System and method for distributed management of shared computers
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/16
G06F-015/173
G06F-011/00
출원번호
US-0978873
(2004-11-01)
등록번호
US-7406517
(2008-07-29)
발명자
/ 주소
Hunt,Galen C.
Hydrie,Aamer
Levi,Steven P.
Stutz,David S.
Tabbara,Bassam
Welland,Robert V.
출원인 / 주소
Microsoft Corporation
대리인 / 주소
Lee & Hayes, PLLC
인용정보
피인용 횟수 :
88인용 특허 :
100
초록▼
A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application opera
A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application operations tier, execution of the applications is managed and sub-boundaries within a cluster of servers can be established. In the cluster operations tier, operation of the server computers is managed without concern for what applications are executing on the one or more server computers and boundaries between clusters of servers can be established. The multi-tiered server management architecture can also be employed in co-location facilities where clusters of servers are leased to tenants, with the tenants implementing the application operations tier and the facility owner (or operator) implementing the cluster operations tier.
대표청구항▼
The invention claimed is: 1. A computer implemented method comprising: establishing boundaries between a first cluster of computers for a first entity and a second cluster of computers for a second entity housed at a co-location facility, wherein the boundaries are established by a cluster operatio
The invention claimed is: 1. A computer implemented method comprising: establishing boundaries between a first cluster of computers for a first entity and a second cluster of computers for a second entity housed at a co-location facility, wherein the boundaries are established by a cluster operations management console at the co-location facility; establishing sub-boundaries within the first cluster, wherein the sub-boundaries are defined by an application operation management console located remote of the co-location facility; monitoring hardware operations and software operations of the first cluster, wherein the hardware operation of the first cluster is monitored by the cluster operations management console and the software operation of the first cluster is independently monitored by the application operation management console; detecting a hardware failure in one of the computers in the first cluster at the cluster operation management console; and performing an act, in response to detecting the hardware failure, to correct the hardware failure. 2. A computer implemented method as recited in claim 1, wherein the act comprises notifying a co-location facility administrator of the failure. 3. A computer implemented method as recited in claim 1, wherein the act comprises resetting the computer that includes the hardware that failed. 4. A computer implemented method as recited in claim 1, wherein the hardware operation includes one or more of: mass storage device operation, memory device operation, and network interface operation, and processor operation. 5. A computer implemented method as recited in claim 1, further comprising configuring each computer in the first cluster to impose boundaries preventing a plurality of other computers that are not part of the first cluster from accessing the one or more computers in the first cluster. 6. One or more computer-readable memories containing a computer program that is executable by a processor to perform the method recited in claim 1. 7. A computer implemented method comprising: establishing boundaries between a first cluster of computers for a first entity and a second cluster of computers for a second entity housed at a co-location facility, wherein the boundaries are established by a cluster operations management console at the co-location facility; establishing sub-boundaries within the first cluster, wherein the sub-boundaries are defined by an application operation management console located remote of the co-location facility; monitoring hardware operation and software operations of the first cluster of computers, wherein the hardware operation of the first cluster is monitored by the cluster operations management console and the software operation of the first cluster is independently monitored by the application operation management console; detecting a software failure in one of the computers in the first cluster at the application operation management console; and performing an act, in response to detecting the software failure, to correct the software failure. 8. A computer implemented method as recited in claim 7, wherein the act comprises notifying an administrator of the failure. 9. A computer implemented method as recited in claim 7, wherein the act comprises resetting the computer that executes the software that failed. 10. A computer implemented method as recited in claim 7, further comprising configuring the sub-boundaries prevent a first one or more computers within the first cluster from accessing a second one or more computers within the first cluster. 11. A computer implemented method as recited in claim 7, further comprising managing loading of a software component on one of the computers in the first cluster. 12. A computer implemented method as recited in claim 7, wherein the software failure comprises one or more of: a hung application process, a hung thread, and an error in execution of an application process. 13. A computer implemented method as recited in claim 7, wherein the monitoring, detecting, and performing are implemented in a remote computer, and further comprising using public key cryptography to securely communicate between the remote computer and each computer in the first cluster of computers. 14. One or more computer-readable memories containing a computer program that is executable by a processor to perform the method recited in claim 7. 15. One or more computer-readable media having stored thereon a computer program that, when executed by one or more processors, causes the one or more processors to perform acts including: establishing boundaries between a first cluster of computers for a first entity and a second cluster of computers for a second entity housed at a co-location facility, wherein the boundaries are established by a cluster operations management console at the co-location facility; establishing sub-boundaries within the first cluster, wherein the sub-boundaries are defined by an application operation management console located remote of the co-location facility; monitoring hardware operation and software operations of the first cluster of computers, wherein the hardware operation of the first cluster is monitored by the cluster operations management console and the software operation of the first cluster is independently monitored by the application operation management console; taking corrective action in response to a failure in operation of software executing on one of the computers in the first cluster. 16. One or more computer-readable media as recited in claim 15, wherein the corrective action comprises notifying an administrator of the failure. 17. One or more computer-readable media as recited in claim 15, wherein the corrective action comprises resetting the computer that executes the software that failed. 18. One or more computer-readable media as recited in claim 15, wherein the failure in operation of the software comprises one or more of: a hung application process, a hung thread, and an error in execution of an application process.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (100)
Harple Daniel L. ; Pizzarro Richard H., Apparatus for collaborative computing.
Salo, Randy; Van Hamersveld, Chris; Shelton, Barry K.; Herbinaux, Larry; Deacon, D. Brian; Fayal, Jr., Kenneth Eugene, CLIENTS REMOTE ACCESS TO ENTERPRISE NETWORKS EMPLOYING ENTERPRISE GATEWAY SERVERS IN A CENTRALIZED DATA CENTER CONVERTING PLURALITY OF DATA REQUESTS FOR MESSAGING AND COLLABORATION INTO A SINGLE REQU.
Srini Krishnamurthy ; Sunil Sharad Mehta ; Cary Bailey O'Brien, DEVICE MANAGEMENT SYSTEM FOR MANAGING STANDARDS-COMPLIANT AND NON-COMPLIANT NETWORK ELEMENTS USING STANDARD MANAGEMENT PROTOCOLS AND A UNIVERSAL SITE SERVER WHICH IS CONFIGURABLE FROM REMOTE LOCATION.
See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
Goldszmidt,German; Lorrain,Jean A.; Maruyama,Kiyoshi; Verma,Dinesh Chandra, METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING RESOURCES ASSIGNED TO PLURALITY OF CUSTOMERS, FOR MEETING SERVICE LEVEL AGREEMENTS (SLAS) WITH MINIMAL RESOURCES, AND ALLOWING COMMON POOLS OF RESOURCES.
Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
Arad Naveh ; Itzhak Parnafes ; Shai Mohaban ; Steven M. Woo, Method and apparatus for policy-based management of quality of service treatments of network data traffic flows by integrating policies with application programs.
Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for scalable distribution of information in a distributed network.
Novaes, Marcos N.; Laib, Gregory D.; Lucash, Jeffrey S.; Goering, Ronald T.; Sohos, George, Method, system and program products for defining nodes to a cluster.
Rodney A. DeKoning ; Ray M. Jantz ; William V. Courtright, II, Methods and apparatus for committing configuration changes to managed devices prior to completion of the configuration change.
Jantz, Ray M.; DeKoning, Rodney A.; Courtright, II, William V.; Markus, Matthew A., Methods and apparatus for performing mass operations on a plurality of managed devices on a network.
Thomsen, Brant D., Methods of determining whether a network interface card entry within the system registry pertains to physical hardware or to a virtual device.
Callis, Gregory M.; Franks, Jon Kevin; Huynh, Lap Thiet; Nguyen, Loan; Shannon, Diane Iupe; Yang, David Yu Pin, Methods systems and computer program products for processing an event based on policy rules using hashing.
Sarit Mukherjee ; Ibrahim Kamel ; Prasant Mohapatra, Multimedia file systems using file managers located on clients for managing network attached storage devices.
Jain Lalit ; Ford Michael T., Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks.
Waldo James H. (Dracut MA) Arnold Kenneth C. (Newton Centre MA) Erdos Marlena E. (Somerville MA) Robinson Douglas B. (Hollis NH) Hoffman D. Jeffrey (Nashua NH) Smith Lamar D. (San Jose CA) Showman Pe, Object oriented distributed computing system processing request to other object model with code mapping by object manage.
Zheng, Qin; Willis, Steven R.; Kastenholz, Frank; Crawley, Eric, Quality of service facility in a device for performing IP forwarding and ATM switching.
Albert, Mark; Howes, Richard A.; Jordan, James A.; Kersey, Edward A.; Menditto, Louis F.; O'Rourke, Chris; Tiwari, Pranav Kumar; Tsang, Tzu-Ming, Sending instructions from a service manager to forwarding agents on a need to know basis.
Boden Edward B. ; Brzozowski Wesley A. ; Bullock Mark C. ; Parks Scott B. ; Williams Michael D., System and method for IP network address translation and IP filtering with dynamic address resolution.
Boden, Edward B.; Brzozowski, Wesley A.; Gruber, Franklin A.; Palermo, Donald A.; Williams, Michael D., System and method for IP network address translation using selective masquerade.
Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V.; Tabbara, Bassam; Levi, Steven P.; Rehof, Jakob, System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model.
Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
Krishna, Gopal S.; Chow, Peter Ka-Fai; Viswanath, Somnath; Tzeng, Shr-Jie; Kanuri, Mrudula, System and method for network management of local area networks having non-blocking network switches configured for switching data packets between subnetworks based on management policies.
Miyamoto,Carleton; Lin,Chang; Blume,William; Bandhole,Jagadish, System for dynamic provisioning of secure, scalable, and extensible networked computer environments.
Badovinatz Peter Richard ; Brenner Larry Bert ; Chandra Tushar Deepak ; Kirby Orvalle Theodore ; Pershing ; Jr. John Arthur, System for utilizing batch requests to present membership changes to process groups.
Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
Paul Weschler, System, method and computer program product for searching for, and retrieving, profile attributes based on other target profile attributes and associated profiles.
Christopher Ambler ; Andrew Wallace, System, method, and computer program product for workflow processing using internet interoperable electronic messaging with mime multiple content type.
Christopher Sean Johnson, Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for implementing language capabilities using the same.
Sheard Nicolas C. ; Fischer Larry J. ; Matthews Richard W. ; Gurla Himabindu ; Hu Qilin ; Zheng Wendy J. ; Mow Boyle Y., Visual data integration system and method.
Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
Outhred, Geoffrey; Han, Eric K; Grealish, Kevin D. J.; Brown, Mathilde C.; Gustin, Reid B; Mensching, Rob; Nielsen, Steven T, Model and system state synchronization.
Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Pardyak, Przemek; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based provisioning of test environments.
Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.