One embodiment of the present invention provides a system that facilitates traffic isolation (TI) in a network. During operation, the system configures a set of switch ports as members of a TI zone. The switch ports are part of an end-to-end path across one or more switch domains between a source and a destination. The switch ports within the TI zone and outside the TI zone belong to a common storage area network (SAN) zone which compartmentalizes data for security purposes. The system then determines whether a data flow entering a switch domain belongs to the TI zone. The system subsequently forwards the data flow to the next port within the TI zone if the data flow belongs to the TI zone.
|
17. A switch for facilitating traffic isolation in a network, the switch comprising:
a set of ports operable as members of a first logical group, wherein a logical group is a subset of ports in the switch and precludes a data flow not belonging to the logical group from reaching a port within the logical group;
a logical-group mapping module adapted to:
identify that a packet belongs to the first logical group based on the subset of ports belonging to the first logical group; and
determine whether a failover option for the first logical group is enabled in response to a port of the first logical group not being available;
and
a forwarding module adapted to:
associate the packet with the port as an output port in response to the port being available; and
associate the packet with a second port as an output port in response to the failover option being enabled, wherein the second port is a member of a second logical group, and wherein the second logical group is distinct from the first logical group.
1. A method for facilitating traffic isolation in a switch, the method comprising:
configuring one or more ports of the switch as members of first a traffic isolation zone, wherein a traffic isolation zone is a subset of ports in the switch and precludes a data flow not belonging to the traffic isolation zone from reaching a port within the traffic isolation zone;
identifying that a data flow belongs to the first traffic isolation zone based on the subset of ports belonging to the first traffic isolation zone;
in response to a port of the first traffic isolation zone being available, associating the data flow with the port as an output port;
in response to the port not being available, determining whether a failover option for the first traffic isolation zone is enabled; and
in response to the failover option being enabled, associating the data flow with a second port as an output port, wherein the second port is a member of a second traffic isolation zone, and wherein the second traffic isolation zone is distinct from the first traffic isolation zone.
9. A non-transitory computer-readable medium storing instructions which when executed by a computer cause the computer to perform a method for facilitating traffic isolation in a network, the method comprising:
configuring one or more ports of a switch as members of a first logical group, wherein a logical group is a subset of ports in the switch and precludes a data flow not belonging to the logical group from reaching a port within the logical group;
identifying that a packet belongs to the first logical group based on the subset of ports belonging to the first traffic isolation zone;
in response to a port of the first logical group being available, associating the packet with the port as an output port;
in response to the port not being available, determining whether a failover option for the first logical group is enabled; and
in response to the failover option being enabled, associating the packet with a second port as an output port, wherein the second port is a member of a second logical group, and wherein the second logical group is distinct from the first logical group.
2. The method of
using the first traffic isolation zone to enforce one or more Quality-of-Service (QoS) parameters for a QoS class.
3. The method of
propagating the configuration of the first traffic isolation zone across one or more switches;
determining whether a local switch is part of the first traffic isolation zone; and
updating a local forwarding table with the configuration of the first traffic isolation zone.
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
10. The computer-readable medium of
11. The computer-readable medium of
propagating the configuration of the first logical group across one or more switches;
determining whether a local switch is part of the first logical group; and
updating a local forwarding table with the configuration of the first logical group.
12. The computer-readable medium of
13. The computer-readable medium of
14. The computer-readable medium of
15. The computer-readable medium of
16. The computer-readable medium of
18. The switch of
19. The switch of
propagate the configuration of the first logical group across one or more switches;
determine whether a local switch domain is part of the logical group; and
update a local forwarding table with the configuration of the first logical group.
20. The switch of
21. The switch of
22. The switch of
23. The switch of
24. The switch of
|
1. Field
The present disclosure relates to network management. More specifically, the present disclosure relates to a method and system for facilitating traffic isolation (TI) zones in a network.
2. Related Art
The proliferation of the Internet and e-commerce continues to fuel revolutionary changes in the network industry. Today, a significant number of transactions, from real-time stock trades to retail sales, auction bids, and credit-card payments, are conducted online. Consequently, many enterprises rely on existing storage area networks (SANs), not only to perform conventional storage functions such as data backup, but also to carry out an increasing number of egalitarian network functions such as building large server farms.
Historically, conventional network appliances (e.g., data-center servers, disk arrays, backup tape drives) mainly use a SAN network to transfer large blocks of data. Therefore, the switches provide only basic patch-panel-like functions. In the past decade, however, drastic advances occurred in almost all the network layers, ranging from physical transmission media, computer hardware and architecture, to operating system (OS) and application software.
For example, a single-wavelength channel in an optical fiber can provide 10 Gbps of transmission capacity. With wavelength-division-multiplexing (WDM) technology, a single strand of fiber can provide 40, 80, or 160 Gbps aggregate capacity. Meanwhile, computer hardware is becoming progressively cheaper and faster. Expensive high-end servers can now be readily replaced by a farm of many smaller, cheaper, and equally fast computers. In addition, OS technologies, such as virtual machines, have unleashed the power of fast hardware and provide an unprecedented versatile computing environment.
As a result of these technological advances, a conventional SAN switch fabric faces a much more heterogeneous, versatile, and dynamic environment. The limited network functions in such switches can hardly meet these demands. For instance, applications that require high bandwidth, such as backup applications, may cause congestion in the fabric and impact other critical application performance. Hence, there is a need for options to segregate some applications from others and to assign dedicated paths to certain applications.
One embodiment of the present invention provides a system that facilitates traffic isolation (TI) in a network. During operation, the system configures a set of switch ports as members of a TI zone. The switch ports are part of an end-to-end path across one or more switch domains between a source and a destination. The switch ports within the TI zone and outside the TI Zone belong to a common storage area network (SAN) zone which compartmentalizes data for security purposes. The system then determines whether a data flow entering a switch domain belongs to the TI zone. The system subsequently forwards the data flow to the next-hop port within the TI zone if the data flow belongs to the TI zone. When the data flow does not belong to the TI zone, the system prevents the data flow from reaching a port within the TI zone.
In a variation on this embodiment, the system uses the TI zone to enforce one or more Quality-of-Service (QoS) parameters for a QoS class
In a variation on this embodiment, the system configures the switch ports as members of the TI zone by first propagating the TI zone configuration across one or more switch domains. The system then determines whether a local switch domain is part of the TI zone. The system subsequently updates a local forwarding table with the TI zone configuration.
In a variation on this embodiment, the system forwards a data flow which does not belong to the TI zone to a port that belongs to the TI-zone, if no port outside the TI zone is available to forward this data flow to its destination.
In a variation on this embodiment, the system forwards a data flow which belongs to the TI zone to a port outside the TI zone, if the next-hop port within the TI zone for this data flow is not available.
In a variation on this embodiment, the system drops a data flow which belongs to the TI zone, if the next port within the TI zone for this data flow is not available.
In a variation on this embodiment, the switch ports configured as part of the TI zone are Fibre Channel ports and comprise one or more of N_Ports, E_Ports, and EX_Ports.
In a further variation, the TI zone comprises a set of inter-switch links (ISLs) coupling adjacent E_Ports that form the end-to-end path.
In a further variation, the TI zone comprises one or more EX_Ports and is configured to traverse fibre channel routers (FCRs) and FCR-coupled fabrics.
The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not limited to the embodiments shown, but is to be accorded the widest scope consistent with the claims.
The data structures and code described in this detailed description are typically stored on a computer-readable storage medium, which may be any device or medium that can store code and/or data for use by a computer system. This includes, but is not limited to, application-specific integrated circuits (ASIC), field-programmable gate arrays (FPGA), volatile memory, non-volatile memory, magnetic and optical storage, or other media capable of storing computer-readable media now known or later developed.
Overview
Embodiments of the present invention facilitate traffic isolation (TI) zones in a Fibre Channel (FC) network. TI zones allow users to assign a data flow to specific inter-switch links (ISLs) to isolate traffic within a switch fabric. This configuration provides the option to segregate some applications from others with dedicated, separate paths through the switch fabric. For example, backup applications often require guaranteed high bandwidth, and assigning them to dedicated paths within a TI zone helps reduce congestion and prevent them from impacting other critical application performance. TI zones can also be used to dedicate inter-switch links (ISLs) to high-priority data flows, and control the route for inter-switch traffic. Such configuration can facilitate enforcement of different Quality-of-Service (QoS) classes. For example, a TI zone can be dedicated to a higher-priority QoS classes, so that lower-priority traffic is precluded from consuming the bandwidth allocated to the higher-priority QoS class.
A TI zone can include a set of switch ports used for specific traffic flows. When a TI zone is enforced, a data flow entering a starting switch port is forwarded to a next-hop port within the same TI zone. Under normal conditions, traffic outside the TI zone is precluded from entering the TI zone. Hence, TI zones can effectively facilitate traffic isolation. In come cases, if the next-hop port cannot be reached due to link failure, the data flow can be forwarded to a port on an alternative path outside the zone. This configuration is possible when the failover option is enabled. In case the failover option is disabled, data flows belonging to the zone can be optionally dropped if there is a link failure in the TI zone.
Network Architecture
The heterogeneous nature of modern FC networks imposes many new challenges, among which traffic management deals with controlling and allocating network bandwidth and minimizing congestion at switch ports. Embodiments of the present invention facilitate TI zones as one of the traffic management services, which allocate specific ISLs to data flows. This ensures that a data flow belonging to a particular zone is isolated from traffic from other zones and can enjoy dedicated network resources, which is valuable especially for high-bandwidth traffic.
A respective network appliance can communicate with any appliance (referred to as “target”) in the FC network. For example, one of the servers 110 can transfer data to and from one of tape backup devices 116. Note that, since the switch modules are not coupled in a fully meshed topology, the data frames transferred between servers 110 and tape devices 116 traverse three switch modules 102, 104, and 106. In general, the switch modules are coupled by ISLs, such as ISL 114. In one embodiment, a network operator can specify and enforce a TI zone, for example, a dedicated switched path coupling server 110 and tape devices 116, through the switch fabric. This TI zone includes a number switch ports and ISLs. Traffic outside the TI zone is precluded from entering the TI zone. This way, the network operator can guarantee the service quality between server 110 and tape devices 116.
As shown in
A switch typically has two types of ports: a fabric port (denoted as F_Port), which can couple to a network appliance, and an extension port (E_Port), which can couple to another switch. A network appliance communicates with a switch through a host bus adapter (HBA). The HBA provides the interface between an appliance's internal bus architecture and the external FC network. An HBA has at least one node port (N_Port), which couples to an F_Port on a switch through an optical transceiver and a fiber optic link. More details on FC network architecture, protocols, naming/address convention, and various standards are available in the documentation available from the NCITS/ANSI T11 committee (www.t11.org) and publicly available literature, such as “Designing Storage Area Networks,” by Tom Clark, 2nd Ed., Addison Wesley, 2003, the disclosure of which is incorporated by reference in its entirety herein.
In the network shown in
The application of TI zone provides a graceful solution to this problem in accordance with embodiments of the present invention. As illustrated in
Traffic Isolation Zones
In accordance with embodiments of the present invention, TI zones allow network administrators to provision a certain set of E_Ports on one or more switches to carry only designated data flows. TI zones assign specific paths to the data flows belonging to the zone, and control the route for inter-switch traffic. TI zones can provide dedicated ISLs to high-priority data flows. TI zones can also be used to force high-volume (but lower priority) data flows onto specific ISLs to limit the impact on other critical applications in the switch fabric. In either case, a TI zone can include a set of switch ports used for specific traffic flows.
When a TI zone is created, a data flow entering a switch from the starting N_Port or E_Port is forwarded to the next E_Port within the zone. If the next E_Port within the TI zone is not available (e.g. due to network congestion or link failure), the data flow can be forwarded to its destination using an E_Port outside the zone if the failover option enabled. In a TI zone with the failover option disabled, when any of the E_Ports within the TI zone goes down, the TI zone is deemed unavailable and data flows belonging to the zone can be optionally dropped.
In one embodiment, an E_Port belonging to a particular TI zone may not carry any other data flows outside the zone, unless that E_Port is the only way to reach the destination and the failover option is enabled. If the failover option is disabled, that E_Port is precluded from carrying any other data flows outside the zone under any circumstance.
In some embodiments, a TI zone can be provisioned to carry traffic of a given QoS class. Dedicating the TI zone to one or more QoS classes can guarantee a certain amount of bandwidth, a minimum delay, and a minimum packet loss rate. In general, a number of QoS parameters, such as bandwidth, end-to-end delay, and in-order packet delivery, can be enforced within a TI zone. In addition, more than one TI zones may be provisioned for one QoS class. In case one TI zone fails (e.g., due to port or link failure), another TI zone can be used the carry the protected traffic.
Ideally, a few general rules may be followed when TI zones are configured. For example, to limit the management overhead, a maximum number (e.g., 255) of TI zones can be created in one switch fabric. Second, a port configured to be in a TI zone may not be a member of other TI zones. In other words, a given port can only be a member of a single TI zone because the port can only be on a single path to any specific domain to ensure successful traffic isolation. This “non-duplication” rule is enforced during zone creation/modification. Lastly, to use a trunk port for a TI zone, all the ports in the trunk group become part of the same TI zone. Mixing different TI zones in a trunk group or configuring only a subset of the ports in the trunk group might result in unpredictable behavior.
In one embodiment, a TI zone can be created for a switch using command-line interface (CLI) with options and a port list of (domain, index) format, where domain is the switch domain ID and index is the port number. The port world-wide name (WWN) can also be used for TI over Fibre Channel router (FCR) support. Below is an example of the command:
Embodiments of the present invention provide the following CLI syntax to manage TI zones:
Synopsis:
zone --operation -t objtype [-o optionlist] name -p portlist
operation ::=create, add, remove, delete, activate, deactivate or show
objtype ::=ti (traffic isolation zone)
optionlist ::=a (activate), d (deactivate), n (no-failover), f (failover)
portlist :: =D,I (Domain, Index)
TI Zone Create
zone --create -t objtype [-o optionlist] name portlist -p portlist
Create a TI Zone with specified options and the portlist. By default, the zone is created with failover enabled and the zone will be activated.
Create a Traffic Isolation Zone with failover enabled and activate the zone. zone --create -t ti “redzone” -p “1,1; 2,4; 1,8; 2,6”
Create a Traffic Isolation Zone with failover disabled and deactivated. zone --create -t ti -o dn “redzone” -p “1,1; 2,4; 1,8; 2,6”
TI Zone Add/Remove Members and Options
zone --add [-o optionlist] name portlist -p portlist <<use without portlist to add options>>
zone --remove name portlist -p portlist <<use without portlist to remove options>>
Zone --add command allows users to add portlist members and failover option to an existing TI zone. Zone --remove command allows user to remove portlist members from existing zones. If the last member of a TI zone is removed, the TI zone name will be removed from the defined TI zone lists.
TI Zone Activate/Deactivate
zone --activate name.....[name]
zone --deactivate name.....[name]
Zone activate/deactivate command allows user to activate/deactivate TI zone.
TI Zone Deletion
zone --delete name.....[name]
Zone --delete command will delete TI zones from the defined TI zone lists completely. Users will be prompted to confirm delete action.
TI Zone Show
zone --show
The zone --show command without any specified name will display all the TI zones in defined configuration. Zone --show command can be executed for one zone. This command will display the zone name, portlists, failover option and status.
zone --show
Zone Name: green_zone:
List of port: 2,2; 3,3; 5,3; 4,11;
Failover: Enabled
Status: Activated
Zone Name: blue_zone:
List of port: 1,2; 1,3; 3,3; 4,5;
Failover: Enabled
Status: Activated
Zone Name: red_zone:
List of port: 9,2; 9,3; 8,3; 8,5;
Failover: Disabled
Status: Deactivated
zone --show blue_zone
Zone Name: blue_zone:
List of port: 1,2; 1,3; 3,3; 4,5
Failover: Enabled
Status: Activated
For example, TI zone 424 creates a dedicated path from switch domains 1 to 4 through the core switch domains 2 and 3. All data flows belonging to TI zone 424 and entering domain 1 from host 430 will be forwarded to port 4 on switch domain 1. Other data flows from host 430 outside this zone will be routed to port 2 regardless of their destination. Similarly, any traffic entering switch domain 2 on port 2 will be routed to port 6 when heading for switch domain 3 or domain 4 because port 4 and port 8 on switch domain 2 are dedicated to TI zone 424.
A TI zone configuration is interpreted by the local switch and the switch only considers the forwarding update required for its local ports. In one embodiment, a switch is not required to determine whether the TI zones accurately provide dedicated end-to-end paths through the entire switch fabric. This allows routing to be determined at the time TI zones are activated, eliminating a significant amount of overhead that would be required to dynamically route data flows belonging to TI zones in real-time.
In one embodiment, TI zones provide traffic isolation in a “best effort” fashion that works as long as the “lowest-cost path” rule holds in fabric shortest-path first (FSPF) routing. In other words, FSPF routing rules can take precedence over the TI zones. This means that data flows from one TI zone may have to share E_Ports with other data flows when no equal-cost paths can be found. Furthermore, when an E_Port in the preferred TI zone fails, data flows belonging to that TI zone will be switched to a failover path that is the next lowest-cost path to the destination. Similarly, a data flow outside the zone will use an E_Port from this TI zone if no alternative path exists.
In some embodiments, the following rules apply if the TI zone is not the lowest-cost path: when the TI zone path is broken, data flows belonging to this TI zone will switch over to the lowest-cost path which is not part of the TI zone if the failover option is enabled. If the failover option is disabled, the data flows belonging to this TI zone will be blocked. The following rules apply if the TI zone is the only lowest-cost path: if the failover option is enabled, non-TI-zone as well as TI-zone data flows can use the dedicated TI-zone path. If the failover option is disabled, the non-TI zone data flows will be blocked.
Hence, during the configuration of a TI zone with the failover option disabled, special cautions need to be taken to avoid segmenting a subset of switches from the fabric. Segmentation happens when there is no route to reach switch ports outside the zone from switch ports within the zone. Before deployment of a TI zone with failover disabled, the topology is ideally reviewed to ensure that all switches in the fabric have a path to reach other switches in the fabric. A partially configured TI zone without a full path between a source and a destination might result in fabric-wide operation failure. Recovery from the failure could be difficult since operators may need to take switches offline one by one to locate the broken ISL.
Note that the TI zone in FC networks should be distinguished from the general SAN zoning, which is a method of arranging Fibre Channel devices into logical groups within the fabric. In general SAN zoning, each device may be placed into multiple zones to achieve compartmentalization of data for security purposes. For instance, by dividing up device ports into groups, data access can be limited for some users to specific groups of servers that store confidential data in a SAN network. Traffic within one SAN zone can be strictly prohibited from entering another SAN zone, even when one SAN zone fails. In contrast, traffic within a TI zone is allowed to leave the TI zone under certain circumstances, for example when there is a failure in the TI zone and when the failover option is enabled. Furthermore, traffic outside a TI zone might also be allowed to enter the TI zone under similar circumstances. In general, the designation of TI zones takes place within a SAN zone. In other words, a TI zone and the corresponding non-TI zones all belong to the same SAN zone. A more detailed discussion on general SAN zoning can be found in “Designing Storage Area Networks,” by Tom Clark, 2nd Ed., Addison Wesley, 2003.
In contrast, a TI zone isolates data flows over different ISLs to control the ports and path used when routing traffic between fabrics. By assigning specific paths for data flows, TI zones also minimize congestion and improve fabric utilization. General SAN zoning, on the other hand, does not change a data flow's routing; it only partitions the SAN into logical groups and enforces access security between the groups.
TI Zones Over FCR
The traffic isolation feature introduced in the previous section provides capability to isolate traffic between N_Ports or E_Ports across a particular path defined within layer-two fabrics. However, TI zones can also be extended to traverse Fibre Channel routers (FCRs) and FCR-coupled fabrics. One embodiment of the present invention allows a TI zone comprising one or more EX_Ports. EX_Ports couple a Fibre Channel router to a Fibre Channel switch. On the switch side the port looks like a normal E_Port, but on the router side the port is an EX_Port.
A TI zone over FCR typically has two portions: TI zones within the edge and TI zones within network backbone. TI zones within edge device include ports that couple switches to network appliances. TI zones within the network backbone are the portions including E_Ports and EX_Ports that inter-couple switches. For example, TI zone 200 in
In another embodiment, the dedicated path within the backbone may comprise a set of EX_Ports or a tunnel based on virtual E_Ports (VE_Ports) across one or more FCRs.
In a summary, embodiments of the present invention facilitate TI zones in a network to manage dedicate route. A TI zone can include a set of switch ports used for specific traffic flows. A data flow that belongs to the TI zone is forwarded to a next-hop port within the zone. TI zones allow users to assign a data flow to specific inter-switch links (ISLs) to isolate traffic and reduce congestion within a switch fabric. TI zones can also be used to dedicate ISLs to high-priority data flows, and control the route for inter-switch traffic.
The foregoing descriptions of embodiments of the present invention have been presented only for purposes of illustration and description. They are not intended to be exhaustive or to limit this disclosure. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. The scope of the present invention is defined by the appended claims.
Tadisina, Shashank R., Chung, Daniel Ji Yong Park, Abraham, Vineet M., Gnanasekaran, Sathish K., Lai, Raymond Yimin
Patent | Priority | Assignee | Title |
10084859, | Jan 26 2015 | International Business Machines Corporation | Method to designate and implement new routing options for high priority data flows |
10225331, | Sep 23 2015 | EMC IP HOLDING COMPANY LLC | Network address translation load balancing over multiple internet protocol addresses |
10359958, | Dec 27 2010 | International Business Machines Corporation | Method and system for managing a storage network to reduce power consumption |
10394469, | Aug 07 2017 | Cisco Technology, Inc. | Detecting and handling solicited IO traffic microbursts in a fibre channel storage area network |
10606492, | Aug 07 2017 | Cisco Technology, Inc. | Detecting and handling solicited IO traffic microbursts in a fibre channel storage area network |
11223531, | Jul 06 2010 | NICIRA, INC | Method and apparatus for interacting with a network information base in a distributed network control system with multiple controller instances |
11509564, | Jul 06 2010 | Nicira, Inc. | Method and apparatus for replicating network information base in a distributed network control system with multiple controller instances |
11539591, | Jul 06 2010 | NICIRA, INC | Distributed network control system with one master controller per logical datapath set |
11677588, | Jul 06 2010 | NICIRA, INC | Network control apparatus and method for creating and modifying logical switching elements |
11750457, | Jul 28 2021 | Dell Products L.P.; Dell Products L P | Automated zoning set selection triggered by switch fabric notifications |
11876679, | Jul 06 2010 | Nicira, Inc. | Method and apparatus for interacting with a network information base in a distributed network control system with multiple controller instances |
Patent | Priority | Assignee | Title |
5633861, | Dec 19 1994 | Alcatel Data Networks Inc. | Traffic management and congestion control for packet-based networks |
5638359, | Dec 14 1992 | VRINGO INFRASTRUCTURE INC | Method for congestion management in a frame relay network and a node in a frame relay network |
5719853, | Dec 22 1993 | Juniper Networks, Inc | Congestion control method in an ATM network based on threshold values of node queue length |
5970048, | Nov 30 1993 | Nokia Telecommunications Oy | Control of overload situations in frame relay network |
6014383, | Feb 10 1997 | Hewlett Packard Enterprise Development LP | System and method for controlling multiple initiators in a fibre channel environment |
6091725, | Dec 29 1995 | Cisco Technology, Inc | Method for traffic management, traffic prioritization, access control, and packet forwarding in a datagram computer network |
6160793, | Oct 13 1998 | Nokia Technologies Oy | ECN-based approach for congestion management in hybrid IP-ATM networks |
6185189, | Jun 13 1997 | International Business Machines Corporation | Method for adapting committed information rate over frame relay switched network |
6233236, | Jan 12 1999 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Method and apparatus for measuring traffic within a switch |
6381642, | Oct 21 1999 | Brocade Communications Systems, Inc | In-band method and apparatus for reporting operational statistics relative to the ports of a fibre channel switch |
6427114, | Aug 07 1998 | Dinbis AB | Method and means for traffic route control |
6724722, | Mar 19 1999 | Alcatel Lucent | Managing congestion and potential traffic growth in an information network |
6765919, | Oct 23 1998 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Method and system for creating and implementing zones within a fibre channel system |
6980525, | Oct 23 1998 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Method and system for creating and implementing zones in hardware within a fiber channel system |
7120128, | Oct 23 1998 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Method and system for creating and implementing zones within a fibre channel system |
7145868, | Nov 28 1997 | WSOU Investments, LLC | Congestion management in a multi-port shared memory switch |
7167472, | Apr 18 2001 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Fibre channel zoning by device name in hardware |
7283486, | Oct 23 1998 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Method and system for creating and implementing zones within a fibre channel system |
7352740, | Apr 29 2003 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Extent-based fibre channel zoning in hardware |
7366194, | Apr 18 2001 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Fibre channel zoning by logical unit number in hardware |
7430203, | Jan 29 2004 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Fibre channel zoning hardware for directing a data packet to an external processing device |
20030021223, | |||
20030090997, | |||
20030195956, | |||
20040078599, | |||
20060002292, | |||
20060002293, | |||
20060023707, | |||
20060215663, | |||
20060262784, | |||
20070070901, | |||
20070253326, |
Date | Maintenance Fee Events |
Mar 22 2016 | ASPN: Payor Number Assigned. |
Oct 14 2019 | REM: Maintenance Fee Reminder Mailed. |
Mar 30 2020 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Feb 23 2019 | 4 years fee payment window open |
Aug 23 2019 | 6 months grace period start (w surcharge) |
Feb 23 2020 | patent expiry (for year 4) |
Feb 23 2022 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 23 2023 | 8 years fee payment window open |
Aug 23 2023 | 6 months grace period start (w surcharge) |
Feb 23 2024 | patent expiry (for year 8) |
Feb 23 2026 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 23 2027 | 12 years fee payment window open |
Aug 23 2027 | 6 months grace period start (w surcharge) |
Feb 23 2028 | patent expiry (for year 12) |
Feb 23 2030 | 2 years to revive unintentionally abandoned end. (for year 12) |