Affinity defines a relationship between entities that describes a preference for two entities to communicate using a particular set of resources instead of a randomly chosen set of resources. As such, affinity is a concept that is independent of any one particular device, technology, or communication. Rather, affinity refers to communications that have known patterns between entities and/or technologies, as opposed to communication that is random in nature.
Affinity-based networking enables applications to specify intent about how their application or service works independent of the underlying infrastructure. The problem with this approach is different applications have different services, which complicates the identification of services that exhibit an affinity to resources and vice-versa. More importantly, the same set of services can be used in different ways by different applications, making the solution even more difficult. In addition, services are sensitive to their context (e.g., network load, type of infrastructure resources used, which other services are using the same shared resources, etc.). Hence, the infrastructure that supported one service may not be appropriate for a new instance of that same service if the operational context changed.
A goal of the present invention is to enable the affinity service to more easily identify existing, and define new, infrastructure resources that have an affinity for a set of services as a function of context.
In one approach, a method of configuring a network based on affinity begins by receiving a plurality of application requests and a set of business rules that describe the order of importance of a plurality of applications at an affinity analysis module. Affinities between application requests and a network-based infrastructure are detected based on the set of business rules. A new network configuration is derived based on the detected affinities, and the network is configured based on the new network configuration.
In another approach, an apparatus for configuring a network based on affinity is described. The apparatus includes a set of business rules describing the order of importance of a plurality of applications, an affinity analysis module that receives the set of business rules and a plurality of application requests and detects affinities between the application requests and an infrastructure of the network based on the set of business rules, an affinity computation module coupled to the affinity analysis module that determines a new network configuration based on the detected affinities, and a network management module that configures the network based on the new network configuration.
The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention:
Reference will now be made in detail to several embodiments. While the subject matter will be described in conjunction with the alternative embodiments, it will be understood that they are not intended to limit the claimed subject matter to these embodiments. On the contrary, the claimed subject matter is intended to cover alternative, modifications, and equivalents, which may be included within the spirit and scope of the claimed subject matter as defined by the appended claims.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the claimed subject matter. However, it will be recognized by one skilled in the art that embodiments may be practiced without these specific details or with equivalents thereof. In other instances, well-known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects and features of the subject matter.
Portions of the detailed description that follows are presented and discussed in terms of a method. Although steps and sequencing thereof may be disclosed in a figure herein describing the operations of this method (such as
Some portions of the detailed description are presented in terms of procedures, steps, logic blocks, processing, and other symbolic representations of operations on data bits that can be performed on computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. A procedure, computer-executed step, logic block, process, etc., is here, and generally, conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout, discussions utilizing terms such as “accessing,” “writing,” “including,” “storing,” “transmitting,” “traversing,” “associating,” “identifying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Computing devices, such as computing system 912, typically include at least some form of computer readable media. Computer readable media can be any available media that can be accessed by a computing device. By way of example, and not limitation, computer readable medium may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computing device. Communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signals such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
Some embodiments may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Typically the functionality of the program modules may be combined or distributed as desired in various embodiments.
Model-Driven, Affinity-Based, Network Functions
This invention describes the use of model-based engineering, in conjunction with an information model, to provide inherent extensibility in the definition and use of affinity-based Network Functions Virtualization (NFV) for application developers. More specifically, this invention targets the ongoing shift of traditional network management (NetOps) into developer-focused application building to perform management tasks (DevOps).
Affinity may be considered to be an inherent similarity between a set of applications and the capabilities that a network-based infrastructure provides. This similarity implies that some elements in the system need to communicate with some other set of specific elements much more than they do with other elements. Hence, this invention defines mechanisms for computing affinity that enables a set of applications to efficiently use network infrastructure.
In the following embodiments, an approach is described for affinity-based network configuration. In one approach, a method of configuring a network based on affinity begins by receiving a plurality of application requests and a set of business rules that describe the order of importance of a plurality of applications at an affinity analysis module. Affinities between application requests and a network-based infrastructure are detected based on the set of business rules. A new network configuration is derived based on the detected affinities, and the network is configured based on the new network configuration.
In another approach, a system for configuring a network based on affinity is described. The system includes a set of business rules describing the order of importance of a plurality of applications, an affinity analysis module that receives the set of business rules, and a plurality of application requests, and detects affinities between the application requests and a network-based infrastructure using the set of business rules, an affinity computation module coupled to the affinity analysis module that determines a new network configuration based on the detected affinities, and a network management module that configures the network based on the new network configuration.
Affinity-Based Network Functions Virtualization Management System
With reference now to
Information/data bus 105 enables components 108-118 to communicate with the data models (e.g., data models 103 and 104) being used. Concepts used in this invention may be represented using model elements from the information model; these model elements are mapped to one or more data elements, which are then made available to other components (e.g. components 108-118). The information model provides cohesion, as well as a common vocabulary, for each module to use. For example, a business rule may describe how affinity is defined and used. The business rule, the concept of affinity, and the services and resources that will be bound together using affinity may be represented as Manageable Entities in the information model. This arrangement makes it easier for application developers to define and use rules to manage affinity-based services.
Application requests 106 are analyzed by the Affinity Analysis module 110 to determine if affinities between new application request and the network infrastructure exist. Business rules 108 define a set of rules to prioritize the order of importance of applications. This may be necessary when multiple applications request the same shared resources in the infrastructure. The output of the Affinity Analysis module 110 is sent to the Affinity Computation module 112, which combines the affinity information with data from the network to determine how to reconfigure the network to make use of affinity data. The results are sent to the Network Management system 114, which configures the Network Topology 116. Infrastructure Capabilities 118 are derived from the currently configured infrastructure. This data represent potential adjustments to the infrastructure based on the Affinity Analyzer block 110, and the data may be fed back to the Affinity Calculator 112 to enable further optimizations.
Data Model Mapping from Generic Information Models
With reference now to
Management Topologies for Affinity-Based Networking
With reference now to
Still with reference to
Virtualized Network Functions for a Customizable Chain of Services
With reference now to
With reference still to
Affinity-Based Network Controller and Affinity Analyzer
With reference now to
With reference still to
With reference now to
With reference still to
New affinities that have been detected are stored in Affinity Topology database 302 and sent to Model-based Engineering module 502. Existing Traffic Analyzer 608 periodically checks to see if there are changes to any of the affinities previously detected. These changes are sent to Model-based Engineering module 502, which uses information from the models (e.g., models 102-104 shown in
Model-based Engineering module 502 uses Information Model 102 (shown in
With reference now to
In the above exemplary tuple, metadata may describe affinity data, affinity relationship data, affinity services, and/or resources that participate in affinity-based relationships. The metadata may provide additional semantics that describe one or more Manageable Entities that are participating in an affinity-based relationship, including the affinity element itself.
With reference still to
With reference still to
Both Infrastructure Capabilities 118 and output from Infrastructure 626 are fed to Application Discovery and Understanding module 628. This module may use a variety of tools to retrieve key statistics and information from existing applications. Examples include Application Discovery and Understanding Tools (e.g., IBM Infosphere), Application Performance Management Tools (e.g., Foglight, Riverbed), and Protocol Analyzers. These tools work with Model-based Engineering module 502 to identify existing traffic in the infrastructure and determine how the traffic has evolved (e.g., is it compliant with its SLAs; is it obeying as expected; is there more traffic than was anticipated). This is sent to Model-based Engineering module 502, which supports the operation of the Affinity Network Topology Analyzer, the Affinity Network Computation, and the Network Configuration Manager.
With reference now to
With reference now to
Embodiments of the present invention are thus described. While the present invention has been described in particular embodiments, it should be appreciated that the present invention should not be construed as limited by such embodiments, but rather construed according to the following claims.
| Number | Name | Date | Kind |
|---|---|---|---|
| 6611867 | Bowman-Amuah et al. | Aug 2003 | B1 |
| 7340522 | Basu et al. | Mar 2008 | B1 |
| 8244874 | Thireault | Aug 2012 | B1 |
| 8356087 | Miller | Jan 2013 | B1 |
| 8843894 | Dawson et al. | Sep 2014 | B2 |
| 9294437 | Ganguly et al. | Mar 2016 | B1 |
| 9301026 | Srinivas et al. | Mar 2016 | B2 |
| 20040230681 | Strassner et al. | Nov 2004 | A1 |
| 20070043860 | Pabari | Feb 2007 | A1 |
| 20080161941 | Strassner et al. | Jul 2008 | A1 |
| 20080271022 | Strassner et al. | Oct 2008 | A1 |
| 20100306354 | DeHaan et al. | Dec 2010 | A1 |
| 20100306382 | Cardosa et al. | Dec 2010 | A1 |
| 20110131309 | Akiyama et al. | Jun 2011 | A1 |
| 20120140636 | Resende | Jun 2012 | A1 |
| 20130108259 | Srinivas | May 2013 | A1 |
| 20130108264 | deRuijter et al. | May 2013 | A1 |
| 20140344453 | Varney et al. | Nov 2014 | A1 |
| 20150334696 | Gu et al. | Nov 2015 | A1 |
| 20150381410 | Strassner | Dec 2015 | A1 |
| 20170031623 | Gong et al. | Feb 2017 | A1 |
| Number | Date | Country |
|---|---|---|
| 102004671 | Apr 2011 | CN |
| 103703724 | Apr 2014 | CN |
| 104137482 | Nov 2014 | CN |
| 2922238 | Sep 2015 | EP |
| 3143511 | Mar 2017 | EP |
| WO-2010056545 | May 2010 | WO |
| WO-2013138096 | Sep 2013 | WO |
| WO-2013159291 | Oct 2013 | WO |
| Entry |
|---|
| “International Application Serial No. PCT/CN2015/094193, International Search Report dated Feb. 14, 2016”, 6 pgs. |
| “International Application Serial No. PCT/CN2015/094193, Written Opinion dated Feb. 14, 2016”, 4 pgs. |
| “Affinity Networking for Data Centers and Clouds Solution Overview”, Plexxi, Inc., Dec. 2012, pp. 1-5, (Dec. 2012), 1-5. |
| “European Application No. 15810904.1, Extended European Search Report dated Mar. 9, 2017”, (Mar. 9, 2017), 10 pgs. |
| “European Application No. 15858626.3, Extended European Search Report dated Oct. 13, 2017”, (Oct. 13, 2017), 11 pgs. |
| “International Application No. PCT/CN2015/082371, International Search Report and Written Opinion dated Sep. 1, 2015”, (Sep. 1, 2015), 11 pgs. |
| Gulati, Ajay, et al., “Vmware distributed resource management: Design, implementation, and lessons learned”, Vmware Technical Journal (VMTJ), Vmware Labs 1,9 , vol. 1, No. 1, Mar. 1, 2012, pp. 45-64, (Mar. 1, 2012), 45-64. |
| Li, Qiang, et al., “An Integrated Approach to Automatic Management of Virtualized Resources in Cloud Environments”, Computer Journal, vol. 54, No. 6, Nov. 24, 2010, pp. 905-919, (Nov. 24, 2010), 905-919. |
| Number | Date | Country | |
|---|---|---|---|
| 20160134474 A1 | May 2016 | US |