Targeted data transfer between operational domains
First Claim
1. At computer system including one or more processors and system memory, the computer system within a customer premise and connected to a cluster of compute nodes, the computer system including a head node for the cluster of compute nodes, the head node connected to a client and to a resource cloud, the resource cloud including one or more cloud nodes, the head node including an on premise data transfer proxy, a method for targeted data transfer between the client and the resource cloud, the method comprising:
- an act of receiving a file request from the client, the file request including a logical name and a requested file operation, the logical name targeting a targeted node where the requested file operation is to be performed;
an act of verifying that the client is authorized to perform the requested file operation at the targeted node;
an act of checking the logical name to determine if targeted node is a compute node or a cloud node;
an act of determining that the targeted node is a cloud node;
an act of opening a secure channel to a cloud-based data transfer proxy within the resource cloud, the secure channel opened using a certificate for the resource cloud; and
an act of sending the file request to the cloud-based data transfer proxy for resolution of the logical name into the physical address of the targeted node such that the file operation can be performed at the targeted node.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention extends to methods, systems, and computer program products for targeted data transfer data between operational domains. Embodiments of the invention facilitate moving data between operational domains inside and outside of a resource cloud. A proxy runs on the boundary of each operational domain, such as, for example, an on premise cluster and a resource cloud. The proxies are capable of resolving the location of the targeted entity and forwarding the data or request on to the next hop, which may either be another proxy or the worker module running on the target node. A proxy can run on the head node of an on premise cluster so that compute nodes on private networks can be targeted. A proxy can also run on a public endpoint within the resource cloud to make nodes within the resource cloud available.
13 Citations
20 Claims
-
1. At computer system including one or more processors and system memory, the computer system within a customer premise and connected to a cluster of compute nodes, the computer system including a head node for the cluster of compute nodes, the head node connected to a client and to a resource cloud, the resource cloud including one or more cloud nodes, the head node including an on premise data transfer proxy, a method for targeted data transfer between the client and the resource cloud, the method comprising:
-
an act of receiving a file request from the client, the file request including a logical name and a requested file operation, the logical name targeting a targeted node where the requested file operation is to be performed; an act of verifying that the client is authorized to perform the requested file operation at the targeted node; an act of checking the logical name to determine if targeted node is a compute node or a cloud node; an act of determining that the targeted node is a cloud node; an act of opening a secure channel to a cloud-based data transfer proxy within the resource cloud, the secure channel opened using a certificate for the resource cloud; and an act of sending the file request to the cloud-based data transfer proxy for resolution of the logical name into the physical address of the targeted node such that the file operation can be performed at the targeted node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 15, 16)
-
-
9. At computer system including one or more processors and system memory, the computer system within a resource cloud, the computer system including a cloud-based data transfer proxy, the computer system connected to a head node for a cluster of compute nodes within a customer premise, the head node connected to a client and including an on premise data transfer proxy, a method for targeted data transfer between the client and the resource cloud, the method comprising:
-
an act of receiving a file request from the on premise data transfer proxy over a secure channel, the secure channel having been opened using a certificate for the resource cloud, the file request including a logical name and a requested file operation, the logical name targeting a targeted node within the resource cloud where the file operation is to be performed, the request having originated at a client connected to the head node; an act of resolving the logical name to a physical address within the resource cloud; and an act of sending the requested file operation to the targeted node at the physical address. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
17. One or more hardware storage devices for use at computer system, the computer system within a customer premise and connected to a cluster of compute nodes, the computer system including a head node for the cluster of compute nodes, the head node connected to a client and to a resource cloud, the resource cloud including one or more cloud nodes, the head node including an on premise data transfer proxy, the computer program product for implementing a method for targeted data transfer between the client and the cluster of compute nodes, the one or more hardware storage devices having stored thereon computer-executable instructions that, when executed at a processor, cause the computer system to perform the method, including the following:
-
receive a file request from the client, the file request including a logical name and a requested file operation, the logical name targeting a targeted node where the requested file operation is to be performed; verify that the client is authorized to perform the requested file operation at the targeted node; refer to a node database to map the logical name to the location of the targeted node; determine that the location of the targeted node is a compute node in the on premise cluster; and send the requested file operation to the compute node in the on premise cluster. - View Dependent Claims (18, 19, 20)
-
Specification