address.
- the one or more switches are configurable redirect the response to the control plane processor instead of returning the response to the initiator.
- example 46 the subject matter of example 45 may include that the processor is further operable to add the address of the target to the response by modifying a DHCP Option 17 command.
- Example 47 is a computer readable storage medium for target determination, wherein code stored in the computer readable storage medium when executed by a processor performs operations, the operations comprising receiving, via a first computational device, a response generated by a second computational device for a third computational device, determining a target that is suitable for use by the third computational device, and transmitting the response with an address of the target to the third computational device.
- example 48 the subject matter of example 47 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- example 49 the subject matter of example 47 may include that the address of the target is added to the response by modifying a DHCP Option 17 command.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Stored Programmes (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Hardware Redundancy (AREA)
- Computer And Data Communications (AREA)
Abstract
A first computational device receives a response generated by a second computational device for a third computational device. A target that is suitable for use by the third computational device is determined. The response is transmitted with an address of the target to the third computational device.
Description
- In computing, iSCSI is an acronym for Internet Small Computer System Interface, an Internet Protocol (W)-based storage networking standard for linking data storage facilities over a Storage Area Network (SAN). The iSCSI standard is defined and described by the IETF (Internet Engineering Task Force) standards body in Request for Comments (RFC) 3720, published April 2004, In iSCSI, Small Computer System Interface (SCSI) commands are carried over Internet Protocol (IP) networks, to facilitate data transfers and to manage storage over long distances [T10 is an American National Standards Institute (ANSI) body responsible for developing SCSI Standards that include SCSI Architecture Model (SAM), SCSI Primary Commands (SPC), SCSI Block Commands (SBC), Serial Attached SCSI (SAS), SES (SCSI Enclosure Standard), and SCC (SCSI Controller Commands), and further details of SCSI may be found in “http://www.t10.org/drafts.htm”]. Using the iSCSI protocol, data may be transmitted over networks, such as local area networks (LANs), wide area networks (WANs), or the Internet, to allow location-independent data storage and retrieval.
- The iSCSI protocol allows clients (called initiators to send SCSI commands to SCSI storage devices (called targets) on remote servers. Organizations are allowed to consolidate storage into data center storage arrays while providing hosts with the illusion of locally attached disks. iSCSI Initiators are the iSCSI devices that start an input/output (I/O process) and iSCSI targets are the iSCSI devices that respond to a request to perform an I/O process using SCSI standard commands.
- In network data transmission operations in a computing environment, an initiator device transmits data or commands over the network to a target device. The initiator functions as an iSCSI client. An iSCSI initiator may be a software initiator or a hardware initiator, The hardware initiator may use hardware, typically in combination with software or firmware running on that hardware, to implement iSCSI.
- A target device, such as, a server, storage controller or host computer, may include an iSCSI target controller or subsystem to access the SCSI commands stored in the payload of an iSCSI packet, and to perform the SCSI commands, The iSCSI target may comprise a dedicated network-connected hard disk storage device, a general-purpose computer, etc. In a data center or enterprise environment, an iSCSI target may reside in a large storage array. The storage array may provide distinct iSCSI targets for numerous clients.
- Dynamic Host Configuration Protocol (DH(P) is a network protocol used to configure devices that are connected to a network so that the devices can communicate on the network using the Internet Protocol (IP). Further details of DHCP is defined and described b r the IETF (Internet Engineering Task Force) standards body in RFC 2131 and 2132, both published March 1997. DHCP may be used in association with iSCSI for configuring devices
- Referring now to the drawings in which like reference numbers represent corresponding parts throughout:
-
FIG. 1 illustrates a block diagram of a computing environment for the discovery of a target by an initiator via a control plane processor, in accordance with certain embodiments; -
FIG. 2 illustrates a block diagram that shows how a control plane processor module configures switches to forward any Dynamic Host Control Protocol (DHCP) responses to the control plane processor module, in accordance with certain embodiments; -
FIG. 3 illustrates a block diagram that shows how a control plane processor module generates a modified DHCP response that provides at least an IP address and the target name of an iSCSI target, to an iSCSI initiator, in accordance with certain embodiments; -
FIG. 4 illustrates a block diagram of a computing environment for the discovery of a target by an initiator via a control plane processor where a plurality of chassis enclose a plurality of switches, in accordance with certain embodiments; -
FIG. 5 illustrates first operations for the discovery of a target by an initiator, in accordance with certain embodiments; -
FIG. 6 illustrates second operations, in accordance with certain embodiments; -
FIG. 7 illustrates third operations, in accordance with certain embodiments; and -
FIG. 8 illustrates a block diagram of a computer system that may implement certain components shown inFIG. 1 , in accordance with certain embodiments. - In the following description, reference is made to the accompanying drawings which form a part hereof and which illustrate several embodiments. It is understood that other embodiments may be utilized and structural and operational changes may be made.
- Servers in a computing environment that supports iSCSI may be designed in various form factors such as tower servers, rack servers, blade servers, microservers, etc. Microservers comprise a class of server platforms based on Server System on Chip (SoC) processors deployed in a data center environment. The distributed nature of the workloads imposes a high performance per watt, and a high scale-out requirement, on the computing and storage infrastructure. Delivering services to a large number of nodes within a restrictive form factor and within a given restrictive power profile is a core system requirement. Additionally, this scaled out environment should be easy to manage to reduce the overall total cost of ownership.
- Microserver platforms are physically realized via micromodules that contain one or more independent SoC nodes. The micromodules are collectively deployed in a system container usually referred to as “Chassis”. Each node is a separate coherent domain comprising independent Serial Peripheral Interface (SPI) Flash Basic Input/Output System (BIOS), Boot disk, Voltage Rails (VR), VR controller etc. It is important to reduce redundant components such as multiple boot disks that not only require power and physical real estate on the micromodule compared to other components but also impose a total cost of ownership burden to manage multiple operating system versions, etc.
- There are a number of alternatives available for network boot and iSCSI is the primary choice given the wide operating system support base and enterprise class features, such as, security and fault tolerance.
- In a computing environment comprising of thousands of nodes, data centers may be reluctant to deploy iSCSI as it may impose significant network and infrastructure management requirements to enable iSCSI initiator nodes to discover their respective iSCSI boot target nodes. Certain embodiments provide a mechanism by which iSCSI initiator nodes are able to automatically discover iSCSI target nodes. Such embodiments do not impose any overhead to the data center management infrastructure, In addition, such embodiments are able to dynamically match iSCSI initiator nodes with iSCSI target boot nodes based on multiple policy considerations to deliver consistent boot times.
-
FIG. 1 illustrates a block diagram of acomputing environment 100 for the discovery of a target by an initiator via a control plane processor, in accordance with certain embodiments. In certain embodiments, the components of thecomputing environment 100 may be implemented in a data center. - The
computing environment 100 may include acompute node 102 that operates as an iSCSI initiator node, a control plane processor (CPP) 104, a DHCPserver 106, a plurality orstorage nodes 108 a . . . 108 m, 110 a . . . 110 n, where thecompute node 102, thecontrol plane processor 104, the DHCPserver 106 and the plurality ofstorage nodes 108 a . . . 108 m, 110 a . . . 11.0 n are all nodes that are coupled via a plurality ofswitches 112 a . . . 112 p. The nodes within thecomputing environment 100 may comprise any suitable computing device, such as, a personal computer, a server computer, a mini computer, a mainframe computer, a blade computer, a tablet computer, a touch screen computing device, a telephony device, a cell phone, a mobile computational device, etc., that are implemented in certain embodiments in a plurality of form factors, such as, tower servers, rack servers, blade servers, microservers, etc, - In certain embodiments, the
compute node 102, thecontrol plane processor 104, the DBCPserver 106, the plurality ofstorage nodes 108 a . . . 108 m, 110 a . . . 110 n, and the plurality ofswitches 112 a . . . 112 p are enclosed within racks and chassis within the data center within which thecomputing environment 100 is implemented. An exemplary rack comprises of a multiple number of chassis, where a chassis may have an Ethernet switch and multiple nodes. The nodes may comprise thecompute node 102, thecontrol plane processor 104, the DHCPserver 106 and the plurality ofstorage nodes 108 a . . . 108 m, 110 a . . . 110 n that are coupled via a plurality ofswitches 112 a . . . 112 p, where the plurality ofswitches 112 a . . . 112 p are enclosed within a plurality of chassis. In certain embodiments, the plurality ofswitches 112 a . . . 112 p may be Ethernet switches. - The
compute node 102 comprises an iSCSI initiator node. Thecontrol plane processor 104 configures the path or routing table of the ports of the plurality of switches 111.2 a . . . 112 p, and updates the routing tables based on messages from theswitches 112 a . . . 112 p. Thestorage nodes 108 a . . . 108 m, 110 a . . . 110 n may comprise iSCSI targets that provide shared storage or boot support for theiSCSI initiator node 102, where the boot support may include booting a version or a type of an operating system, TheDHCP server 106 that is also referred to as an infrastructure node may be responsible for assigning Internet Protocol (IP) addresses to all nodes. - The switch configuration 114 of the plurality of
switches 112 a . . . 112 p is such that a plurality of chassis are interconnected with each other in a fault tolerant manner, and at least one of the switches provide an aggregate uplink port through which one or more of the nodes communicate with other computing environments that are different from thecomputing environment 100. - Certain embodiments are implemented via a control plane processor module 116 (CPP module) that executes within the
control plane processor 104. TheCPP module 116 programs all switches to forward DHCP responses from theDHCP server 106, generated on a request from acompute node 102, to itself (i.e., the CPP module 116). TheCPP module 116 then injects a “DHCP Option 17” command to the intercepted DHCP response and sends the modified DHCP response back to thecompute node 102. The injected “DHCP Option 17” command includes the path-name (e.g., the address) of an iSCSI target (e.g., an iSCSI target node selected from thestorage nodes 108 a . . . 108 m, 110 a . . . 110 n). Further details of the “DHCP Option 17” command may be found in section 3.19 of RFC 2132 (“DHCP Options and BOOTP Vendor Extensions”) published by IETF in March 2007. According to section 3.19 of RFC 2132, a Root Path option specifies the path-name that contains the client's root disk, where the path is formatted as a character string, and the code for the Root Path option is 17. - As a result, the
CPP Module 116 is able to match an iSCSI initiator (i.e., the control node 102) with any iSCSI target (e.g., an iSCSI target node selected from thestorage nodes 108 a . . . 108 m, 110 a . . . 110 n) based on policy considerations. The policy considerations may provide an iSCSI initiator node with an iSCSI target node that is both proximate to the iSCSI initiator node and has a low processing load, such that system performance within thecomputing environment 100 is improved in comparison to the situation where the iSCSI target node is relatively distant from the iSCSI initiator node or has a high processing load. Certain embodiments shown inFIG. 1 , implement an iSCSI deployment such that no additional infrastructure such as an Internet Storage Name Server (iSNS) server is needed to match an initiator node to a target node. More importantly, the initiator to target matches generated by theCPP Module 116 are always bound by the physical scope of the rack. Such containment may not be possible by any other mechanism. Furthermore, theswitches 112 a . . . 112 p may prioritize iSCSI traffic higher and provide greater performance guarantees for “boot” traffic. -
FIG. 2 illustrates a block diagram 200 that shows how a controlplane processor module 202 included in acontrol plane processor 204 configures (reference numeral 206) a plurality ofswitches plane processor module 202, in accordance with certain embodiments. - Each of the
switches response filter modules CPP module 202. - Therefore,
FIG. 2 illustrates certain embodiments in which aCPP module 202 configuresswitches 208 a . . . 208 s to forward DHCP responses to theCPP module 202 instead of forwarding the DI-ICP responses to the iSCSI initiator node. -
FIG. 3 illustrates a block diagram 300 that shows how a controlplane processor module 302 generates a modified DHCP response that provides at least an IP address and the target name of an iSCSI target, to an iSCSI initiator, in accordance with certain embodiments. In certain embodiments not only the IP address and the target name of the iSCSI target, but also the port and logical unit number (LUN) are provided in accordance with the iSCSI protocol. In certain embodiments, the port and LUN are optional, and if not provided the port and UN may default to 3260 and 0 respectively in certain embodiments, multiple target names may be associated with a single iSCSI target, where different versions or types of operating system may be associated with different target names. In certain embodiments in which iSCSI targets maintain more than one type or version of an operating system, a determination may be made as to which operating system image to use to boot on a particular node, by selecting the appropriate target name of the iSCSI target. - In certain embodiments, the
compute node 304 that comprises an iSCSI initiator requests aDHCP server 306 for a DHCP address where the request is transmitted to theDEICP server 306 via a switch configuration (as shown via reference numeral 308). Thecontrol plane processor 302 is configured to provide the iSCSI boot configurations to theiSCSI initiator 304. Thecontrol plane processor 302 is configured to specify at least the root path in a “DHCP option 17” command in responding with the iSCSI target information back to theiSCSI initiator 304. In “DHCP Option 17”, the iSCSI root path option configuration string uses the following format: - “ISCSI:<server name or IP address>:<protocol>:<port>:<LUN>:<targetname>”, where:
- a) Server name: DHCP server name or valid IPv4 address literal;
- b) Protocol: Transportation protocol used by iSCSI;
- c) Port: Port number of the iSCSI;
- d) LUN: Logical Unit (LUN) identifier (ID) configured on iSCSI target node; and
- e) Target name: iSCSI target name to uniquely identify an iSCSI target.
- In response to receiving the request for the DHCP address, the
DHCP server 306 returns the DHCP response to the switch configuration, and one or more switches in the switch configuration forward the returned DHCP response to the control plane processor 302 (as shown via reference numeral 310). - The
CPP module 312 that executes within thecontrol plane processor 302 receives the DHCP response and adds or modifies the “DHCP Option 17” command in the DHCP response to specify a root disk path to thecompute node 304, where the root disk path corresponds to an IP address and a target name of an iSCSI target node from which thecompute node 304 can boot from. TheCPP module 312 sends the modified DHCP response with the suitable iSCSI target IP address and a target name to the compute node 304 (shown via reference numeral 314), and thecompute node 304 may boot by using the iSCSI target determined via the iSCSI target IP address and the target name. - Therefore,
FIG. 3 illustrates certain embodiments in which thecontrol plane processor 302 sends a modified DEICP response to thecompute node 304 to indicate the iSCSI target location IP address and target name that is to be used by thecompute node 304 to boot. -
FIG. 4 illustrates a block diagram of acomputing environment 400 for the discovery of an iSCSI target by an iSCSI initiator via a control plane processor where a plurality of chassis enclose a plurality of switches, in accordance with certain embodiments. -
FIG. 4 shows fourexemplary chassis Exemplary switches FIG. 4 . In an exemplary switch configuration, switch 410 and switch 412 are configured to be in direct communication,switch 412 and switch 416 are configured to be in direct communication andswitch 414 and switch 416 are configured to be in direct communication. - A
compute node 418 may send aDHCP request 420 for securing network operating parameters, such as IP address of the compute node, etc., to theDHCP server 422 via theswitches DHCP server 422 may receive theDHCP request 420 and send aDHCP response 424 that is forwarded by the DHCP response filters 426, 428, 430 to redirect (reference numeral 433) theDHCP response 424 to thecontrol plane processor 434. TheCPP module 436 that executes in thecontrol plane processor 434 sends a modified DHCP response (reference numeral 438) via a switch (e.g., switch 410) to thecompute node 418, where the modifiedDHCP response 438 indicates thatstorage node 440 a selected from the plurality ofstorage nodes 440 a . . . 440 p, 442 a . . . 442 q is to be used for booting by thecompute node 418. In certain embodiments thestorage node 440 a may be proximate to thecompute node 418 and lightly loaded, and is preferred over other storage nodes for booting to ensure better system performance. TheCPP Module 436 may either discover the iSCSI targets 440 a . . . 440 p, 442 a . . . 442 q or each iSCSI target may register with theCPP module 436, such that based on information maintained by theCPP module 436 theCPP module 436 is able to determine w iSCSI target is most suitable for thecompute node 418 to boot from. - Therefore,
FIG. 4 illustrates certain embodiments in which thecontrol plane processor 434 determines which iSCSI target is most suitable for an iSCSI initiator to boot from or to perform other operations. Thecontrol plane processor 434 sends a modified iDHCP response to theiSCSI initiator 418 to provide at least the IP address and the target name of the iSCSI target. -
FIG. 5 illustratesfirst operations 500 for the discovery of a target by an initiator, in accordance with certain embodiments. The operations shown inFIG. 5 may he performed by various nodes and switches in thecomputing environment - Control starts at
block 502 in which aCPP module 116 programs all switches to forward any DHCP response packets to itself (i.e., CPP Module) on rack power on, where a rack may include a plurality of switches included within a plurality of chassis, A compute node (iSCSI initiator) 102 generates (at block 504) a “DHCP Request” for securing network parameters, such as the IP address of the computer node, as part of its boot sequence. On receipt of the DHCP request theDHCP server 106 generates (at block 506) a “DHCP Response” with Node FP Address, Gateway Address, etc., for sending to theiSCSI initiator 102. - Control proceeds to block 508 where one or more of the plurality of
switches 112 a . . . 112 p trap the DHCP response and sends the DHCP response to theCPP Module 116, Atblock 510, TheCPP module 116 adds or replaces “DHCP Option 17” in the DHCP response packet based on policy considerations. For example,CPP module 116 may select an iSCSI target coupled to switch 112 a or an iSCSI target coupled to switch 112 p. - Control proceeds to block 512, where the
CPP module 116 sends the new DHCP response to thecompute node 102 that made the original DHCP request. Thecompute node 102 uses (at block 514) the root path specified in theDHCP Option 17 command to determine the iSCSI Target EP address to boot from. - Therefore,
FIG. 5 illustrates certain embodiments for the discovery of a target by an initiator, based on receiving a modified DEICP response from a control plane processor by an initiator, where the modified DHCP response may include the :EP address and target name of the target. -
FIG. 6 illustrates second operations, in accordance with certain embodiments. The operations shown inFIG. 6 may be performed by various nodes and switches in thecomputing environment - Control starts at
block 602 in which a first computational device (e.g., a control plane processor 104) receives a response generated by a second computational device e.g. a DHCP server 106) for a third computational device e.g., an iSCSI initiator node 102). - Control proceeds to block 604 in which a target (e.g.,
iSCSI target node 108 a′ that is suitable for use by the third computational device (e.g., the iSCSI initiator node 102) is determined. The response is then transmitted (at block 606) with an address of the target to the third computational device (e.g., the iSCSI initiator node 102). - In certain embodiments shown in
FIG. 6 , the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target. In additional embodiments, the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets. -
FIG. 7 illustrates third operations, in accordance with certain embodiments. The operations shown inFIG. 5 may be performed by various nodes and switches in thecomputing environment - Control starts at
block 702 in which aninitiator 102 transmits via a switch configuration 114 that includes one ormore switches 112 a . . . 112 p, a request for a DHCP address to aDHCP server 106. - The
DHCP server 106 transmits (at block 704) via the switch configuration 114, a response comprising the IP address. The one ormore switches 112 a . . . 112 p redirect (at block 706) the response to acontrol plane processor 104 instead of returning the response to theinitiator 102. - Control proceeds to block 708 in which the
control plane processor 104 receives the response generated by theDHCP server 106 for theinitiator 102. Thecontrol plane processor 104 determines (at block 710) a target (e.g.,iSCSI target node 108 a) that is suitable for use by theinitiator 102. Thecontrol plane processor 104 transmits (at block 712) the response with an address of the target (e.g.,iSCSI target node 108 a) to theinitiator 102. - Therefore
FIGS. 1-7 illustrate certain embodiments in which an automated discovery of iSCSI targets for boot and other operations is performed by initiators where the iSCSI targets are discovered by a control plane processor, and the discovered iSCSI targets are relatively more proximate to the initiators and have a relatively lighter processing load in comparison to other iSCSI targets. In alternative embodiments instead of an iSCSI based protocol, other protocols may be used. - The described operations may be implemented as a method, apparatus or computer program product using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof. The described operations may be implemented as code maintained in a “computer readable storage medium”, where a processor may read and execute the code from the computer storage readable medium. The computer readable storage medium includes at least one of electronic circuitry, storage materials, inorganic materials, organic materials, biological materials, a casing, a housing, a coating, and hardware. A computer readable storage medium may comprise, but is not limited to, a magnetic storage medium (e.g., hard disk drives, floppy disks, tape, etc., optical storage (CD-ROMs, DVDs, optical disks, etc.), volatile and non-volatile memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, DRAMs, SRAMs, Flash Memory, firmware, programmable logic, etc.), Solid State Devices (SSD), etc. The code implementing the described operations may further be implemented in hardware logic implemented in a hardware device (e.g., an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc.). Still further, the code implementing the described operations may be implemented in “transmission signals”, where transmission signals may propagate through space or through a transmission media, such as an optical fiber, copper wire, etc. The transmission signals in which the code or logic is encoded may further comprise a wireless signal, satellite transmission, radio waves, infrared signals, Bluetooth, etc, The program code embedded on a computer readable storage medium may be transmitted as transmission signals from a transmitting station or computer. to a receiving station or computer. A computer readable storage medium is not comprised solely of transmission signals. Those skilled in the art will recognize that many modifications may be made to this configuration, and that the article of manufacture may comprise suitable information bearing medium known in the art.
- Computer program code for carrying out operations for aspects of the certain embodiments may be written in any combination of one or more programming languages, Blocks of the flowchart and block diagrams may be implemented by computer program Instructions.
-
FIG. 8 illustrates a block diagram that shows certain elements that may be included in the nodes (e.g., thecompute node 102, theCPP 104, thestorage nodes 108 a . . . 108 m, 110 a . . . 110 n, the DHCP server 106) of thecomputing environments system 800 may correspond to any node in thecomputing environment system 800 may include acircuitry 802 that may in certain embodiments include at least aprocessor 804, Thesystem 800 may also include a memory 806 (e.g., a volatile memory device) andstorage 808. Thestorage 808 may include a non-volatile memory device (e.g., EEPROM, ROM, PROM, RAM, DRAM, SRAM, flash, firmware, programmable logic, etc.), magnetic disk drive, optical disk drive, tape drive, etc. Thestorage 808 may comprise an internal storage device, an attached storage device and/or a network accessible storage device. Thesystem 800 may include aprogram logic 810 includingcode 812 that may be loaded into thememory 806 and executed by theprocessor 804 orcircuitry 802. In certain embodiments, theprogram logic 810 includingcode 812 may be stored in thestorage 808. In certain other embodiments, theprogram logic 810 may be implemented in thecircuitry 802. Therefore, whileFIG. 8 shows theprogram logic 810 separately from the other elements, theprogram logic 810 may be implemented in thememory 806 and/or thecircuitry 802. - Certain embodiments may be directed to a method for deploying computing instruction by a person or automated processing integrating computer-readable code into a computing system, wherein the code in combination with the computing system is enabled to perform the operations of the described embodiments.
- The terms “an embodiment”, “embodiment”, “embodiments”, “the embodiment” , “the embodiments”, “one or more embodiments”, “some embodiments” , and “one embodiment” mean “one or more (but not all) embodiments” unless expressly specified otherwise.
- The terms “including”, “comprising”, “having” and variations thereof mean “including but not limited to”, unless expressly specified otherwise.
- The enumerated listing of items does not imply that any or all of the items are mutually exclusive, unless expressly specified otherwise.
- The terms “a”, “an” and “the” mean “one or more”, unless expressly specified otherwise.
- Devices that are in communication with each other need not be in continuous communication with each other, unless expressly specified otherwise. In addition, devices that are in communication with each other may communicate directly or indirectly through one or more intermediaries.
- A description of an embodiment with several components in communication with each other does not imply that all such components are required. On the contrary a variety of optional components are described to illustrate the wide variety of possible embodiments.
- Further, although process steps, method steps, algorithms or the like may be described in a sequential order, such processes, methods and algorithms may be configured to work in alternate orders. In other words, any sequence or order of steps that may be described does not necessarily indicate a requirement that the steps be performed in that order. The steps of processes described herein may be performed in any order practical. Further, some steps may be performed simultaneously.
- When a single device or article is described herein, it will be readily apparent that more than one device/article (whether or not they cooperate) may be used in place of a single device/article. Similarly, where more than one device or article is described herein (whether or not they cooperate), it will be readily apparent that a single device/article may be used in place of the more than one device or article or a different number of devices/articles may be used instead of the shown number of devices or programs. The functionality and/or the features of a device may be alternatively embodied by one or more other devices which are not explicitly described as having such functionality/features. Thus, other embodiments need not include the device itself.
- At least certain operations that may have been illustrated in the figures show certain events occurring in a certain order. In alternative embodiments, certain operations may be performed in a different order, modified or removed. Moreover, steps may be added to the above described logic and still conform to the described embodiments. Further, operations described herein may occur sequentially or certain operations may be processed in parallel Yet further, operations may be performed by a single processing unit or by distributed processing units.
- The foregoing description of various embodiments has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to be limited to the precise forms disclosed. Many modifications and variations are possible in light of the above teaching.
- The following examples pertain to further embodiments.
- Example 1 is a method in which a first computational device receives a response generated by a second computational device for a third computational device. A determination is made of a target that is suitable for use by the third computational device. The response is transmitted with an address of the target to the third computational device.
- In example 2, the subject matter of example 1 may include that suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- In example 3, the subject matter of example 1 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- In example 4, the subject matter of example 1 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator, In example 5, the subject matter of example 4 may include that the initiator transmits, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, and that the DHCP server transmits via the switch configuration, the response comprising the DHCP address.
- In example 6, the subject matter of example 5 may include redirecting, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- In example 7, the subject matter of example 6 may include that the address of the target is added to the response by modifying a
DHCP Option 17 command. - Example 8 is a system, comprising a first computational device that is communicatively coupled to a second computational device and a third computational device, wherein the system comprises a memory, and a processor coupled to the memory, and wherein the processor is operable to receive a response generated by a second computational device for a third computational device, determine a target that is suitable for use by the third computational device, and transmit the response with an address of the target to the third computational device.
- In example 9, the subject matter of example 8 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- In example 10, the subject matter of example 8 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- In example 11, the subject matter of example 8 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator.
- In example 12, the subject matter of example 11 may include that the initiator is configurable to transmit via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, and the DHCP server is configurable to transmit via the switch configuration, the response comprising the DHCP address.
- In example 13, the subject matter of example 12 may include that the one or more switches are configurable to redirect the response to the control plane processor instead of returning the response to the initiator.
- In example 14, the subject matter of example 13 may include that the processor is further operable to add the address of the target to the response by modifying a
DHCP Option 17 command. - Example 15 is a computer readable storage medium, wherein code stored in the computer readable storage medium when executed by a processor performs operations, the operations comprising receiving, via a first computational device, a response generated by a second computational device for a third computational device, determining a target that is suitable for use by the third computational device, and transmitting the response with an address of the target to the third computational device.
- In example 16, the subject matter of example 15 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target. In example 17, the subject matter of example 15 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- In example 18, the subject matter of example 15 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator.
- In example 19, the subject matter of example 18 may include that the initiator transmits, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, and the DHCP server transmits via the switch configuration, the response comprising the DHCP address.
- In example 20, the subject matter of example 19 may include redirecting, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- In example 21, the subject matter of example 20 may include that the address of the target is added to the response by modifying a
DHCP Option 17 command. - Example 22 is a system comprising a first computational device, a second computational device, and a third computational device, wherein the first, the second, and the third computational devices are communicatively coupled, and wherein the first computational device performs operations, wherein the system is operable to receive a response generated by the second computational device for the third computational device, determine a target that is suitable for use by the third computational device, and transmit the response with an address of the target to the third computational device.
- In example 23, the subject matter of example 22 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target, wherein the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets, and wherein the system is operable to add the address of the target to the response by modifying a
DHCP Option 17 command. - Example 24 is a system, comprising means for receiving, via a first computational device, a response generated by a second computational device for a third computational device, means for determining a target that is suitable for use by the third computational device, and means for transmitting the response with an address of the target to the third computational device.
- In example 25, the subject matter of example 24 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target, wherein the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets. In example 25, the system may further comprise means for adding the address of the target to the response by modifying a
DHCP Option 17 command. - Example 26 is a system comprising a first computational device, a second computational device, and a third computational device, wherein the first, the second, and the third computational devices are communicatively coupled, and wherein the first computational device is operable to receive a response generated by the second computational device for the third computational device, determine a target that is suitable for use by the third computational device, and transmit the response with an address of the target to the third computational device.
- In example 27, the subject matter of example 26 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target, and wherein the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- In example 28, the subject matter of example 26 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator. In example 28, the system is further operable to transmit, by the initiator, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, transmit, by the DHCP server via the switch configuration, the response comprising the DHCP address, and redirect, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- In example 29, the subject matter of example 28 may include that the system is operable to add the address of the target to the response by modifying a
DHCP Option 17 command. - Example 30 is a computer readable storage medium, wherein code stored in the computer readable storage medium causes a processor to perform the method described in the subject matter of examples 1 3, 4, 5, 6, and 7.
- Example 31 is a system comprising means for receiving, via a first computational device, a response generated by a second computational device for a third computational device, means for determining a target that is suitable for use by the third computational device, and means for transmitting the response with an address of the target to the third computational device.
- In example 32, the subject matter of example 31 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target, and wherein the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- In example 33, the subject matter of example 31 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator. In example 33, the system further comprises means for transmitting, by the initiator, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, means for transmitting, by the DHCP server via the switch configuration, the response comprising the DHCP address, and means for redirecting, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- In example 34, the subject matter of example 33 may include means for adding the address of the target to the response by modifying a
DHCP Option 17 command. - Example 35 is a method for target determination in which a first computational device receives a response generated by a second computational device for a third computational device. A determination is made of a target that is suitable for use by the third computational device. The response is transmitted with an address of the target to the third computational device.
- In example 36, the subject matter of example 35 may include that suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- In example 37, the subject matter of example 35 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- In example 38, the subject matter of example 35 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator.
- In example 39, the subject, matter of example 38, may include that the initiator transmits, via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server, and that the DHCP server transmits via the switch configuration, the response comprising the DHCP address.
- In example 40, the subject matter of example 39 may include redirecting, by the one or more switches the response to the control plane processor instead of returning the response to the initiator.
- In example 41, the subject matter of example 40 may include that the address of the target is added to the response by modifying a
DHCP Option 17 command. - Example 42 is a system for target determination comprising a first computational device that is communicatively coupled to a second computational device and a third computational device, wherein the system comprises a memory, and a processor coupled to the memory, and wherein the processor is operable to receive a response generated by a second computational device for a third computational device, determine a target that is suitable for use by the third computational device, and transmit the response with an address of the target to the third. computational device.
- In example 43, the subject matter of example 42 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- In example 44, the subject matter of example 43 may include that the target that is determined has a relatively light processing load and is relatively more proximate to the third computational device in comparison to other potential targets of a plurality of targets.
- In example 45, the subject matter of example 43 may include that the first computational device is a control plane processor, the second computational device is a Dynamic Host Configuration Protocol (DHCP) server, and the third computational device is an initiator. The initiator is configurable to transmit via a switch configuration that includes one or more switches, a request for a DHCP address to the DHCP server. The DHCP server is configurable to transmit via the switch configuration, the response comprising the DHCP address. The one or more switches are configurable redirect the response to the control plane processor instead of returning the response to the initiator.
- In example 46, the subject matter of example 45 may include that the processor is further operable to add the address of the target to the response by modifying a
DHCP Option 17 command. - Example 47 is a computer readable storage medium for target determination, wherein code stored in the computer readable storage medium when executed by a processor performs operations, the operations comprising receiving, via a first computational device, a response generated by a second computational device for a third computational device, determining a target that is suitable for use by the third computational device, and transmitting the response with an address of the target to the third computational device.
- In example 48, the subject matter of example 47 may include that the suitability of the target for use by the third computational device is based on at least a distance of the target from the third computational device, an available bandwidth, and a processing load on the target.
- In example 49, the subject matter of example 47 may include that the address of the target is added to the response by modifying a
DHCP Option 17 command.
Claims (20)
1. A method, comprising:
programming, by a computational device, one or more switches of a switch configuration to forward any Dynamic Host Configuration Protocol (DHCP) packet to the computational device; and
in response to receiving, by the computational device from the one or more switches, a forwarding of a DHCP response to a DHCP request from an initiator, transmitting, by the computational device, a modified DHCP response that identifies a target suitable for use in booting the initiator.
2. The method of claim 1 , wherein the DHCP response is generated by a DHCP server, in response to the DHCP request.
3. The method of claim 2 , wherein the initiator is booted by using an address of the target in the modified DHCP response.
4. The method of claim 3 , wherein the target is a storage node that provides boot support for the initiator.
5. The method of claim 1 , wherein suitability of the target for use in booting the initiator is based on at least a distance of the target from the initiator, an available bandwidth, and a processing load on the target.
6. The method of claim 1 , the target has a relatively light processing load and is relatively more proximate to the initiator in comparison to other potential targets of a plurality of targets.
7. The method of claim 1 , wherein to generate the modified DHCP response an address of the target is added to the DHCP response by modifying a DHCP Option 17 command that includes an Internet Small Computer System Interface (iSCSI) target name to uniquely identify an iSCSI target.
8. A system, comprising a computational device that is communicatively coupled to an initiator, wherein the system comprises:
a memory; and
a processor coupled to the memory, wherein the processor is operable to perform operations, the operations comprising:
program, by the computational device, one or more switches of a switch configuration to forward any Dynamic Host Configuration Protocol (DHCP) packet to the computational device; and
in response to a receiving, by the computational device from the one or more switches, a forwarding of a DHCP response to a DHCP request from the initiator, transmit, by the computational device, a modified DHCP response that identifies a target suitable for use in booting the initiator.
9. The system of claim 8 , wherein the DHCP response is generated by a DHCP server, in response to the DHCP request.
10. The system of claim 9 wherein the initiator is booted by using an address of the target in the modified DHCP response.
11. The system of claim 10 , wherein the target is a storage node at provides boot support for the initiator.
12. The system of claim 8 , wherein suitability of the target for use in booting the initiator is based on at least a distance of the target from the initiator, an available bandwidth, and a processing load on the target.
13. The system of claim 8 , the target has a relatively light processing load and is relatively more proximate to the initiator in comparison to other potential targets of a plurality of targets.
14. The system of claim 8 , wherein to generate the modified DHCP response an address of the target is added to the DHCP response by modifying a DHCP Option 17 command that includes an Internet Small Computer System interface (iSCSI) target name to uniquely identify an iSCSI target.
15. A system, comprising:
a computational device;
an initiator, wherein the computational device is communicatively coupled to the initiator, and wherein the computational device is operable to:
program one or more switches of a switch configuration to forward any Dynamic Host Configuration Protocol (DHCP) packet to the computational device; and
in response to a receiving of a forwarding of a DHCP response to a DHCP request from the initiator, transmit a modified DHCP response that identifies a target suitable for use in booting the initiator.
16. The system of claim 15 , wherein the DHCP response is generated by a DHCP server, in response to the DHCP request.
17. The system of claim 16 , wherein the initiator is booted by using an address of the target in the modified DHCP response.
18. A system, comprising:
means for programming, by a computational device, one or more switches of a switch configuration to forward any Dynamic Host Configuration Protocol (DHCP) packet to the computational device; and
means for performing, in response to receiving, by the computational device from the one or more switches, a forwarding of a DHCP response to a DHCP request from an initiator, transmitting, b e computational device, a modified DHCP response that identifies a target suitable for use in booting the initiator.
19. The system of claim 18 , wherein the DHCP response is generated by a DHCP server, in response to the DHCP request.
20. The system of claim 19 , wherein the initiator is booted by using an address of the target in the modified DHCP response.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/405,223 US20170126619A1 (en) | 2013-09-27 | 2017-01-12 | Determination of a suitable target for an initiator by a control plane processor |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2013/062466 WO2015047347A1 (en) | 2013-09-27 | 2013-09-27 | Determination of a suitable target for an initiator by a control plane processor |
US201414128453A | 2014-07-23 | 2014-07-23 | |
US15/405,223 US20170126619A1 (en) | 2013-09-27 | 2017-01-12 | Determination of a suitable target for an initiator by a control plane processor |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2013/062466 Continuation WO2015047347A1 (en) | 2013-09-27 | 2013-09-27 | Determination of a suitable target for an initiator by a control plane processor |
US14/128,453 Continuation US9577953B2 (en) | 2013-09-27 | 2013-09-27 | Determination of a suitable target for an initiator by a control plane processor |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170126619A1 true US20170126619A1 (en) | 2017-05-04 |
Family
ID=52741270
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/128,453 Expired - Fee Related US9577953B2 (en) | 2013-09-27 | 2013-09-27 | Determination of a suitable target for an initiator by a control plane processor |
US15/405,223 Abandoned US20170126619A1 (en) | 2013-09-27 | 2017-01-12 | Determination of a suitable target for an initiator by a control plane processor |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/128,453 Expired - Fee Related US9577953B2 (en) | 2013-09-27 | 2013-09-27 | Determination of a suitable target for an initiator by a control plane processor |
Country Status (5)
Country | Link |
---|---|
US (2) | US9577953B2 (en) |
CN (1) | CN105531690B (en) |
CA (1) | CA2931098A1 (en) |
DE (1) | DE112013007296T5 (en) |
WO (1) | WO2015047347A1 (en) |
Families Citing this family (239)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11614893B2 (en) | 2010-09-15 | 2023-03-28 | Pure Storage, Inc. | Optimizing storage device access based on latency |
US8775868B2 (en) | 2010-09-28 | 2014-07-08 | Pure Storage, Inc. | Adaptive RAID for an SSD environment |
US9244769B2 (en) | 2010-09-28 | 2016-01-26 | Pure Storage, Inc. | Offset protection data in a RAID array |
US11636031B2 (en) | 2011-08-11 | 2023-04-25 | Pure Storage, Inc. | Optimized inline deduplication |
GB2502316A (en) * | 2012-05-24 | 2013-11-27 | Ibm | Blade enclosure with interfaces for computer blades and conventional computers |
US11032259B1 (en) | 2012-09-26 | 2021-06-08 | Pure Storage, Inc. | Data protection in a storage system |
US9646039B2 (en) | 2013-01-10 | 2017-05-09 | Pure Storage, Inc. | Snapshots in a storage system |
US11630585B1 (en) | 2016-08-25 | 2023-04-18 | Pure Storage, Inc. | Processing evacuation events in a storage array that includes a plurality of storage devices |
US12175076B2 (en) | 2014-09-08 | 2024-12-24 | Pure Storage, Inc. | Projecting capacity utilization for snapshots |
US9489132B2 (en) | 2014-10-07 | 2016-11-08 | Pure Storage, Inc. | Utilizing unmapped and unknown states in a replicated storage system |
US11102298B1 (en) | 2015-05-26 | 2021-08-24 | Pure Storage, Inc. | Locally providing cloud storage services for fleet management |
US9716755B2 (en) | 2015-05-26 | 2017-07-25 | Pure Storage, Inc. | Providing cloud storage array services by a local storage array in a data center |
US9521200B1 (en) * | 2015-05-26 | 2016-12-13 | Pure Storage, Inc. | Locally providing cloud storage array services |
US9594678B1 (en) | 2015-05-27 | 2017-03-14 | Pure Storage, Inc. | Preventing duplicate entries of identical data in a storage device |
US10021170B2 (en) | 2015-05-29 | 2018-07-10 | Pure Storage, Inc. | Managing a storage array using client-side services |
US9444822B1 (en) | 2015-05-29 | 2016-09-13 | Pure Storage, Inc. | Storage array access control from cloud-based user authorization and authentication |
US9300660B1 (en) | 2015-05-29 | 2016-03-29 | Pure Storage, Inc. | Providing authorization and authentication in a cloud for a user of a storage array |
US11503031B1 (en) | 2015-05-29 | 2022-11-15 | Pure Storage, Inc. | Storage array access control from cloud-based user authorization and authentication |
US9588691B2 (en) | 2015-06-10 | 2017-03-07 | Pure Storage, Inc. | Dynamically managing control information in a storage device |
US9594512B1 (en) | 2015-06-19 | 2017-03-14 | Pure Storage, Inc. | Attributing consumed storage capacity among entities storing data in a storage array |
US10310740B2 (en) | 2015-06-23 | 2019-06-04 | Pure Storage, Inc. | Aligning memory access operations to a geometry of a storage device |
US10296236B2 (en) | 2015-07-01 | 2019-05-21 | Pure Storage, Inc. | Offloading device management responsibilities from a storage device in an array of storage devices |
US9892071B2 (en) | 2015-08-03 | 2018-02-13 | Pure Storage, Inc. | Emulating a remote direct memory access (‘RDMA’) link between controllers in a storage array |
US9851762B1 (en) | 2015-08-06 | 2017-12-26 | Pure Storage, Inc. | Compliant printed circuit board (‘PCB’) within an enclosure |
US11294588B1 (en) | 2015-08-24 | 2022-04-05 | Pure Storage, Inc. | Placing data within a storage device |
US11625181B1 (en) | 2015-08-24 | 2023-04-11 | Pure Storage, Inc. | Data tiering using snapshots |
US10198194B2 (en) | 2015-08-24 | 2019-02-05 | Pure Storage, Inc. | Placing data within a storage device of a flash array |
US9384082B1 (en) | 2015-10-23 | 2016-07-05 | Pure Storage, Inc. | Proactively providing corrective measures for storage arrays |
US10514978B1 (en) | 2015-10-23 | 2019-12-24 | Pure Storage, Inc. | Automatic deployment of corrective measures for storage arrays |
US11360844B1 (en) | 2015-10-23 | 2022-06-14 | Pure Storage, Inc. | Recovery of a container storage provider |
US10284232B2 (en) | 2015-10-28 | 2019-05-07 | Pure Storage, Inc. | Dynamic error processing in a storage device |
US9740414B2 (en) | 2015-10-29 | 2017-08-22 | Pure Storage, Inc. | Optimizing copy operations |
US10374868B2 (en) | 2015-10-29 | 2019-08-06 | Pure Storage, Inc. | Distributed command processing in a flash storage system |
US10353777B2 (en) | 2015-10-30 | 2019-07-16 | Pure Storage, Inc. | Ensuring crash-safe forward progress of a system configuration update |
US12182014B2 (en) | 2015-11-02 | 2024-12-31 | Pure Storage, Inc. | Cost effective storage management |
US9760479B2 (en) | 2015-12-02 | 2017-09-12 | Pure Storage, Inc. | Writing data in a storage system that includes a first type of storage device and a second type of storage device |
US11762764B1 (en) | 2015-12-02 | 2023-09-19 | Pure Storage, Inc. | Writing data in a storage system that includes a first type of storage device and a second type of storage device |
US11616834B2 (en) | 2015-12-08 | 2023-03-28 | Pure Storage, Inc. | Efficient replication of a dataset to the cloud |
US10326836B2 (en) | 2015-12-08 | 2019-06-18 | Pure Storage, Inc. | Partially replicating a snapshot between storage systems |
US10162835B2 (en) | 2015-12-15 | 2018-12-25 | Pure Storage, Inc. | Proactive management of a plurality of storage arrays in a multi-array system |
US11347697B1 (en) | 2015-12-15 | 2022-05-31 | Pure Storage, Inc. | Proactively optimizing a storage system |
US10346043B2 (en) | 2015-12-28 | 2019-07-09 | Pure Storage, Inc. | Adaptive computing for data compression |
US9886314B2 (en) | 2016-01-28 | 2018-02-06 | Pure Storage, Inc. | Placing workloads in a multi-array system |
US12253990B2 (en) | 2016-02-11 | 2025-03-18 | Pure Storage, Inc. | Tier-specific data compression |
US10572460B2 (en) | 2016-02-11 | 2020-02-25 | Pure Storage, Inc. | Compressing data in dependence upon characteristics of a storage system |
US9760297B2 (en) | 2016-02-12 | 2017-09-12 | Pure Storage, Inc. | Managing input/output (‘I/O’) queues in a data storage system |
US11995315B2 (en) | 2016-03-16 | 2024-05-28 | Pure Storage, Inc. | Converting data formats in a storage system |
US9959043B2 (en) | 2016-03-16 | 2018-05-01 | Pure Storage, Inc. | Performing a non-disruptive upgrade of data in a storage system |
US11112990B1 (en) | 2016-04-27 | 2021-09-07 | Pure Storage, Inc. | Managing storage device evacuation |
US11809727B1 (en) | 2016-04-27 | 2023-11-07 | Pure Storage, Inc. | Predicting failures in a storage system that includes a plurality of storage devices |
US9841921B2 (en) | 2016-04-27 | 2017-12-12 | Pure Storage, Inc. | Migrating data in a storage array that includes a plurality of storage devices |
US9811264B1 (en) | 2016-04-28 | 2017-11-07 | Pure Storage, Inc. | Deploying client-specific applications in a storage system utilizing redundant system resources |
US10303390B1 (en) | 2016-05-02 | 2019-05-28 | Pure Storage, Inc. | Resolving fingerprint collisions in flash storage system |
US11231858B2 (en) | 2016-05-19 | 2022-01-25 | Pure Storage, Inc. | Dynamically configuring a storage system to facilitate independent scaling of resources |
US9507532B1 (en) | 2016-05-20 | 2016-11-29 | Pure Storage, Inc. | Migrating data in a storage array that includes a plurality of storage devices and a plurality of write buffer devices |
US10691567B2 (en) | 2016-06-03 | 2020-06-23 | Pure Storage, Inc. | Dynamically forming a failure domain in a storage system that includes a plurality of blades |
US10452310B1 (en) | 2016-07-13 | 2019-10-22 | Pure Storage, Inc. | Validating cabling for storage component admission to a storage array |
US11706895B2 (en) | 2016-07-19 | 2023-07-18 | Pure Storage, Inc. | Independent scaling of compute resources and storage resources in a storage system |
US10459652B2 (en) | 2016-07-27 | 2019-10-29 | Pure Storage, Inc. | Evacuating blades in a storage array that includes a plurality of blades |
US10474363B1 (en) | 2016-07-29 | 2019-11-12 | Pure Storage, Inc. | Space reporting in a storage system |
US11531577B1 (en) | 2016-09-07 | 2022-12-20 | Pure Storage, Inc. | Temporarily limiting access to a storage device |
US10908966B1 (en) | 2016-09-07 | 2021-02-02 | Pure Storage, Inc. | Adapting target service times in a storage system |
US11481261B1 (en) | 2016-09-07 | 2022-10-25 | Pure Storage, Inc. | Preventing extended latency in a storage system |
US10146585B2 (en) | 2016-09-07 | 2018-12-04 | Pure Storage, Inc. | Ensuring the fair utilization of system resources using workload based, time-independent scheduling |
US11886922B2 (en) | 2016-09-07 | 2024-01-30 | Pure Storage, Inc. | Scheduling input/output operations for a storage system |
US10671439B1 (en) | 2016-09-07 | 2020-06-02 | Pure Storage, Inc. | Workload planning with quality-of-service (‘QOS’) integration |
US10235229B1 (en) | 2016-09-07 | 2019-03-19 | Pure Storage, Inc. | Rehabilitating storage devices in a storage array that includes a plurality of storage devices |
US10331588B2 (en) | 2016-09-07 | 2019-06-25 | Pure Storage, Inc. | Ensuring the appropriate utilization of system resources using weighted workload based, time-independent scheduling |
US11960348B2 (en) | 2016-09-07 | 2024-04-16 | Pure Storage, Inc. | Cloud-based monitoring of hardware components in a fleet of storage systems |
US11379132B1 (en) | 2016-10-20 | 2022-07-05 | Pure Storage, Inc. | Correlating medical sensor data |
US10007459B2 (en) | 2016-10-20 | 2018-06-26 | Pure Storage, Inc. | Performance tuning in a storage system that includes one or more storage devices |
US10162566B2 (en) | 2016-11-22 | 2018-12-25 | Pure Storage, Inc. | Accumulating application-level statistics in a storage system |
US11620075B2 (en) | 2016-11-22 | 2023-04-04 | Pure Storage, Inc. | Providing application aware storage |
US10198205B1 (en) | 2016-12-19 | 2019-02-05 | Pure Storage, Inc. | Dynamically adjusting a number of storage devices utilized to simultaneously service write operations |
US11461273B1 (en) | 2016-12-20 | 2022-10-04 | Pure Storage, Inc. | Modifying storage distribution in a storage system that includes one or more storage devices |
US10489307B2 (en) | 2017-01-05 | 2019-11-26 | Pure Storage, Inc. | Periodically re-encrypting user data stored on a storage device |
US12282436B2 (en) | 2017-01-05 | 2025-04-22 | Pure Storage, Inc. | Instant rekey in a storage system |
US11307998B2 (en) | 2017-01-09 | 2022-04-19 | Pure Storage, Inc. | Storage efficiency of encrypted host system data |
US11340800B1 (en) | 2017-01-19 | 2022-05-24 | Pure Storage, Inc. | Content masking in a storage system |
US10503700B1 (en) | 2017-01-19 | 2019-12-10 | Pure Storage, Inc. | On-demand content filtering of snapshots within a storage system |
US11163624B2 (en) | 2017-01-27 | 2021-11-02 | Pure Storage, Inc. | Dynamically adjusting an amount of log data generated for a storage system |
US10521344B1 (en) | 2017-03-10 | 2019-12-31 | Pure Storage, Inc. | Servicing input/output (‘I/O’) operations directed to a dataset that is synchronized across a plurality of storage systems |
US11442825B2 (en) | 2017-03-10 | 2022-09-13 | Pure Storage, Inc. | Establishing a synchronous replication relationship between two or more storage systems |
US11089105B1 (en) | 2017-12-14 | 2021-08-10 | Pure Storage, Inc. | Synchronously replicating datasets in cloud-based storage systems |
US11675520B2 (en) | 2017-03-10 | 2023-06-13 | Pure Storage, Inc. | Application replication among storage systems synchronously replicating a dataset |
US11941279B2 (en) | 2017-03-10 | 2024-03-26 | Pure Storage, Inc. | Data path virtualization |
US12056383B2 (en) | 2017-03-10 | 2024-08-06 | Pure Storage, Inc. | Edge management service |
US10454810B1 (en) | 2017-03-10 | 2019-10-22 | Pure Storage, Inc. | Managing host definitions across a plurality of storage systems |
US11169727B1 (en) | 2017-03-10 | 2021-11-09 | Pure Storage, Inc. | Synchronous replication between storage systems with virtualized storage |
US11803453B1 (en) | 2017-03-10 | 2023-10-31 | Pure Storage, Inc. | Using host connectivity states to avoid queuing I/O requests |
US10503427B2 (en) | 2017-03-10 | 2019-12-10 | Pure Storage, Inc. | Synchronously replicating datasets and other managed objects to cloud-based storage systems |
US9910618B1 (en) | 2017-04-10 | 2018-03-06 | Pure Storage, Inc. | Migrating applications executing on a storage system |
US10459664B1 (en) | 2017-04-10 | 2019-10-29 | Pure Storage, Inc. | Virtualized copy-by-reference |
US11868629B1 (en) | 2017-05-05 | 2024-01-09 | Pure Storage, Inc. | Storage system sizing service |
US11592991B2 (en) | 2017-09-07 | 2023-02-28 | Pure Storage, Inc. | Converting raid data between persistent storage types |
US12086651B2 (en) | 2017-06-12 | 2024-09-10 | Pure Storage, Inc. | Migrating workloads using active disaster recovery |
US10417092B2 (en) | 2017-09-07 | 2019-09-17 | Pure Storage, Inc. | Incremental RAID stripe update parity calculation |
US10552090B2 (en) | 2017-09-07 | 2020-02-04 | Pure Storage, Inc. | Solid state drives with multiple types of addressable memory |
US10976962B2 (en) | 2018-03-15 | 2021-04-13 | Pure Storage, Inc. | Servicing I/O operations in a cloud-based storage system |
US12061822B1 (en) | 2017-06-12 | 2024-08-13 | Pure Storage, Inc. | Utilizing volume-level policies in a storage system |
US12229405B2 (en) | 2017-06-12 | 2025-02-18 | Pure Storage, Inc. | Application-aware management of a storage system |
US11210133B1 (en) | 2017-06-12 | 2021-12-28 | Pure Storage, Inc. | Workload mobility between disparate execution environments |
US10853148B1 (en) | 2017-06-12 | 2020-12-01 | Pure Storage, Inc. | Migrating workloads between a plurality of execution environments |
US11340939B1 (en) | 2017-06-12 | 2022-05-24 | Pure Storage, Inc. | Application-aware analytics for storage systems |
US10789020B2 (en) | 2017-06-12 | 2020-09-29 | Pure Storage, Inc. | Recovering data within a unified storage element |
US11442669B1 (en) | 2018-03-15 | 2022-09-13 | Pure Storage, Inc. | Orchestrating a virtual storage system |
US10884636B1 (en) | 2017-06-12 | 2021-01-05 | Pure Storage, Inc. | Presenting workload performance in a storage system |
EP3612922A1 (en) | 2017-06-12 | 2020-02-26 | Pure Storage, Inc. | Accessible fast durable storage integrated into a bulk storage device |
US11016824B1 (en) | 2017-06-12 | 2021-05-25 | Pure Storage, Inc. | Event identification with out-of-order reporting in a cloud-based environment |
US11422731B1 (en) | 2017-06-12 | 2022-08-23 | Pure Storage, Inc. | Metadata-based replication of a dataset |
US11989429B1 (en) | 2017-06-12 | 2024-05-21 | Pure Storage, Inc. | Recommending changes to a storage system |
US10613791B2 (en) | 2017-06-12 | 2020-04-07 | Pure Storage, Inc. | Portable snapshot replication between storage systems |
US12086650B2 (en) | 2017-06-12 | 2024-09-10 | Pure Storage, Inc. | Workload placement based on carbon emissions |
US11609718B1 (en) | 2017-06-12 | 2023-03-21 | Pure Storage, Inc. | Identifying valid data after a storage system recovery |
US11561714B1 (en) | 2017-07-05 | 2023-01-24 | Pure Storage, Inc. | Storage efficiency driven migration |
US11477280B1 (en) | 2017-07-26 | 2022-10-18 | Pure Storage, Inc. | Integrating cloud storage services |
US10831935B2 (en) | 2017-08-31 | 2020-11-10 | Pure Storage, Inc. | Encryption management with host-side data reduction |
US11494692B1 (en) | 2018-03-26 | 2022-11-08 | Pure Storage, Inc. | Hyperscale artificial intelligence and machine learning infrastructure |
US10452444B1 (en) | 2017-10-19 | 2019-10-22 | Pure Storage, Inc. | Storage system with compute resources and shared storage resources |
US10360214B2 (en) | 2017-10-19 | 2019-07-23 | Pure Storage, Inc. | Ensuring reproducibility in an artificial intelligence infrastructure |
US11455168B1 (en) | 2017-10-19 | 2022-09-27 | Pure Storage, Inc. | Batch building for deep learning training workloads |
US10671435B1 (en) | 2017-10-19 | 2020-06-02 | Pure Storage, Inc. | Data transformation caching in an artificial intelligence infrastructure |
US12067466B2 (en) | 2017-10-19 | 2024-08-20 | Pure Storage, Inc. | Artificial intelligence and machine learning hyperscale infrastructure |
US11861423B1 (en) | 2017-10-19 | 2024-01-02 | Pure Storage, Inc. | Accelerating artificial intelligence (‘AI’) workflows |
US10671494B1 (en) | 2017-11-01 | 2020-06-02 | Pure Storage, Inc. | Consistent selection of replicated datasets during storage system recovery |
US10509581B1 (en) | 2017-11-01 | 2019-12-17 | Pure Storage, Inc. | Maintaining write consistency in a multi-threaded storage system |
US10817392B1 (en) | 2017-11-01 | 2020-10-27 | Pure Storage, Inc. | Ensuring resiliency to storage device failures in a storage system that includes a plurality of storage devices |
US10467107B1 (en) | 2017-11-01 | 2019-11-05 | Pure Storage, Inc. | Maintaining metadata resiliency among storage device failures |
US10484174B1 (en) | 2017-11-01 | 2019-11-19 | Pure Storage, Inc. | Protecting an encryption key for data stored in a storage system that includes a plurality of storage devices |
US10929226B1 (en) | 2017-11-21 | 2021-02-23 | Pure Storage, Inc. | Providing for increased flexibility for large scale parity |
US10936238B2 (en) | 2017-11-28 | 2021-03-02 | Pure Storage, Inc. | Hybrid data tiering |
US10990282B1 (en) | 2017-11-28 | 2021-04-27 | Pure Storage, Inc. | Hybrid data tiering with cloud storage |
US10795598B1 (en) | 2017-12-07 | 2020-10-06 | Pure Storage, Inc. | Volume migration for storage systems synchronously replicating a dataset |
US11036677B1 (en) | 2017-12-14 | 2021-06-15 | Pure Storage, Inc. | Replicated data integrity |
US10929031B2 (en) | 2017-12-21 | 2021-02-23 | Pure Storage, Inc. | Maximizing data reduction in a partially encrypted volume |
US10627889B2 (en) * | 2018-01-29 | 2020-04-21 | Microsoft Technology Licensing, Llc | Power and energy profiling for efficient virtual environments |
US10992533B1 (en) | 2018-01-30 | 2021-04-27 | Pure Storage, Inc. | Policy based path management |
US11972134B2 (en) | 2018-03-05 | 2024-04-30 | Pure Storage, Inc. | Resource utilization using normalized input/output (‘I/O’) operations |
US10521151B1 (en) | 2018-03-05 | 2019-12-31 | Pure Storage, Inc. | Determining effective space utilization in a storage system |
US11861170B2 (en) | 2018-03-05 | 2024-01-02 | Pure Storage, Inc. | Sizing resources for a replication target |
US11150834B1 (en) | 2018-03-05 | 2021-10-19 | Pure Storage, Inc. | Determining storage consumption in a storage system |
US10942650B1 (en) | 2018-03-05 | 2021-03-09 | Pure Storage, Inc. | Reporting capacity utilization in a storage system |
US10296258B1 (en) | 2018-03-09 | 2019-05-21 | Pure Storage, Inc. | Offloading data storage to a decentralized storage network |
US10917471B1 (en) | 2018-03-15 | 2021-02-09 | Pure Storage, Inc. | Active membership in a cloud-based storage system |
US11288138B1 (en) | 2018-03-15 | 2022-03-29 | Pure Storage, Inc. | Recovery from a system fault in a cloud-based storage system |
US12066900B2 (en) | 2018-03-15 | 2024-08-20 | Pure Storage, Inc. | Managing disaster recovery to cloud computing environment |
US10924548B1 (en) | 2018-03-15 | 2021-02-16 | Pure Storage, Inc. | Symmetric storage using a cloud-based storage system |
US11210009B1 (en) | 2018-03-15 | 2021-12-28 | Pure Storage, Inc. | Staging data in a cloud-based storage system |
US11048590B1 (en) | 2018-03-15 | 2021-06-29 | Pure Storage, Inc. | Data consistency during recovery in a cloud-based storage system |
US11095706B1 (en) | 2018-03-21 | 2021-08-17 | Pure Storage, Inc. | Secure cloud-based storage system management |
US11171950B1 (en) | 2018-03-21 | 2021-11-09 | Pure Storage, Inc. | Secure cloud-based storage system management |
US10838833B1 (en) | 2018-03-26 | 2020-11-17 | Pure Storage, Inc. | Providing for high availability in a data analytics pipeline without replicas |
US11436344B1 (en) | 2018-04-24 | 2022-09-06 | Pure Storage, Inc. | Secure encryption in deduplication cluster |
US11392553B1 (en) | 2018-04-24 | 2022-07-19 | Pure Storage, Inc. | Remote data management |
US20190354628A1 (en) | 2018-05-21 | 2019-11-21 | Pure Storage, Inc. | Asynchronous replication of synchronously replicated data |
US11675503B1 (en) | 2018-05-21 | 2023-06-13 | Pure Storage, Inc. | Role-based data access |
US11954220B2 (en) | 2018-05-21 | 2024-04-09 | Pure Storage, Inc. | Data protection for container storage |
US11455409B2 (en) | 2018-05-21 | 2022-09-27 | Pure Storage, Inc. | Storage layer data obfuscation |
US12181981B1 (en) | 2018-05-21 | 2024-12-31 | Pure Storage, Inc. | Asynchronously protecting a synchronously replicated dataset |
US12086431B1 (en) | 2018-05-21 | 2024-09-10 | Pure Storage, Inc. | Selective communication protocol layering for synchronous replication |
US10871922B2 (en) | 2018-05-22 | 2020-12-22 | Pure Storage, Inc. | Integrated storage management between storage systems and container orchestrators |
US11416298B1 (en) | 2018-07-20 | 2022-08-16 | Pure Storage, Inc. | Providing application-specific storage by a storage system |
US11403000B1 (en) | 2018-07-20 | 2022-08-02 | Pure Storage, Inc. | Resiliency in a cloud-based storage system |
US11146564B1 (en) | 2018-07-24 | 2021-10-12 | Pure Storage, Inc. | Login authentication in a cloud storage platform |
US11632360B1 (en) | 2018-07-24 | 2023-04-18 | Pure Storage, Inc. | Remote access to a storage device |
US11954238B1 (en) | 2018-07-24 | 2024-04-09 | Pure Storage, Inc. | Role-based access control for a storage system |
US11860820B1 (en) | 2018-09-11 | 2024-01-02 | Pure Storage, Inc. | Processing data through a storage system in a data pipeline |
US12026381B2 (en) | 2018-10-26 | 2024-07-02 | Pure Storage, Inc. | Preserving identities and policies across replication |
US10671302B1 (en) | 2018-10-26 | 2020-06-02 | Pure Storage, Inc. | Applying a rate limit across a plurality of storage systems |
US11340837B1 (en) | 2018-11-18 | 2022-05-24 | Pure Storage, Inc. | Storage system management via a remote console |
US12026060B1 (en) | 2018-11-18 | 2024-07-02 | Pure Storage, Inc. | Reverting between codified states in a cloud-based storage system |
US11526405B1 (en) | 2018-11-18 | 2022-12-13 | Pure Storage, Inc. | Cloud-based disaster recovery |
US12026061B1 (en) | 2018-11-18 | 2024-07-02 | Pure Storage, Inc. | Restoring a cloud-based storage system to a selected state |
US10963189B1 (en) | 2018-11-18 | 2021-03-30 | Pure Storage, Inc. | Coalescing write operations in a cloud-based storage system |
US11379254B1 (en) | 2018-11-18 | 2022-07-05 | Pure Storage, Inc. | Dynamic configuration of a cloud-based storage system |
US11650749B1 (en) | 2018-12-17 | 2023-05-16 | Pure Storage, Inc. | Controlling access to sensitive data in a shared dataset |
US11003369B1 (en) | 2019-01-14 | 2021-05-11 | Pure Storage, Inc. | Performing a tune-up procedure on a storage device during a boot process |
US10880371B2 (en) | 2019-03-05 | 2020-12-29 | International Business Machines Corporation | Connecting an initiator and a target based on the target including an identity key value pair and a target characteristic key value pair |
US11588633B1 (en) | 2019-03-15 | 2023-02-21 | Pure Storage, Inc. | Decommissioning keys in a decryption storage system |
US11042452B1 (en) | 2019-03-20 | 2021-06-22 | Pure Storage, Inc. | Storage system data recovery using data recovery as a service |
US11221778B1 (en) | 2019-04-02 | 2022-01-11 | Pure Storage, Inc. | Preparing data for deduplication |
US11068162B1 (en) | 2019-04-09 | 2021-07-20 | Pure Storage, Inc. | Storage management in a cloud data store |
US11853266B2 (en) | 2019-05-15 | 2023-12-26 | Pure Storage, Inc. | Providing a file system in a cloud environment |
US11126364B2 (en) | 2019-07-18 | 2021-09-21 | Pure Storage, Inc. | Virtual storage system architecture |
US11327676B1 (en) | 2019-07-18 | 2022-05-10 | Pure Storage, Inc. | Predictive data streaming in a virtual storage system |
US11392555B2 (en) | 2019-05-15 | 2022-07-19 | Pure Storage, Inc. | Cloud-based file services |
US12001355B1 (en) | 2019-05-24 | 2024-06-04 | Pure Storage, Inc. | Chunked memory efficient storage data transfers |
US12254199B2 (en) | 2019-07-18 | 2025-03-18 | Pure Storage, Inc. | Declarative provisioning of storage |
US11093139B1 (en) | 2019-07-18 | 2021-08-17 | Pure Storage, Inc. | Durably storing data within a virtual storage system |
US11861221B1 (en) | 2019-07-18 | 2024-01-02 | Pure Storage, Inc. | Providing scalable and reliable container-based storage services |
US11487715B1 (en) | 2019-07-18 | 2022-11-01 | Pure Storage, Inc. | Resiliency in a cloud-based storage system |
US11526408B2 (en) | 2019-07-18 | 2022-12-13 | Pure Storage, Inc. | Data recovery in a virtual storage system |
US11422751B2 (en) | 2019-07-18 | 2022-08-23 | Pure Storage, Inc. | Creating a virtual storage system |
US11550514B2 (en) | 2019-07-18 | 2023-01-10 | Pure Storage, Inc. | Efficient transfers between tiers of a virtual storage system |
US11086553B1 (en) | 2019-08-28 | 2021-08-10 | Pure Storage, Inc. | Tiering duplicated objects in a cloud-based object store |
US11693713B1 (en) | 2019-09-04 | 2023-07-04 | Pure Storage, Inc. | Self-tuning clusters for resilient microservices |
US12166820B2 (en) | 2019-09-13 | 2024-12-10 | Pure Storage, Inc. | Replicating multiple storage systems utilizing coordinated snapshots |
US11360689B1 (en) | 2019-09-13 | 2022-06-14 | Pure Storage, Inc. | Cloning a tracking copy of replica data |
US11797569B2 (en) | 2019-09-13 | 2023-10-24 | Pure Storage, Inc. | Configurable data replication |
US12045252B2 (en) | 2019-09-13 | 2024-07-23 | Pure Storage, Inc. | Providing quality of service (QoS) for replicating datasets |
US11573864B1 (en) | 2019-09-16 | 2023-02-07 | Pure Storage, Inc. | Automating database management in a storage system |
US10911304B1 (en) * | 2019-09-18 | 2021-02-02 | Cisco Technology, Inc. | Client-server transaction protocol for compatibility verification |
US11669386B1 (en) | 2019-10-08 | 2023-06-06 | Pure Storage, Inc. | Managing an application's resource stack |
US11531487B1 (en) | 2019-12-06 | 2022-12-20 | Pure Storage, Inc. | Creating a replica of a storage system |
US11733901B1 (en) | 2020-01-13 | 2023-08-22 | Pure Storage, Inc. | Providing persistent storage to transient cloud computing services |
US11709636B1 (en) | 2020-01-13 | 2023-07-25 | Pure Storage, Inc. | Non-sequential readahead for deep learning training |
US11720497B1 (en) | 2020-01-13 | 2023-08-08 | Pure Storage, Inc. | Inferred nonsequential prefetch based on data access patterns |
US12014065B2 (en) | 2020-02-11 | 2024-06-18 | Pure Storage, Inc. | Multi-cloud orchestration as-a-service |
US11868622B2 (en) | 2020-02-25 | 2024-01-09 | Pure Storage, Inc. | Application recovery across storage systems |
US11637896B1 (en) | 2020-02-25 | 2023-04-25 | Pure Storage, Inc. | Migrating applications to a cloud-computing environment |
US12124725B2 (en) | 2020-03-25 | 2024-10-22 | Pure Storage, Inc. | Managing host mappings for replication endpoints |
US11321006B1 (en) | 2020-03-25 | 2022-05-03 | Pure Storage, Inc. | Data loss prevention during transitions from a replication source |
US12038881B2 (en) | 2020-03-25 | 2024-07-16 | Pure Storage, Inc. | Replica transitions for file storage |
US11630598B1 (en) | 2020-04-06 | 2023-04-18 | Pure Storage, Inc. | Scheduling data replication operations |
US11301152B1 (en) | 2020-04-06 | 2022-04-12 | Pure Storage, Inc. | Intelligently moving data between storage systems |
US11494267B2 (en) | 2020-04-14 | 2022-11-08 | Pure Storage, Inc. | Continuous value data redundancy |
US11921670B1 (en) | 2020-04-20 | 2024-03-05 | Pure Storage, Inc. | Multivariate data backup retention policies |
US12131056B2 (en) | 2020-05-08 | 2024-10-29 | Pure Storage, Inc. | Providing data management as-a-service |
US12254206B2 (en) | 2020-05-08 | 2025-03-18 | Pure Storage, Inc. | Non-disruptively moving a storage fleet control plane |
US11431488B1 (en) | 2020-06-08 | 2022-08-30 | Pure Storage, Inc. | Protecting local key generation using a remote key management service |
US11442652B1 (en) | 2020-07-23 | 2022-09-13 | Pure Storage, Inc. | Replication handling during storage system transportation |
US11349917B2 (en) | 2020-07-23 | 2022-05-31 | Pure Storage, Inc. | Replication handling among distinct networks |
US12079222B1 (en) | 2020-09-04 | 2024-09-03 | Pure Storage, Inc. | Enabling data portability between systems |
US12131044B2 (en) | 2020-09-04 | 2024-10-29 | Pure Storage, Inc. | Intelligent application placement in a hybrid infrastructure |
EP4011873A1 (en) | 2020-12-10 | 2022-06-15 | Bayer Aktiengesellschaft | Substituted pyrazolo piperidine carboxylic acids |
US11397545B1 (en) | 2021-01-20 | 2022-07-26 | Pure Storage, Inc. | Emulating persistent reservations in a cloud-based storage system |
US11853285B1 (en) | 2021-01-22 | 2023-12-26 | Pure Storage, Inc. | Blockchain logging of volume-level events in a storage system |
US12086649B2 (en) | 2021-05-12 | 2024-09-10 | Pure Storage, Inc. | Rebalancing in a fleet of storage systems using data science |
US11816129B2 (en) | 2021-06-22 | 2023-11-14 | Pure Storage, Inc. | Generating datasets using approximate baselines |
US12159145B2 (en) | 2021-10-18 | 2024-12-03 | Pure Storage, Inc. | Context driven user interfaces for storage systems |
US11914867B2 (en) | 2021-10-29 | 2024-02-27 | Pure Storage, Inc. | Coordinated snapshots among storage systems implementing a promotion/demotion model |
US11714723B2 (en) | 2021-10-29 | 2023-08-01 | Pure Storage, Inc. | Coordinated snapshots for data stored across distinct storage environments |
US11893263B2 (en) | 2021-10-29 | 2024-02-06 | Pure Storage, Inc. | Coordinated checkpoints among storage systems implementing checkpoint-based replication |
US11922052B2 (en) | 2021-12-15 | 2024-03-05 | Pure Storage, Inc. | Managing links between storage objects |
US11847071B2 (en) | 2021-12-30 | 2023-12-19 | Pure Storage, Inc. | Enabling communication between a single-port device and multiple storage system controllers |
US12001300B2 (en) | 2022-01-04 | 2024-06-04 | Pure Storage, Inc. | Assessing protection for storage resources |
US11860780B2 (en) | 2022-01-28 | 2024-01-02 | Pure Storage, Inc. | Storage cache management |
US11886295B2 (en) | 2022-01-31 | 2024-01-30 | Pure Storage, Inc. | Intra-block error correction |
US12182113B1 (en) | 2022-11-03 | 2024-12-31 | Pure Storage, Inc. | Managing database systems using human-readable declarative definitions |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050012022A1 (en) * | 2003-07-17 | 2005-01-20 | Kye Systems Corp. | Optical input device with variable illumination for detecting movement on working surfaces having different optical characteristics |
US20090008340A1 (en) * | 2005-03-04 | 2009-01-08 | Linde Aktiengesellschaft | Method for Evaporating a Process Stream Comprising at Least Two Components |
US20100028115A1 (en) * | 2000-09-29 | 2010-02-04 | Karapet Ablabutyan | Wheelchair lift |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7055056B2 (en) * | 2001-11-21 | 2006-05-30 | Hewlett-Packard Development Company, L.P. | System and method for ensuring the availability of a storage system |
CN1204493C (en) * | 2002-08-06 | 2005-06-01 | 中国科学院计算技术研究所 | Service binding system and method |
JP2005157826A (en) * | 2003-11-27 | 2005-06-16 | Hitachi Ltd | Access control apparatus and method |
CN1834912B (en) * | 2005-03-15 | 2011-08-31 | 蚬壳星盈科技有限公司 | ISCSI bootstrap driving system and method for expandable internet engine |
US7506067B2 (en) * | 2005-07-28 | 2009-03-17 | International Business Machines Corporation | Method and apparatus for implementing service requests from a common database in a multiple DHCP server environment |
JP2007036801A (en) * | 2005-07-28 | 2007-02-08 | Nippon Telegr & Teleph Corp <Ntt> | Target portal host, target portal host cluster, ip storage system, and target portal method |
CN101022425B (en) * | 2007-04-02 | 2012-05-23 | 杭州华三通信技术有限公司 | ISCSI-based storage resource distributing method |
US20090292792A1 (en) * | 2008-05-21 | 2009-11-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Management infon, method and system for workflow management in a communications network |
US9231846B2 (en) * | 2011-11-22 | 2016-01-05 | Microsoft Technology Licensing, Llc | Providing network capability over a converged interconnect fabric |
US8935761B2 (en) * | 2012-06-25 | 2015-01-13 | Cleversafe, Inc. | Accessing storage nodes in an on-line media storage system |
-
2013
- 2013-09-27 DE DE112013007296.3T patent/DE112013007296T5/en not_active Withdrawn
- 2013-09-27 US US14/128,453 patent/US9577953B2/en not_active Expired - Fee Related
- 2013-09-27 WO PCT/US2013/062466 patent/WO2015047347A1/en active Application Filing
- 2013-09-27 CN CN201380079536.0A patent/CN105531690B/en not_active Expired - Fee Related
- 2013-09-27 CA CA2931098A patent/CA2931098A1/en active Pending
-
2017
- 2017-01-12 US US15/405,223 patent/US20170126619A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100028115A1 (en) * | 2000-09-29 | 2010-02-04 | Karapet Ablabutyan | Wheelchair lift |
US20050012022A1 (en) * | 2003-07-17 | 2005-01-20 | Kye Systems Corp. | Optical input device with variable illumination for detecting movement on working surfaces having different optical characteristics |
US20090008340A1 (en) * | 2005-03-04 | 2009-01-08 | Linde Aktiengesellschaft | Method for Evaporating a Process Stream Comprising at Least Two Components |
Also Published As
Publication number | Publication date |
---|---|
CN105531690A (en) | 2016-04-27 |
WO2015047347A1 (en) | 2015-04-02 |
US20150095515A1 (en) | 2015-04-02 |
US9577953B2 (en) | 2017-02-21 |
DE112013007296T5 (en) | 2016-04-21 |
CA2931098A1 (en) | 2015-04-02 |
CN105531690B (en) | 2018-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9577953B2 (en) | Determination of a suitable target for an initiator by a control plane processor | |
US10700979B2 (en) | Load balancing for a virtual networking system | |
US10116625B2 (en) | Systems and methods for secure containerization | |
US10567308B1 (en) | Virtual machine virtual fabric login system | |
CN109561171B (en) | Configuration method and device of virtual private cloud service | |
US9749145B2 (en) | Interoperability for distributed overlay virtual environment | |
US9628290B2 (en) | Traffic migration acceleration for overlay virtual environments | |
US11095716B2 (en) | Data replication for a virtual networking system | |
CN102780601A (en) | Method and system of virtual managed network | |
CN112350918B (en) | A service flow scheduling method, device, equipment and storage medium | |
US10992526B1 (en) | Hyper-converged infrastructure networking configuration system | |
CN114172853A (en) | Flow forwarding and bare computer server configuration method and device | |
US11012304B1 (en) | Networking device replacement system | |
US10243996B2 (en) | LAN/SAN network security management | |
US20230388369A1 (en) | Techniques for overriding libraries for workloads in a cloud-computing environment | |
EP2946300B1 (en) | Sata initiator addressing and storage device slicing | |
CN112910939B (en) | Data processing method and related device | |
US20160269283A1 (en) | System and Method for Optimizing Management Controller Access for Multi-Server Management | |
TWI587217B (en) | Electronic apparatus and method for expanding storage capacity of electronic apparatus | |
US11516079B1 (en) | Network initialization communication storage system | |
CN115065730B (en) | Data processing method, first container, electronic equipment and storage medium | |
JP5780297B2 (en) | Port number identification system, port number identification system control method and control program therefor | |
JP2024503599A (en) | Synchronization of communication channel state information for highly available flows | |
CN118018548A (en) | Method and system for isolating CDN gateway based on IPVLAN network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |