Search

US-12625982-B2 - Systems and methods for sharing network resources for concurrent I/O operations

US12625982B2US 12625982 B2US12625982 B2US 12625982B2US-12625982-B2

Abstract

Systems and methods for sharing secure channel access for the management of multiple computing resources are herein disclosed. According to one embodiment, an Information Handling System (IHS) includes computer-executable instructions to receive a plurality of Input/Output (I/O) requests from the vendor computing device in which the I/O requests are directed to one of the customer computing resources. The instructions may also establish a secure channel between the vendor computing device and the one customer computing resource, and send the first I/O requests to the one customer computing resource through the secure channel.

Inventors

  • Nagaraja Mandya Lakshman
  • Vinith Narra

Assignees

  • DELL PRODUCTS L.P.

Dates

Publication Date
20260512
Application Date
20240125

Claims (18)

  1. 1 . An Information Handling System (IHS) comprising: a vendor computing device and a plurality of customer computing resources that are provided to a customer by a vendor associated with the vendor computing device; at least one memory coupled to at least one processor, the at least one memory having program instructions stored thereon that, upon execution by the at least one processor, cause the processor to: receive a plurality of first Input/Output (I/O) requests from the vendor computing device, wherein the first I/O requests are directed to one of the customer computing resources; establish an Automatic Remote Access (ARA) session between the vendor computing device and the one customer computing resource, wherein the ARA session is used by a Secure Remote Service (SRS) provided by the vendor to the customer; and send the first I/O requests to the one customer computing resource through the ARA session.
  2. 2 . The IHS of claim 1 , wherein the first I/O requests are configured to manage the operation of the computing resource.
  3. 3 . The IHS of claim 1 , wherein the program instructions, upon execution, further cause the IHS to: receive a plurality of second I/O requests from the vendor computing device, wherein the second I/O requests are directed to a second one of the customer computing resources; establish a second ARA session between the vendor computing device and the second customer computing resource; and send the second I/O requests to the second customer computing resource through the second ARA session.
  4. 4 . The IHS of claim 3 , wherein the program instructions, upon execution, further cause the IHS to send the second I/O requests to the second customer computing resource concurrently as the first I/O requests are sent to the one customer computing resource.
  5. 5 . The IHS of claim 1 , wherein the program instructions, upon execution, further cause the IHS to take down the first ARA session after all the first I/O requests have been completed.
  6. 6 . The IHS of claim 1 , wherein the program instructions, upon execution, further cause the IHS to send the first I/O requests to the one customer computing resource only when a lock has been successfully completed.
  7. 7 . The IHS of claim 1 , wherein the program instructions, upon execution, further cause the IHS to temporarily store each I/O request as a record in a hash map.
  8. 8 . The IHS of claim 1 , wherein the program instructions, upon execution, further cause the IHS to: increment a reference counter each time an I/O request is received; and decrement the reference counter each time an I/O request is successfully completed.
  9. 9 . A network resource sharing method comprising: receiving a plurality of first Input/Output (I/O) requests from a vendor computing device for one of a plurality of customer computing resources, wherein the first I/O requests are directed to one of the customer computing resources; establishing an Automatic Remote Access (ARA) session between the vendor computing device and the one customer computing resource, wherein the ARA session is used by a Secure Remote Service (SRS) provided by the vendor to the customer; and sending the first I/O requests to the one customer computing resource through the ARA session.
  10. 10 . The network resource sharing method of claim 9 , further comprising: receiving a plurality of second I/O requests from the vendor computing device, wherein the second I/O requests are directed to a second one of the customer computing resources; establishing a second ARA session between the vendor computing device and the second customer computing resource; and sending the second I/O requests to the second customer computing resource through the second ARA session.
  11. 11 . The network resource sharing method of claim 10 , further comprising sending the second I/O requests to the second customer computing resource concurrently as the first I/O requests are sent to the one customer computing resource.
  12. 12 . The network resource sharing method of claim 9 , further comprising taking down the first ARA session after all the first I/O requests have been completed.
  13. 13 . The network resource sharing method of claim 9 , further comprising sending the first I/O requests to the one customer computing resource only when a lock has been successfully completed.
  14. 14 . The network resource sharing method of claim 9 , further comprising temporarily storing each I/O request as a record in a hash map.
  15. 15 . The network resource sharing method of claim 9 , further comprising: incrementing a reference counter each time an I/O request is received; and decrementing the reference counter each time the I/O request is successfully completed.
  16. 16 . A computer program product comprising a non-transitory computer-readable storage medium having program instructions stored thereon that, upon execution by an Information Handling System (IHS), cause the IHS to: receive a plurality of first Input/Output (I/O) requests from a vendor computing device for one of a plurality of customer computing resources that are provided to a customer by a vendor associated with the vendor computing device, wherein the first I/O requests are directed to one of the customer computing resources; establish an Automatic Remote Access (ARA) session between the vendor computing device and the one customer computing resource, wherein the ARA session is used by a Secure Remote Service (SRS) provided by the vendor to the customer; and send the first I/O requests to the one customer computing resource through the ARA session.
  17. 17 . The computer program product of claim 16 , wherein the I/O request is configured to manage the operation of the computing resource.
  18. 18 . The computer program product of claim 16 , wherein the program instructions, upon execution, further cause the IHS to: receive a plurality of second I/O requests from the vendor computing device, wherein the second I/O requests are directed to second one of the customer computing resources; establish a second ARA session between the vendor computing device and the second customer computing resource; and send the second I/O requests to the second customer computing resource through the second ARA session concurrently as the first I/O requests are sent to the one customer computing resource.

Description

BACKGROUND As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store it. One option available to users is an Information Handling System (IHS). An IHS generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, IHSs may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. IHSs may be general or configured for a specific user or specific use, such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, IHSs may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems. Many computer processing architectures have recently migrated toward cloud computing. Cloud computing generally involves the delivery of computing services over the Internet. Whereas on-premises computing solutions can refer to in-house hosted software (e.g., on local servers, private clouds, etc.) that may be supported by a third party vendor or provider, cloud computing solutions may refer to software that is hosted and maintained by the same vendor. With cloud computing, a virtualized pool of resources, from raw compute power at the infrastructure level to application functionality, is often made available to a client, on demand, by a provider. One particular advantage of cloud computing is the ability to apply abstracted versions of compute, storage, and network resources to workloads, as needed, and tap into an abundance of prebuilt services. Cloud computing may enable users to tap into additional capabilities without requiring the investment of the infrastructure, such as new hardware or software. Rather, users often pay the provider of the cloud service a subscription fee or in some cases lease the infrastructure that they use. Multi-cloud computing refers to the use of two or more clouds from different cloud providers. This may include any mix of Infrastructure, Platform, or Software as a Service (IaaS, PaaS, or SaaS). Multi-cloud computing may be used to address specific business requirements or to avoid the limitations of a single-vendor cloud strategy. The multi-cloud environment may include cloud networks or cloud hosting environments provided by different cloud service providers. In a multi-cloud environment, the cloud networks may be managed by a multi-cloud management platform. The multi-cloud management platform includes hardware, software, firmware, or a combination thereof which provides a unified interface for deployment, provisioning, and monitoring of different cloud networks in the multi-cloud environment. SUMMARY Systems and methods for sharing secure channel access for the management of multiple computing resources are herein disclosed. According to one embodiment, an Information Handling System (IHS) includes computer-executable instructions to receive a plurality of Input/Output (I/O) requests from the vendor computing device in which the I/O requests are directed to one of the customer computing resources. The instructions may also establish a secure channel between the vendor computing device and the one customer computing resource, and send the first I/O requests to the one customer computing resource through the secure channel. According to another embodiment, a network resource sharing method includes the steps of receiving a plurality of first Input/Output (I/O) requests from a vendor computing device for one of a plurality of customer computing resources, establishing a secure channel between the vendor computing device and the one customer computing resource, and sending the first I/O requests to the one customer computing resource through the secure channel. The first I/O requests are directed to one of the customer computing resources. According to yet another embodiment, a computer program product includes a non-transitory computer-readable storage medium having program instructions stored thereon that, upon execution by an IHS, cause the IHS to receive a plurality of first Input/Output (I/O) requests from a vendor computing device for one of a plurality of customer computing resources that are provided to a customer by a vendor associated with the vendor computing device, establish a secure channel between the vendor computing device and the one customer computing resource, and send the first I/O requests to the one customer computing resource through the secure channel. BRIEF DESCRIPTION OF THE DRA