This invention relates in general to network communications and, more particularly, to reliable communication of messages among nodes in an unreliable network, i.e., a network that does not guarantee delivery of messages.
In a networked cluster, the network clients, or nodes, communicate over paths established between pairs of nodes. In such an environment, a message may be lost when a fault is encountered in the path of the message. A reliable network has the capability to take appropriate action to guarantee delivery. However, when a network does not have the capability to guarantee delivery or detect delivery failure, then the network is unreliable.
When links fail in a network, and network interfaces continue to send message packets over these failed links, the applications running on the hosts will experience packet drops. For example, if there are four routes available between a source-destination node-pair, and one of them has a faulty link, then the applications will see a twenty-five percent packet loss. If such packets are part of a relatively large message, then the probability of the entire message being successfully received decreases to nearly zero. A traditional solution for this problem is to replace a failing route with a good route. Using this approach, the original route needs to be replaced when the failed link becomes operational again. Otherwise, over time, the static balance of routes in the network will suffer degradation.
In an unreliable network, clients are typically required to retransmit messages until they are delivered successfully. This direct approach, i.e., of retransmitting lost messages, is generally not acceptable in high performance environments. For example, one such environment is a clustered supercomputer in which a number of servers are connected together using a high-speed network. These servers rely on fast, reliable message transfer for application efficiency.
Accordingly, there is a need to overcome the aforementioned drawbacks of an unreliable network in order to enable reliable, fast delivery of messages in a networked cluster.
The shortcomings of the prior art are overcome and additional advantages are provided through a technique for providing reliable delivery of messages over an unreliable network.
In accordance with exemplary embodiments of the present invention, a communications network comprises a plurality of nodes adapted to communicate by transmitting packets between source nodes and destination nodes. A network interface is associated with each node. Each network interface defines a plurality of routes for transferring each packet from a source node to a destination node. Each network interface further comprises path status indicators for indicating whether each route in the route tables is usable or is unusable as being associated with a fault. A network manager monitors the network to identify faults therein and provides the path status indicators to the respective network interfaces.
A method for communicating among the plurality of nodes in the network comprises: defining a plurality of routes for transferring a packet from a source node to a destination node; monitoring the network to identify faults therein; providing path status indicators for indicating whether each route is usable or is unusable as being associated with a fault; and selecting a usable route for transferring the packet from the respective source node to the respective destination node.
Failed routes in the network are avoided based on the path status indicators. When a failed route is restored, such that the route is usable again, the path status table indicates that the usable state is restored. Advantageously, therefore, unusable routes are avoided and a balance of route usage in the network is maintained, without modifying routes or establishing different routes, thereby enabling reliable and high-performance message transfer.
Systems and computer program products corresponding to the above-summarized methods are also described and claimed herein.
Further, additional features and advantages are realized through the techniques of the present invention. Other embodiments and aspects of the invention are described in detail herein and are considered a part of the claimed invention.
The subject matter which is regarded as the invention is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features, and advantages of the invention are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:
Presented herein is a technique for overcoming the drawbacks of an unreliable network in order to provide reliable delivery of messages therein.
Packets are injected into and retrieved from the cluster network using switch network interfaces 28, or specially designed adapters, between the hosts and the cluster network. Each switch network interface 28 comprises a plurality, and preferably three or more, route tables. Each route table is indexed by a destination identifier. In particular, each entry in the route table defines a unique route that will move an incoming packet to the destination defined by its index. The routes typically span one or more switching elements and two or more links in the cluster network. The format of the route table is determined by the network architecture. In an exemplary embodiment, four predetermined routes are selected from among the plurality of routes available between a source and destination node-pair. A set of routes thus determined between a source and all other destinations in the network are placed on the source in the form of route tables. During cluster operation, when a source node needs to send a packet to a specific destination node, one of the (e.g., four) routes from the route table is selected as the path for sending the packet.
In an exemplary embodiment, as illustrated in
In accordance with preferred embodiments of the present invention, the network manager identifies faults in the network in order to determine which of the routes, if any, on any of the hosts are affected by a failure within the network. In an exemplary embodiment, the switch network interface 28 (see
Another advantage of the technique for providing reliable message transfer in accordance with preferred embodiments of the present invention is that the global knowledge of the network status is maintained by the network manager 30 (see
Yet another advantage of the present invention is that all paths that fail due to a link failure are marked unusable by the network manager by turning their path status bits off. While prior methods rely on message delivery failure to detect a failed path, the present invention has the capability to detect and avoid failures before they occur.
Still a further advantage of the present invention is that when a failed path becomes usable again, the network manager merely turns the appropriate path status bits back on. This is opposed to prior methods that require testing the path before path usage is reinstated. Such testing by attempting message transmission is not needed in accordance with the present invention.
Advantageously, therefore, in accordance with preferred embodiments of the present invention, preferred bits in the path table are dynamically modified, such that only good routes are utilized for transmitting messages, while faulty routes are avoided. As a result, reliable message transfer is achieved over an unreliable network.
The present invention can be included in an article of manufacture (e.g., one or more computer program products) having, for instance, computer usable media. The media has embodied therein, for instance, computer readable program code means for providing and facilitating the capabilities of the present invention. The article of manufacture can be included as a part of a computer system or sold separately.
Additionally, at least one program storage device readable by a machine embodying at least one program of instructions executable by the machine to perform the capabilities of the present invention can be provided.
The flow diagrams depicted herein are just examples. There may be many variations to these diagrams or the steps (or operations) described therein without departing from the spirit of the invention. For instance, the steps may be performed in a differing order, or steps may be added, deleted or modified. All of these variations are considered a part of the claimed invention.
Although preferred embodiments have been depicted and described in detail herein, it will be apparent to those skilled in the relevant art that various modifications, additions, substitutions and the like can be made without departing from the spirit of the invention and these are therefore considered to be within the scope of the invention as defined in the following claims.
Number | Name | Date | Kind |
---|---|---|---|
4532625 | Stover | Jul 1985 | A |
5068892 | Livanos | Nov 1991 | A |
5297137 | Ofek et al. | Mar 1994 | A |
5651027 | Okuyama | Jul 1997 | A |
5654695 | Olnowich et al. | Aug 1997 | A |
5764624 | Endo et al. | Jun 1998 | A |
5781546 | Sethu | Jul 1998 | A |
5812549 | Sethu | Sep 1998 | A |
5892923 | Yasuda et al. | Apr 1999 | A |
5987521 | Arrowood et al. | Nov 1999 | A |
6031835 | Abali et al. | Feb 2000 | A |
6148411 | Ichinohe et al. | Nov 2000 | A |
6411599 | Blanc et al. | Jun 2002 | B1 |
6496476 | Badt, Jr. et al. | Dec 2002 | B1 |
6535990 | Iterum et al. | Mar 2003 | B1 |
6560218 | McAllister et al. | May 2003 | B2 |
6570867 | Robinson et al. | May 2003 | B1 |
6584075 | Gupta et al. | Jun 2003 | B1 |
6603742 | Steele et al. | Aug 2003 | B1 |
6628643 | Park et al. | Sep 2003 | B1 |
6643256 | Shimojo et al. | Nov 2003 | B1 |
6683885 | Sugai et al. | Jan 2004 | B1 |
6700874 | Takihiro et al. | Mar 2004 | B1 |
6735205 | Mankude et al. | May 2004 | B1 |
6757242 | Wang et al. | Jun 2004 | B1 |
6785277 | Sundling et al. | Aug 2004 | B1 |
7002963 | Buyukkoc et al. | Feb 2006 | B1 |
7016299 | Kashyap | Mar 2006 | B2 |
7039922 | Shah et al. | May 2006 | B1 |
7218605 | Ochiai et al. | May 2007 | B2 |
7415532 | Shigeeda et al. | Aug 2008 | B2 |
7644137 | Bozak et al. | Jan 2010 | B2 |
20030048771 | Shipman | Mar 2003 | A1 |
20030095509 | Ramanan et al. | May 2003 | A1 |
20030142627 | Chiu et al. | Jul 2003 | A1 |
20030177228 | Vigouroux et al. | Sep 2003 | A1 |
20040151130 | Beshai et al. | Aug 2004 | A1 |
20040153572 | Walker et al. | Aug 2004 | A1 |
20050100035 | Chiou et al. | May 2005 | A1 |
20050188126 | Mashima et al. | Aug 2005 | A1 |
Number | Date | Country |
---|---|---|
282628 | Sep 1988 | EP |
11-068749 | Mar 1999 | JP |
2003-046545 | Feb 2003 | JP |
2003057919 | Jul 2003 | KR |
Number | Date | Country | |
---|---|---|---|
20070047453 A1 | Mar 2007 | US |