Living on the edge: Monitoring network flows at the edge in cloud data centers

Scalable network wide flow monitoring has remained a distant dream because of the strain it puts on network router resources. Recent proposals have advocated the use of coordinated sampling or host based flow monitoring to enable a scalable network wide monitoring service. As most hosts in data centers get virtualized with the emergence of the cloud, the hypervisor on a virtualized host adds another network layer in the form of a vSwitch (virtual switch). The vSwitch now forms the new edge of the network.

Continue reading »

Identity: A data center network fabric to enable co-existence of identical addresses

Seamless virtual machine (VM) mobility within and across data centers brings its own set of problems. One of these problems is enabling co-existence of identical or overlapping layer-2 and layer-3 addresses in a single data center network. The motivation for this problem comes from a number of compelling scenarios. These include the need to backup and restore or replicate multi-tier applications that comprise of multiple VMs from one data center to another or within the same data center. This requires significant network reconfiguration costs as IP addresses of replicated VMs may clash with other existing IP addresses in the data center or with other replicas of the same VMs. Similarly, when multiple data centers need to be consolidated through a single data center interconnect, their address ranges may overlap. Lastly, cloud providers need to ensure that various customers can backup and restore their VMs which can have potentially conflicting addresses with other customers’ VMs without requiring time consuming network reconfiguration efforts.

Continue reading »

Method and Appratus to trace the execution control flow of Java method

Applications comprise of methods which further comprise of control blocks (if else, while, switch etc.) that are taken or not taken at runtime depending on the runtime conditions. More often than not, while tracking specific entities like a structure variable or an Object instance, it becomes imperative to understand the following : 1) Methods which create and use the variable/instance 2) the actual Control Blocks within these methods that were traversed for creation or use of the object/variable. The above information is important to understand the specifics of what path was traversed to create and use the instance/variable - so that the debugging/diagnostics/profiling could concentrate on only those paths and narrow down the scope of analysis,thereby expediting the same.

Continue reading »
Top