Techniques to control quality of service for end-to-end paths in a compute environment

ABSTRACT

Embodiments may be generally directed to techniques to cause communication of a registration request between a first end-point and a second end-point of an end-to-end path, the registration request to establish resource load monitoring for one or more resources of the end-to-end path, receive one or more acknowledgements indicating resource loads for each of the one or more resources of the end-to-end path, at least one of the acknowledgements to indicate a resource of the one or more resources is not meeting a threshold requirement for the end-to-end path, and perform an action for communication traffic utilizing the one or more resources based on the acknowledgement.

TECHNICAL FIELD

Embodiments described herein generally relate to controlling quality ofservice for end-to-end paths in a compute environment. Specifically,embodiments include performing resource monitoring for one or moreresources of the end-to-end path to ensure quality of servicerequirements.

BACKGROUND

Many modern applications have demanding resource requirements that aredifficult to support and scale. An effective way to scale suchapplications is to distribute individual tasks onto different processingelements and interconnect those processing elements on a switch fabric.This arrangement may support the high-bandwidth data flows that mustexist between the tasks for the applications.

A high performance switch fabric arrangement may be achieved by use ofvarious proprietary multi-stage switching technologies, but theperformance is achieved at a high cost in dollars and in features, suchas scalability. In order to achieve high performance at a reasonablecost, current approaches include sharing resources between applications.However, usage of these resources must be controlled to ensure thatquality of service requirements for each of the applications is beingmet.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the invention are illustrated by way of example, and notby way of limitation, in the figures of the accompanying drawings inwhich like reference numerals refer to similar elements.

FIG. 1A illustrates an example of a system.

FIG. 1B illustrates an example of a system.

FIG. 1C illustrates an example of a system.

FIG. 2A illustrates an example of a communication flow diagram.

FIG. 2B illustrates example messages.

FIG. 3A illustrates an example of a logic flow diagram.

FIG. 3B illustrates an example of a second logic flow diagram.

FIG. 4 illustrates an example of a second communication flow diagram.

FIG. 5 illustrates an example of a third logic flow diagram.

FIG. 6 illustrates an example of a computer architecture.

DETAILED DESCRIPTION

Various embodiments discussed herein may include methods, apparatuses,devices, and systems to control Quality of Service (QoS) requirementsfor applications processed in a distributed processing environmentincluding processing elements coupled via a switch fabric. Mostdistributed environments, including Intel's® Stormlake®, provide QoSfeatures to guarantee a given overall performance of resources of thedistributed environment. QoS is particularly important in someapplications with special requirements in latency or bandwidth, forexample.

However, today's most common QoS algorithms tend to be either toorelaxed or too conservative when processing in real-time because thereis no way to anticipate which algorithm or approach to apply ahead oftime. Typical solutions are based on best effort (no QoS),differentiated resource utilization (prioritizing resource utilization),and guaranteed resource utilization. Best effort and differentiatedresource utilization tend to be too relaxed for some applications, whileguaranteed resource utilization is typically not needed most of the timecausing resources to go under-utilized. Embodiments discussed hereinsolve these problems in real-time application processing to get maximumresource utilization out of the resources of an environment withoutcompromising the QoS requirements of applications.

In one particular example, embodiments may include performing resourcemonitoring for end-to-ends path for processing in the distributedenvironment. For example, resource monitoring for a particularapplication may be established by logic causing communication of aregistration request between a first end-point and a second end-point ofthe end-to-end path. The registration request may be used to establishresource load monitoring for one or more resources of the end-to-endpath, such as processing resources, memory resources, networkingresources, and software resources of a sending node, a destination node,and one or more switches.

In some embodiments, the logic may include receiving one or moreacknowledgements indicating resource loads for each of the one or moreresources of the end-to-end path. In some instances, at least one of theacknowledgements may indicate that a resource of the one or moreresources is not meeting a threshold requirement for the end-to-endpath, e.g. QoS requirements are not being met. Thus, embodiments includeperforming an action for communication traffic utilizing the one or moreresources based on the acknowledgement. The action may include changingresource utilization for the application on the resource not meeting theQoS requirements. Embodiments are not limited in this manner and these,and other details will become more apparent in the followingdescription.

Reference is now made to the drawings, wherein like reference numeralsare used to refer to like elements throughout. In the followingdescription, for purposes of explanation, numerous specific details areset forth in order to provide a thorough understanding thereof. It maybe evident, however, that the novel embodiments can be practiced withoutthese specific details. In other instances, well-known structures anddevices are shown in block diagram form in order to facilitate adescription thereof. The intention is to cover all modifications,equivalents, and alternatives consistent with the claimed subjectmatter.

FIG. 1A illustrates a general overview of a system 100 which may be partof a data-center or supercomputer array. The system 100 may include oneor more nodes 101-x, where x may be any positive integer, that arecoupled by one or more switches 105 to provide networking and fabricinterconnection capabilities. The nodes 101 or end-points are capable ofproviding services, such as networking services, processing services,computational services, storage services, and so forth. For example,node 101-5 is coupled with storage system 110-1 and node 101-6 iscoupled with storage system 110-2. These nodes 101-5 and 101-6 mayprovide storages services and are capable of storing information anddata on the storage system 110-1 and 110-2.

A storage system 110 may include one or more aggregate storage clustershaving one or more storage devices which may be configured in aredundant array of independent disks (RAID) configuration. In variousembodiments, a storage system 110 may be a clustered storage system in astorage area network (SAN) environment or a network attached storage(NAS).

In embodiments, the nodes 101 may be coupled by switch 105, which may bepart of a high speed fabric architecture, such as Intel's® Onmi-PathArchitecture® that is capable of communicating at one hundred (100)gigabits-per-second (Gb/sec) speeds for each link coupling the nodes101. The switch 105 is typically a Layer 2 device and acts as a packetforwarding mechanism within a fabric, for example. The switch 105 may becentrally provisioned and managed by fabric management software, andeach switch 105 may include a management agent to respond to managementtransactions. In some instances, the switch 105 is responsible forexecuting Quality of Service (QoS) features such as congestionmanagement functions and bandwidth reserving. These and other detailswill become more apparent in the following description.

FIG. 1B/1C illustrates examples of system 125 and system 150 which maybe similar to system 100 and may be part a data-center or supercomputerarray. The illustrated system 125 includes two nodes 101-1 and 101-2coupled via the switch 105 and links 107. System 150 illustrates twonodes 101-1 and 101-2 coupled via a number of switches 105-a, where amay be any positive integer, via one or more links 107.

Each of the nodes 101 may include resources, such as processingcircuitry 102, memory 104, one or more interfaces 106, and storage 108.In some instances, the resources monitored may include softwareresources, such as database software, operating system software,networking software, and so forth. Each of the nodes 101 may alsoinclude one or more applications 103 that utilize one or more resourcesprovided by the nodes 101 and switches 105. The switch 105 may alsoinclude resources, such as processing circuitry 120, memory 122, storage124, one or more interfaces 126, and software resources.

In some embodiments, the processing circuitry 102 may include logic andmay be one or more of any type of computational element, such as but notlimited to, a microprocessor, a processor, central processing unit,digital signal processing unit, dual core processor, a multi-coreprocessor, mobile device processor, desktop processor, single coreprocessor, a system-on-chip (SoC) device, complex instruction setcomputing (CISC) microprocessor, a reduced instruction set (RISC)microprocessor, a very long instruction word (VLIW) microprocessor, afield-programmable gate array (FPGA) circuit, or any other type ofprocessor or processing circuit on a single chip or integrated circuit.The processing circuitry 102 may be connected to and communicate withthe other elements of the node 101 via interconnects (now shown), suchas one or more buses, control lines, and data lines. In someembodiments, the processing circuitry 102 may include processorregisters or a small amount of storage available the processing units tostore information including instructions that and can be accessed duringexecution. Moreover, processor registers are normally at the top of thememory hierarchy, and provide the fastest way to access data.

Each node 101 also includes memory 104 to store information. Further,memory 104 may be implemented using any machine-readable orcomputer-readable media capable of storing data, including both volatileand non-volatile memory. In some embodiments, the machine-readable orcomputer-readable medium may include a non-transitory medium. Theembodiments are not limited in this context.

The memory 104 can store data momentarily, temporarily, or permanently.The memory 104 stores instructions and data for a node 101. The memory104 may also store temporary variables or other intermediate informationwhile the processing circuitry 102 is executing instructions. In someembodiments, information and data may be loaded from memory 104 into thecomputing registers during processing of instructions. Manipulated datais then often stored back in memory 104, either by the same instructionor a subsequent one. The memory 104 is not limited to storing the abovediscussed data; the memory 104 may store any type of data.

A node 101 also includes one or more interfaces 106 such as any deviceand circuitry for processing information or communications over wirelessand wired connections. For example, the one or more interfaces 106 mayinclude a receiver, a transmitter, one or more antennas, and one or moreEthernet connections. The specific design and implementation of the oneor more network interfaces 106 may be dependent upon the communicationsnetwork in which the system 100 intended to operate. In someembodiments, the one or more interfaces 106 may be a host fabricinterface (HFI). An HFI may include logic to implement the physical andlink layers, such that a node 101 can attach to a fabric, via switch 105for example, and send and receive packets to other servers, devices andnodes 101. HFIs include the appropriate hardware interfaces and driversfor operating system and VMM (Virtual Machine Manager) support. An HFImay also include specialized logic for executing or accelerating upperlayer protocols and/or offload of transport protocols. An HFI alsoincludes logic to respond to messages from network managementcomponents. In some instances, each node 101 may be connected to thearchitecture fabric via an HFI.

As mentioned, each node 101 may be coupled with the switch 105 via oneor more links 107. The links 107 can be full-duplex, point-to-pointinterconnects that connect HFIs to the switches 105-a, switches 105-a toother switches 105-a, or switches 105-a to gateways (not shown). Links107 may have different physical configurations, in circuit board traces,copper cables, or optical cables. In one embodiment the implementationsof the PHY (Physical layer), cable, and connector strategy is to followthose for Ethernet, specifically 100 GbE (100 gigabits per secondEthernet, such as the Ethernet links defined in IEEE 802.3bj draftstandard (current draft 2.2)). The architecture is flexible, supportinguse of future Ethernet or other link technologies that may exceed 100GbE bandwidth. High-end supercomputer products may use special-purpose(much higher bandwidth) PHYs, and for these configurationsinteroperability with architecture products will be based on switcheswith ports with differing PHYs.

The system 100 may include storage 108 which may be implemented as anon-volatile storage device such as, but not limited to, a magnetic diskdrive, optical disk drive, tape drive, an internal storage device, anattached storage device, flash memory, battery backed-up SDRAM(synchronous DRAM), and/or a network accessible storage device. Inembodiments, storage 108 may include technology to increase the storageperformance enhanced protection for valuable digital media when multiplehard drives are included, for example. Further examples of storage 108may include a hard disk, floppy disk, Compact Disk Read Only Memory(CD-ROM), Compact Disk Recordable (CD-R), Compact Disk Rewriteable(CD-RW), optical disk, magnetic media, magneto-optical media, removablememory cards or disks, various types of DVD devices, a tape device, acassette device, or the like. The embodiments are not limited in thiscontext.

Further, the storage 108 may include instructions that may causeinformation to be temporarily stored in memory 104 and processed byprocessing circuitry 102. More specifically, the storage 108 may includeone or more operating systems (OS), one or more virtual environments,and one or more applications.

In embodiments, the one or more operating systems, may be any type ofoperating system such as Android® based on operating system, Apple iOS®based operating system, Symbian® based operating system, Blackberry OS®based operating system, Windows OS® based operating system, Palm OS®based operating system, Linux® based operating system, FreeBSD® basedoperating system, and so forth. The operating system may enable othervirtual environments and applications to operate.

The storage 108 may also include one or more applications 103 to processinformation and data. An application 103 may be any type of applicationincluding, but not limited to, data processing applications, storageapplications, banking applications, finance applications, wordprocessing applications, database applications, storage applications,spreadsheet applications multimedia applications, compute systemapplications, presentation applications, business applications, and soforth.

In embodiments, an application 103 may include QoS requirements defininggiven overall performance requirements for resources. The QoSrequirements are particularly important in some applications 103 withspecial requirements for latency and bandwidth, for example. Otherrequirements of resources for applications 103 may include processingand memory bandwidth to process and handle information. Theserequirements may apply to the node 101 including the application 103,e.g. in storage 108, nodes 101 utilized by the application 103, andfabric devices, e.g. switch 105, to couple the nodes 101.

FIG. 1B illustrates node 101-1 including application 103-1. In theillustrated example, the application 103-1 may utilize node 101-2 andapplication 103-2 for processing capabilities. The application 103-1 mayhave resource QoS requirements for the resources of node 101-1, switch105, and node 101-2 creating an end-to-end path. These resources caninclude the processing circuitries 102-1, 120, and 102-2, the memories104-1, 122, and 104-2, the interfaces 106-1, 106-2, and 126, and storage108-1, 124, and 108-2. These requirements may be based on the needs ofthe application 103-1 and determined by logic as part of a softwarestack and processing circuitry. In some instances, the requirements maybe specified in a Service Level Agreement (SLA) for the application103-1. Embodiments are not limited to these examples.

Typical QoS algorithms tend to be either too relaxed or tooconservative. Examples of current solutions that are too relaxedincluding “Best Effort” having no QoS and “Differentiated Traffic” wheresome traffic that is considered more important than other traffic isprioritized. These solutions may not meet the needs of applications thathave specific performance requirements during high utilization times. Onthe other hand, a conservative solution, such as “Guaranteed Bandwidth”that reserves resource usage, may leave underutilize resources duringlow usage times. Thus, embodiments discussed herein may be directed toan intermediate solution to provide maximum resource utilization whilenot compromising QoS requirements for applications.

Embodiments discussed herein may include establishing resourcemonitoring and QoS management for one or more applications utilizing oneor more end-to-end paths having resources for processing capabilities.The resource monitoring includes registering one or more resourcesutilized by a particular application to monitor, monitoring theregistered resources, and performing corrective actions when required.The resource monitoring and QoS management occur in real-time anddynamically while information and data are processed by the systems.These and other details will become more apparent in the followingdescription.

FIG. 2A illustrates an example communication flow 200 to register one ormore resources of an end-to-end path for an application. FIG. 2A alsoillustrates an example communication flow 230 for communication of oneor more acknowledgement messages to confirm registration of the one ormore resources for monitoring.

In the illustrated flow 200, a first node 101-1 may communicate aregistration request message 201 to register one or more resources ofthe switch 105-1 and a second node 101-2. The registration request 201may include information and data to register the resources of thesedevices to monitor. FIG. 2B illustrates one example of a registrationrequest 201 having an identification field 251 including information toidentify the destination node or end-point for the end-to-end path. Inthe illustrated example, node 101-2 is identified in the identificationfield 251, for example.

The registration request 201 may also include one or more resourceidentification fields 253 to include information to identify eachresource to monitor. For example, a resource identification field 253may identify resources, such as the processing circuitry 120, memory122, and storage 124, of the switch 105-1. In another example, aresource identification field 253 may identify resources, such as theprocessing circuitry 102-2, memory 104-2, interface(s) 106-2, andstorage 108-2, of the node 101-2. Embodiments are not limited in thismanner.

The registration request 201 also includes one or more threshold valuefields 255 to include threshold information or threshold values for eachof the resources identified. The threshold information may be used bythe monitoring device, e.g. the switch 105-1 or the node 101-2, todetermine whether a resource is over-utilized or is not meeting the QoSrequirements for the application 103-1 of the node 101-1. In someinstances, the threshold information or value may be set for a resourcesuch that an action or a correction occurs prior to the resource beingover-utilized. For example if a resource is over utilized at sixtypercent (60%), the threshold value may be set to forty-percent (40%).Embodiments are not limited to this example.

The threshold information may include a usage percentage value or anactual value for each of the resources. For example, a threshold valuefield 255 may include a usage percentage value or twenty-percent (20%)for the processing circuitry 120 of the switch 105-1. Thus, when theswitch 105-1 is not capable of providing 20% of its processingcapability to the application 103-1 of node 101-1 (or more than 80% isbeing used by other applications/nodes 101), the application 103-1 andnode 101-1 are notified, as will be discussed in more detail below. Inanother example, a threshold value field 255 may include 500-gigabytefloating point operations per second (GFLOPS) as a specified requirementfor the processing circuitry of the switch 105-1 for the application103-1 of the node 101-1. In this example, when the switch 105-1 is notcapable of providing at least 500 GFLOPS, the application 103-1 and node101-1 are notified.

The registration request 201 may also include a monitoring window field257 specifying an amount of time to calculate an average load for eachof the one or more resources. The amount of time may be any amount oftime and selected by logic based on QoS requirements, for example. Insome instances, the monitoring window or time may be determined based onan interval of burst traffic or resource utilization. The monitoringwindow may prevent inadvertent changes of resource utilization in“corner cases” in which the length of a burst of usage is exactly ornear exactly the length of a predefined interval.

FIG. 2A illustrates flow 200 sending one registration request 201 toregister each of the resources of the switch 105-1 and the node 101-2.More specifically, a single registration 201 may be sent over the wholeend-to-end path including any number of switches 105 and other devices(not shown) to register all of the resources involved in the end-to-endpath. As mentioned, the request identifies the destination node orend-point. If there are one or more switches, routers, traffic bufferingentities between the sending node and the destination node, theregistration request 201 may be copied and repeated along the end-to-endpath. However, embodiments are not limited in this manner. For example,the node 101-1 may send a different registration request 201 to each ofthe switch 105-1 and the node 101-2.

In some embodiments, a node 101 may register the same end-to-end pathmore than one time. For example, the node 101-1 may communicate anotherregistration request 201 to the node 101-2. The second registrationrequest 201 may identify different resources to monitor, providedifferent threshold values, different monitoring window, or acombination thereof. The same end-to-end path may be registered anynumber of times and embodiments are not limited in this manner.

In embodiments, multiple end-to-end paths may be monitor betweendifferent nodes 101. For example, the node 101 may communicate aregistration request 201 to multiple nodes 101 or end-points byutilizing a wildcard as a destination node identified in the destinationidentification field 251. A wildcard may be any symbol or alphanumericcharacter that can be used to identify more than one node 101 orend-point as a destination node.

As illustrated in flow 230 of FIG. 2A, each device, e.g. switch 105 andnode 101-2, may respond to the registration request 201 withacknowledgement (ACK) messages 203-1 and 203-2, respectively, indicatingthat each resource is successfully registered to monitor. In the casewhere one or more resources fail to be registered, a device maycommunicate a non-acknowledgement (NACK) message. Appropriate action maybe taken if a resource is not registered, as will be discussed in moredetail below.

FIG. 2B illustrates an example acknowledgement message 203 to indicateone or more resources are successfully registered to monitor. Theacknowledgement message 203 may include one or more resourceidentification field(s) 271 and one or more load fields 273. Each of theresource identification field(s) 271 may identify a resource. Forexample, the resource identification field 271 can include information,such as any symbol and/or alphanumeric character, or combinationthereof, to uniquely identify a resource. Each of the load fields 273includes information to specify a usage load for a specified resource.The load field 273 may include a percentage or an actual amount ofusage, e.g. 50% or 500 GFLOPS. Moreover, and in some embodiments, theload field 273 may include an indication of which resource the usageload is associated. Embodiments are not limited in this manner.

In embodiments, each device may respond or communicate anacknowledgement message 271 on a semi-periodic, non-periodic, andperiodic basis. For example, a device may communicate an acknowledgementmessage 271after every monitoring window. In the same or otherinstances, a device may communicate an acknowledgement message 271 whena resource is not meeting a threshold requirement. For example, theacknowledgement message 271 may be communicated when a loaddetermination indicates a resource cannot provide a specified load. Theindication may be based on the determined load indicating resource usageavailability for the node 101-1 is below a threshold value.Alternatively, the indication may be based on the determined loadindicating the resource usage for other nodes, e.g. not node 101-1, isabove a threshold value, indicating that there is not enough availableusage for the node 101-1. Embodiments are not limited in this manner.

The acknowledgement message 271 may be communicated to the node 101-1 inan active manner or passive manner. For example, node 101-2 maycommunicate the acknowledgement message 271 in an active manner bysending the message directly to an application, causing a softwareinterrupt, and so forth. The node 101-2 may communicate theacknowledgement message 271 in a passive manner by writing informationof the acknowledgement message 271 in a polled location of memory orstorage, for example. The application of node 101-1 may then poll thelocation depending on need.

FIG. 3A illustrates an example of a first logic flow 300 for processingin a computing environment. The logic flow 300 may be representative ofsome or all of the operations executed by one or more embodimentsdescribed herein. For example, the logic flow 300 may illustrateoperations performed by a node 101, as illustrated in FIGS. 1A-1C. Anode 101 may include processing circuitry and logic to perform one ormore operations discussed herein, for example. Moreover, one or moreoperations may be included in hardware only, software only, or acombination thereof. For example, one or more operations discussedherein may be performed by a software stack in a node of a data centeror supercomputer array.

At block 302, the logic flow 300 may include causing a communication ofa registration request to one or more other devices, e.g. nodes,switches, fabric devices, fabric interfaces, etc. For example, theregistration request may be communicated from a sending node to adestination node via one or more switches, e.g. the end-to-end path. Aspreviously discussed, the registration request may identify thedestination node, which may be used by the one or more switches to routethe registration request to the proper destination node. Theregistration request may cause devices of the end-to-end path toregister one or more resources that may also be identified in theregistration request. These resources may be monitored by theirrespective devices and communicate information to the sending node(software stack) to ensure that they are meeting the needs of sendingnode and an application thereon.

In some instances, the registration request may be based on aninstruction exposed by an interface, such as an HFI, that may be used bythe software stack to send the registration request when monitoring ofresources is desired or required. The registration request may alsoinclude threshold requirements for each of the resources to bemonitored. A threshold requirement may be a percentage or amount ofusage required by the resource to meet the needs of the application, forexample.

The logic flow 300 may include determining whether the registration ofeach resource was successful or not successful at block 304. Forexample, a device may communicate a NACK message indicating that atleast one of its resources cannot be registered to monitor to thesending node of the registration request. Alternatively, if everyresource is successfully registered for a device, a ACK message, e.g.ACK message 203, may be communicated back to the sending node of theregistration request.

If the registration of a least one resource is not successful at block304, embodiments may include performing an action including forcing aQoS scheme for the end-to-end path and resources at block 310. Forexample, resource utilization may be reserved for each resource of theend-to-end path to meet the needs of the sending node and application,e.g. a guaranteed resource utilization QoS scheme. However, embodimentsare not limited in this manner and other QoS schemes may be forced atblock 310.

At block 312, the logic flow 300 may include waiting a period of timeand sending an additional registration request for the end-to-end pathto attempt to register the resources. This process may be repeated anynumber of times until the resources are registered or until the sendingnode and application no longer need the resources.

If the registration of the resources is successful at block 304, thelogic flow 300 may include receiving one or more ACK messages, e.g. ACKmessage 201, indicating the resources are successfully registered and aload for each of the resources at block 306. The ACK message may becommunicated from each of the devices including the resources monitored.In some instances, an ACK message from a destination node may beforwarded or communicated to the sending node via one or more switchesor other fabric infrastructure, for example. As previously discussed, anACK message may be communicated upon successful registration of theresources for load monitoring. Further, one or more ACK messages may becommunicated on one or more of a non-periodic basis (when a requirementis not being met or usage falls below a threshold value), on asemi-periodic basis, and on a periodic basis (after each monitoringwindow).

In some embodiments, ACK messages may be communicated with hysteresiswhen communicated on a non-periodic basis. For example, if a thresholdvalue is set to alert based on the threshold value at 40% utilization,the ACK message may be sent at some point higher than 40%, and aftersome time for which it has remained at or above the point higher than40%. Similarly, when a load dissipates and utilization falls below the40% threshold value an ACK message may be given after some point lowerthan 40%, and after some time for which it has remained at or below thepoint lower than 40%.

At decision block 308, the logic flow 300 may include determiningwhether a load or usage requirement for the application is being met bya resource. In some instances, the determination is based on the loadvalue indicating in the ACK message received by the sending node andapplication. The load value may indicate an amount or percentage ofload/usage for a particular resource. In some instances, the load valuemay include an amount or percentage of usage of the resource by othernodes. Thus, the sending node may determine an amount or percentage ofusage available to its application. Alternatively, the load value in theACK message may include a maximum amount or percentage of usageavailable to the sending node and application. Embodiments are notlimited in this manner.

If the load requirement of the application is being met by the resourceat block 308, embodiments may include maintaining the current QoS schemefor the application at block 318. For example, information may beprocessed by the resources of the end-to-end path for the applicationunder a “best effort” QoS scheme or a “differentiatedprocessing/traffic” QoS scheme. Note that if the current QoS schemeincludes reserving resource usage or load, the current QoS scheme may belowered to a more relaxed scheme, e.g. “best effort” or “differentiatedprocessing.” Thus, additional resource usage may be made available toother nodes.

If the load requirement of the application is not being met by theresource at block 308, embodiments may include determining whether theload for the application is critical or not critical at block 314. Acritical load for an application would be replication data for remotestorage, for example. This data may be used in high availability systemswith stringent QoS requirements. On the other hand, an example of anon-critical application may be an application that is accessing andprocessing remote storage and doing analytics on that remote data. If,at block 314, the load is not critical, the QoS scheme may be maintainedor lowered to a more relaxed QoS scheme at block 318. If the load iscritical at block 314, an action may be taken to correct or ensure thatthe resource is reserved for the sending node and application at block316. For example, the QoS scheme may be change to reserve usage orbandwidth for the application on the resource. In some instances, theQoS scheme may affect each resource in the end-to-end path or only thoseresources that are not meeting the load requirements for the applicationin the end-to-end path.

In some instances, to reserve additional usage or load for anapplication at block 314, the sending node and/or application maycommunicate information to a device having the over utilized resource tochange the QoS scheme. For example, information may be communicated tothe device to reserve the usage or load on the resource. In embodiments,the logic flow 300 may continue to monitor the resources for theend-to-end path until the resources are no longer needed, e.g. bysending a deregistration message.

FIG. 3B illustrates an example of a second logic flow 350 for processingin a computing environment. The logic flow 350 may be representative ofsome or all of the operations executed by one or more embodimentsdescribed herein. For example, the logic flow 360 may illustrateoperations performed by a node 101 or switch 105, as illustrated inFIGS. 1A-1C. For example, node 101 or switch 105 may include processingcircuitry and logic to perform one or more operations discussed herein.Moreover, one or more operations may be included in hardware only,software only, or a combination thereof. For example, one or moreoperations discussed herein may be performed by a software stack in thenode 101 or switch 105. Embodiments are not limited in this manner.

At block 352, the logic flow 350 includes receiving a registrationrequest. For example, a switch or a destination node may receive aregistration request to register one or more resources to monitor loador usage. The registration request may include a destinationidentification, one or more resource identifiers, one or more thresholdvalues, and a monitor window, as illustrated and discussed with respectto FIGS. 2A and 2B.

At block 354, the logic flow 350 includes registering one or moreresources to monitor for a sending node and application. Registering aresource to monitor may include enabling logic in a node or switch tomonitor the resource. For example, loads may be determined or monitoredby software, hardware, or a combination of both. In some instances, anoperating system may provide the load information to the software stack.In the same or other instances, a hardware element may provide the loadinformation to the software stack. For example, processing circuitry,memory, and interfaces may include hardware circuitry, e.g. “healthsensors,” to monitor and determine loads or usage. In another example,one or more registers may store load values or information for theresources. In a specific example, each ingress and egress queue of aswitch may have a register in which load information can be stored. Theload information may be communicate to the software stack of the node orswitch to compare with a threshold value set from the registrationrequest for the resource. The software stack may alert, e.g. send an ACKmessage, the sending node based on the comparison, e.g. if theprocessing load exceeds the threshold value.

At decision block 356, the logic flow 350 includes determining whetherthe registration of the one or more resources was successful or notsuccessful. If the registration is not successful, a NACK message may becommunicated to the sending node at block 358. The NACK message mayinclude information, such as resource identification, switch or nodeidentification, and so forth, to enable the sending node and applicationto determine which resource cannot be registered. In some instances, theNACK message may include an “error report” to identify the cause orreason why the resource cannot be registered. Embodiments are notlimited in this manner.

At block 360, embodiments include monitoring loads for each of the oneor more resources. As previously discussed, logic may include comparingload information for a resource with a threshold value for the resourceto determine whether the resource is meeting the QoS requirements for anapplication. For example, if the load is greater (or equal to) thethreshold value, the resource may not be able to meet the loadrequirements for the application to utilize the resource. The loadinformation may indicate which of the other nodes are utilizing theresource and the maximum available load for utilization a resource canprovide. In some instances, the load information may be provided tologic for comparison in real-time or a continuous or semi-continuousbasis, e.g. every microsecond, millisecond, or any other time that maybe stipulated by the application based on an SLA, for example.

In some embodiments, a determination as to whether the load usage of theresource exceeds (or meets) the threshold value for the resourceindicating the resource cannot provide the load requirements for theapplication at block 362. For example, the load information determinedat 360 may indicate that other nodes are using the resource above (orequal) to the threshold value provided in the registration request. Inthis example, the threshold value may be minimum amount (or percentage)of load required by the application for the resource. Note that in someembodiments; the opposite logic may be used to indicate the resourcecannot or is not providing the required load for the application. Forexample, if the information determined at block 360 indicates themaximum amount of load that can be utilized by the application on theresource is below the threshold value, the resource cannot meet therequirements of the application. Embodiments are not limited in thismanner.

At block 364, the logic flow 350 includes sending an acknowledgementmessage indicating a load usage for a resource. In some instances, theACK message may only be sent when the resource cannot provide therequired load for the application. In other instances, the ACK messagemay be communicated on a periodic or semi-periodic basis regardless ofwhether the resource can provide the load for the application or not.

In some embodiments, the logic flow 350 may include receiving anadjustment action at block 366. The adjust action may be communicated orsent based on the resource not meeting the requirement of theapplication. The adjustment action may make one or more adjustments tothe device (or elsewhere in the end-to-end path) to enable the resourceto meet the load requirements for the application. For example, theadjustment action may cause a device to reserve load usage for theapplication. In another example, the adjustment action may causeinformation and data for other nodes to be processed by a different nodeor switch. Embodiments are not limited in this manner and otheradjustment actions may be taken.

At decision block 368, a determination may be made as to whether aderegistration message is received by the sending node and application.If a deregistration message was not received, the device might continueto monitor resources for the application. However, if a deregistrationmessage was received, the logic flow 350 may end.

FIG. 4 illustrates an example of a communications flow 400 to registerone or more resources for monitoring. As previously discussed, a nodemay communicate a registration request to register one or more resourcesof an end-to-end path to ensure that each of the resources is provideusage or load capabilities in accordance with an application of thenode. In the illustrate example of FIG. 4, node A 401-1 communicates aregistration request 402 to node C 401-1 via switch 405. Theregistration request 402 may be the same as or similar to theregistration request previously discussed. For example, the registrationrequest 402 may include a destination identifier that identifies node C401-3 as the destination node. Thus, in this example, the switch 405 mayuse this information to route the registration request 402 to the nodeC3 401-3.

The registration request 402 also includes one or more resourceidentifiers and threshold values to enable the switch and the node C401-3 to register for load monitoring. The registration request 402 canalso include a monitoring window value to determine an average load fora resource. The monitoring window value may be an amount of time overwhich the average load for the resource is determined, for example. FIG.4 illustrates monitoring windows 412-1 through 412-a, where a can be anypositive integer.

Each of the devices, e.g. switch 405 and Node C 401-3, may respond tothe registration request 402 by communicating an acknowledgement messageto node A 401-1. For example, switch 405 communicates acknowledgementmessage 404-1 and node C 401-3 communicates acknowledgement message404-2 to node A 404-1 in response to the registration request 402. Eachof the acknowledgement messages 404-1 and 404-2 may include anindication that their respective resources are successful enabled formonitoring. The acknowledgement messages 404-1 and 404-2 may alsoindicate or include one or more load values to indicate a current loadfor their resources. Acknowledgement messages 404-1 and 404-2 mayindicate that the loads of switch 405 and node C 401-3 resources isbelow the threshold requirement for node A 401-1.

In the illustrated example, node B 401-2 may commence sending one ormore jobs, such as puts 406-1 through 406-5, to node C 401-3 forprocessing. These jobs may use the resources of the switch 405 and thenode C 401-3. Node C 401-3 may determine an average load or usage forregistered resources during the monitoring window 412-1 and communicatean acknowledgement message 404-3 to node A 401-1. In the illustratedexample, only two puts 406-1 and 406-2 are sent to node C 401-3 forprocessing during the first monitoring window 412-1. Thus, the loads ofthe resources of node C 406-3 may still be under the threshold values orrequirements stipulated by node A 401-1.

Node B 401-2 may continue to send jobs to node C 401-3. Again, aftermonitoring window 412-2, node C 401-3 may determine the average load orusage of its resources being monitored and communicate the informationto node A 401-1. In this example, puts 406-3 through 406-6 may cause theaverage load to exceed the threshold value for resources of node C 401-3during the second monitoring window 412-2. Node C 401-3 may communicateacknowledgement 404-4 to node A 401-1 with the results of the averageload determination after monitoring window 412-2. In this example, nodeA 401-1 may communicate or cause one or more actions 410 on node C 401-3to ensure that the resources are reserved for node A 401-1. Embodimentsare not limited to the example illustrated in FIG. 4.

FIG. 5 illustrates an embodiment of a logic flow diagram 500. The logicflow 500 may be representative of some or all of the operations executedby one or more embodiments described herein. For example, the logic flow500 may illustrate operations performed by one or more systems ordevices in FIGS. 1A-1C. Various embodiments are not limited in thismanner.

In various embodiments, logic flow 500 may include causing communicationof a registration request between a first end-point and a secondend-point, the registration request to establish resource loadmonitoring for one or more resources of an end-to-end path for the firstend-point and the second end-point at block 505. For example, a sendingnode may communicate the registration request to a destination node viaone or more switches, as previously discussed. The end-to-end path caninclude one or more resources of the sending node, destination node, andthe one or more switches to communicate the registration request andsubsequent jobs and instructions.

At block 510, the logic flow 500 includes receiving one or moreacknowledgements indicating resource loads for each of the one or moreresources of the end-to-end path. Further and at block 515, the logicflow 500 includes receiving an acknowledgement of the one or moreacknowledgments indicating that a resource of the one or more resourcesis not meeting a threshold requirement for the end-to-end path based ona resource load for the resource.

The logic flow 500 includes performing an action for communicationtraffic utilizing the one or more resources based on the acknowledgementat block 520. Embodiments are not limited in this manner. For example,embodiments include reserving resource utilization on the one or moreresources for use by an application on the first end-point. Embodimentsare not limited in this manner.

FIG. 6 illustrates an embodiment of an exemplary computing architecture600 suitable for implementing various embodiments as previouslydescribed. In one embodiment, the computing architecture 600 maycomprise or be implemented as part one or more systems and devicespreviously discussed.

As used in this application, the terms “system” and “component” areintended to refer to a computer-related entity, either hardware, acombination of hardware and software, software, or software inexecution, examples of which are provided by the exemplary computingarchitecture 600. For example, a component can be, but is not limited tobeing, a process running on a processor, a processor, a hard disk drive,multiple storage drives (of optical and/or magnetic storage medium), anobject, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on aserver and the server can be a component. One or more components canreside within a process and/or thread of execution, and a component canbe localized on one computer and/or distributed between two or morecomputers. Further, components may be communicatively coupled to eachother by various types of communications media to coordinate operations.The coordination may involve the uni-directional or bi-directionalexchange of information. For instance, the components may communicateinformation in the form of signals communicated over the communicationsmedia. The information can be implemented as signals allocated tovarious signal lines. In such allocations, each message is a signal.Further embodiments, however, may alternatively employ data messages.Such data messages may be sent across various connections. Exemplaryconnections include parallel interfaces, serial interfaces, and businterfaces.

The computing architecture 600 includes various common computingelements, such as one or more processors, multi-core processors,co-processors, memory units, chipsets, controllers, peripherals,interfaces, oscillators, timing devices, video cards, audio cards,multimedia input/output (I/O) components, power supplies, and so forth.The embodiments, however, are not limited to implementation by thecomputing architecture 600.

As shown in FIG. 6, the computing architecture 600 comprises aprocessing unit 604, a system memory 606 and a system bus 608. Theprocessing unit 604 can be any of various commercially availableprocessors, such as those described with reference to the processingcircuitry shown in FIG. 1A.

The system bus 608 provides an interface for system componentsincluding, but not limited to, the system memory 606 to the processingunit 604. The system bus 608 can be any of several types of busstructure that may further interconnect to a memory bus (with or withouta memory controller), a peripheral bus, and a local bus using any of avariety of commercially available bus architectures. Interface adaptersmay connect to the system bus 608 via a slot architecture. Example slotarchitectures may include without limitation Accelerated Graphics Port(AGP), Card Bus, (Extended) Industry Standard Architecture ((E)ISA),Micro Channel Architecture (MCA), NuBus, Peripheral ComponentInterconnect (Extended) (PCI(X)), PCI Express, Personal Computer MemoryCard International Association (PCMCIA), and the like.

The computing architecture 600 may comprise or implement variousarticles of manufacture. An article of manufacture may comprise acomputer-readable storage medium to store logic. Examples of acomputer-readable storage medium may include any tangible media capableof storing electronic data, including volatile memory or non-volatilememory, removable or non-removable memory, erasable or non-erasablememory, writeable or re-writeable memory, and so forth. Examples oflogic may include executable computer program instructions implementedusing any suitable type of code, such as source code, compiled code,interpreted code, executable code, static code, dynamic code,object-oriented code, visual code, and the like. Embodiments may also beat least partly implemented as instructions contained in or on anon-transitory computer-readable medium, which may be read and executedby one or more processors to enable performance of the operationsdescribed herein.

The system memory 606 may include various types of computer-readablestorage media in the form of one or more higher speed memory units, suchas read-only memory (ROM), random-access memory (RAM), dynamic RAM(DRAM), Double-Data-Rate DRAM (DDRAM), synchronous DRAM (SDRAM), staticRAM (SRAM), programmable ROM (PROM), erasable programmable ROM (EPROM),electrically erasable programmable ROM (EEPROM), flash memory, polymermemory such as ferroelectric polymer memory, ovonic memory, phase changeor ferroelectric memory, silicon-oxide-nitride-oxide-silicon (SONOS)memory, magnetic or optical cards, an array of devices such as RedundantArray of Independent Disks (RAID) drives, solid state memory devices(e.g., USB memory, solid state drives (SSD) and any other type ofstorage media suitable for storing information. In the illustratedembodiment shown in FIG. 6, the system memory 606 can includenon-volatile memory 610 and/or volatile memory 612. A basic input/outputsystem (BIOS) can be stored in the non-volatile memory 610.

The computer 602 may include various types of computer-readable storagemedia in the form of one or more lower speed memory units, including aninternal (or external) hard disk drive (HDD) 614, a magnetic floppy diskdrive (FDD) 616 to read from or write to a removable magnetic disk 618,and an optical disk drive 620 to read from or write to a removableoptical disk 622 (e.g., a CD-ROM or DVD). The HDD 614, FDD 616 andoptical disk drive 620 can be connected to the system bus 608 by a HDDinterface 624, an FDD interface 626 and an optical drive interface 628,respectively. The HDD interface 624 for external drive implementationscan include at least one or both of Universal Serial Bus (USB) and IEEE1394 interface technologies.

The drives and associated computer-readable media provide volatileand/or nonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For example, a number of program modules canbe stored in the drives and memory units 610, 612, including anoperating system 630, one or more application programs 632, otherprogram modules 634, and program data 636. In one embodiment, the one ormore application programs 632, other program modules 634, and programdata 636 can include, for example, the various applications and/orcomponents of the system 105.

A user can enter commands and information into the computer 602 throughone or more wired/wireless input devices, for example, a keyboard 638and a pointing device, such as a mouse 640. Other input devices mayinclude microphones, infra-red (IR) remote controls, radio-frequency(RF) remote controls, game pads, stylus pens, card readers, dongles,finger print readers, gloves, graphics tablets, joysticks, keyboards,retina readers, touch screens (e.g., capacitive, resistive, etc.),trackballs, trackpads, sensors, styluses, and the like. These and otherinput devices are often connected to the processing unit 604 through aninput device interface 642 that is coupled to the system bus 608, butcan be connected by other interfaces such as a parallel port, IEEE 1394serial port, a game port, a USB port, an IR interface, and so forth.

A monitor 644 or other type of display device is also connected to thesystem bus 608 via an interface, such as a video adaptor 646. Themonitor 644 may be internal or external to the computer 602. In additionto the monitor 644, a computer typically includes other peripheraloutput devices, such as speakers, printers, and so forth.

The computer 602 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer 648. The remote computer 648can be a workstation, a server computer, a router, a personal computer,portable computer, microprocessor-based entertainment appliance, a peerdevice or other common network node, and typically includes many or allof the elements described relative to the computer 602, although, forpurposes of brevity, only a memory/storage device 650 is illustrated.The logical connections depicted include wired/wireless connectivity toa local area network (LAN) 652 and/or larger networks, for example, awide area network (WAN) 654. Such LAN and WAN networking environmentsare commonplace in offices and companies, and facilitate enterprise-widecomputer networks, such as intranets, all of which may connect to aglobal communications network, for example, the Internet.

When used in a LAN networking environment, the computer 602 is connectedto the LAN 652 through a wire and/or wireless communication networkinterface or adaptor 656. The adaptor 656 can facilitate wire and/orwireless communications to the LAN 652, which may also include awireless access point disposed thereon for communicating with thewireless functionality of the adaptor 656.

When used in a WAN networking environment, the computer 602 can includea modem 658, or is connected to a communications server on the WAN 654,or has other means for establishing communications over the WAN 654,such as by way of the Internet. The modem 658, which can be internal orexternal and a wire and/or wireless device, connects to the system bus608 via the input device interface 642. In a networked environment,program modules depicted relative to the computer 602, or portionsthereof, can be stored in the remote memory/storage device 650. It willbe appreciated that the network connections shown are exemplary andother means of establishing a communications link between the computerscan be used.

The computer 602 is operable to communicate with wire and wirelessdevices or entities using the IEEE 802 family of standards, such aswireless devices operatively disposed in wireless communication (e.g.,IEEE 802.11 over-the-air modulation techniques). This includes at leastWiFi (or Wireless Fidelity), WiMax, and Bluetooth™ wirelesstechnologies, 3G, 4G, LTE wireless technologies, among others. Thus, thecommunication can be a predefined structure as with a conventionalnetwork or simply an ad hoc communication between at least two devices.WiFi networks use radio technologies called IEEE 802.11x (a, b, g, n,etc.) to provide secure, reliable, fast wireless connectivity. A WiFinetwork can be used to connect computers to each other, to the Internet,and to wire networks (which use IEEE 802.3-related media and functions).

The various elements and components as previously described withreference to FIGS. 1-5 may comprise various hardware elements, softwareelements, or a combination of both. Examples of hardware elements mayinclude devices, logic devices, components, processors, microprocessors,circuits, processors, circuit elements (e.g., transistors, resistors,capacitors, inductors, and so forth), integrated circuits, applicationspecific integrated circuits (ASIC), programmable logic devices (PLD),digital signal processors (DSP), field programmable gate array (FPGA),memory units, logic gates, registers, semiconductor device, chips,microchips, chip sets, and so forth. Examples of software elements mayinclude software components, programs, applications, computer programs,application programs, system programs, software development programs,machine programs, operating system software, middleware, firmware,software modules, routines, subroutines, functions, methods, procedures,software interfaces, application program interfaces (API), instructionsets, computing code, computer code, code segments, computer codesegments, words, values, symbols, or any combination thereof. However,determining whether an embodiment is implemented using hardware elementsand/or software elements may vary in accordance with any number offactors, such as desired computational rate, power levels, heattolerances, processing cycle budget, input data rates, output datarates, memory resources, data bus speeds and other design or performanceconstraints, as desired for a given implementation.

The detailed disclosure now turns to providing examples that pertain tofurther embodiments. Examples one through twenty-five (1-25) providedbelow are intended to be exemplary and non-limiting.

In a first example, a system, device, apparatus may include one or moresend a registration request between a first end-point and a secondend-point of an end-to-end path, the registration request to establishresource load monitoring for one or more resources of the end-to-endpath, receive one or more acknowledgements indicating resource loads foreach of the one or more resources of the end-to-end path, at least oneof the acknowledgements to indicate a resource of the one or moreresources is not meeting a threshold requirement for the end-to-endpath, and perform an action for communication traffic utilizing the oneor more resources based on the acknowledgement.

In a second example and in furtherance of the first example, a system,device, apparatus may include the registration request comprisingresource identifiers to identify each of the one or more resources.

In a third example and in furtherance of any previous example, a system,device, apparatus may include the registration request comprisingthreshold values for each of the one or more resources.

In a fourth example and in furtherance of any previous example, asystem, device, apparatus may include the registration requestcomprising a monitor window value to define a period of time todetermine an average resource load for each of the one or moreresources.

In a fifth example and in furtherance of any previous example, a system,device, apparatus may include the one or more resources comprising atleast one of a memory of the first end-point, a processing component ofthe first end-point, an interface of the first end-point, a switchfabric, an interface of the second end-point, a processing component ofthe second end-point, and a memory of the second end-point.

In a sixth example and in furtherance of any previous example, a system,device, apparatus may include logic to determine whether thecommunication traffic is critical communication traffic or not criticalcommunication traffic, perform the action comprising reserving one ormore of additional network bandwidth, additional processing cycles, andadditional memory usage for the communication traffic if thecommunication traffic is critical communication traffic, and perform theaction comprising maintaining current usage of network bandwidth,processing cycles, and memory for the communication traffic if thecommunication traffic is not critical communication traffic.

In a seventh example and in furtherance of any previous example, asystem, device, apparatus may include logic to send a secondregistration request between the first end-point and the secondend-point, the second registration request to establish other resourceload monitoring for the one or more resources for the end-to-end path,the other resource load monitoring to have different thresholdrequirements than the threshold requirements for the resource loadmonitoring.

In an eighth example and in furtherance of any previous example, asystem, device, apparatus may include logic to send a secondregistration request between the first end-point and the secondend-point, the second registration request to establish other resourceload monitoring for the one or more resources for the end-to-end path,the other resource load monitoring to have a different monitor windowvalue than a monitor window value for the resource load monitoring.

In a ninth example and in furtherance of any previous example, a system,device, apparatus may include logic to establish resource loadmonitoring for one or more resources of another end-to-end path for thefirst end-point and the second end-point, wherein at least one resourceof the other end-to-end path is different than one resource of theend-to-end path.

In a tenth example and in furtherance of any previous example, a system,device, apparatus may include logic to receive a negativeacknowledgement indicating the resource load monitoring for at least oneof the one or more resources failed to establish.

In an eleventh example and in furtherance of any previous example, asystem, device, apparatus may include the resource load monitoring toset a resource load monitor for each of the one or more resources basedon threshold requirement values of the registration request.

In a twelfth example and in furtherance of any previous example, asystem, device, apparatus may include logic to send a deregistrationrequest between the first end-point and the second end-point to cancelthe resource load monitoring for the one or more resources of theend-to-end path.

In a thirteenth example and in furtherance of any previous example, acomputer-readable storage medium comprising a plurality of instructionsthat, when executed by processing circuitry, enable processing circuitryto send a registration request between a first end-point and a secondend-point of an end-to-end path, the registration request to establishresource load monitoring for one or more resources of the end-to-endpath, receive one or more acknowledgements indicating resource loads foreach of the one or more resources of the end-to-end path, at least oneof the acknowledgements to indicate a resource of the one or moreresources is not meeting a threshold requirement for the end-to-endpath, and perform an action for communication traffic utilizing the oneor more resources based on the acknowledgement.

In a fourteenth example and in furtherance of any previous example, acomputer readable storage medium comprising a plurality of instructions,that when executed, enable processing circuitry to perform the actioncomprising reserving one or more of additional network bandwidth,additional processing cycles, and additional memory usage for thecommunication traffic if the communication traffic is criticalcommunication traffic, perform the action comprising maintaining currentusage of network bandwidth, processing cycles, and memory for thecommunication traffic if the communication traffic is not criticalcommunication traffic.

In a fifteenth example and in furtherance of any previous example, acomputer readable storage medium comprising a plurality of instructions,that when executed, enable processing circuitry to send a secondregistration request between the first end-point and the secondend-point, the second registration request to establish other resourceload monitoring for the one or more resources for the end-to-end path,the other resource load monitoring to have different thresholdrequirements than the threshold requirements for the resource loadmonitoring.

In a sixteenth example and in furtherance of any previous example, acomputer readable storage medium comprising a plurality of instructions,that when executed, enable processing circuitry to send a secondregistration request between the first end-point and the secondend-point, the second registration request to establish other resourceload monitoring for the one or more resources for the end-to-end path,the other resource load monitoring to have a different monitor windowvalue than a monitor window value of the resource load monitor.

In a seventeenth example and in furtherance of any previous example, acomputer readable storage medium comprising a plurality of instructions,that when executed, enable processing circuitry to establish resourceload monitoring for one or more resources of another end-to-end path forthe first end-point and the second end-point, wherein at least oneresource of the other end-to-end path is different than one resource ofthe end-to-end path.

In an eighteenth example and in furtherance of any previous example, acomputer readable storage medium comprising a plurality of instructions,that when executed, enable processing circuitry to receive a negativeacknowledgement indicating the resource load monitoring for at least oneof the one or more resources failed to establish.

In a nineteenth example and in furtherance of any previous example, acomputer readable storage medium comprising a plurality of instructions,that when executed, enable processing circuitry to send a deregistrationrequest between the first end-point and the second end-point to cancelthe resource load monitoring for the one or more resources of theend-to-end path.

In a twentieth example and in furtherance of any previous example, acomputer-implemented method may include sending a registration requestbetween a first end-point and a second end-point of an end-to-end path,the registration request to establish resource load monitoring for oneor more resources of the end-to-end path, receiving one or moreacknowledgements indicating resource loads for each of the one or moreresources of the end-to-end path, at least one of the acknowledgementsto indicate a resource of the one or more resources is not meeting athreshold requirement for the end-to-end path, and performing an actionfor communication traffic utilizing the one or more resources based onthe acknowledgement.

In a twenty-first example and in furtherance of any previous example, acomputer-implemented method may include performing the action comprisingreserving one or more of additional network bandwidth, additionalprocessing cycles, and additional memory usage for the communicationtraffic if the communication traffic is critical communication traffic,and performing the action comprising maintaining current usage ofnetwork bandwidth, processing cycles, and memory for the communicationtraffic if the communication traffic is not critical communicationtraffic.

In a twenty-second example and in furtherance of any previous example, acomputer-implemented method may include sending a second registrationrequest between the first end-point and the second end-point, the secondregistration request to establish other resource load monitoring for theone or more resources for the end-to-end path, the other resource loadmonitoring to have different threshold requirements than the thresholdrequirements for the resource load monitoring.

In a twenty-third example and in furtherance of any previous example, acomputer-implemented method may include sending a second registrationrequest between the first end-point and the second end-point, the secondregistration request to establish other resource load monitoring for theone or more resources for the end-to-end path, the other resource loadmonitoring to have a different monitor window value than a monitorwindow value of the resource load monitoring.

In a twenty-fourth example and in furtherance of any previous example, acomputer-implemented method may include establishing resource loadmonitoring for one or more resources of another end-to-end path for thefirst end-point and the second end-point, wherein at least one resourceof the end-to-end path is different than one resource of the otherend-to-end path.

In a twenty-fifth example and in furtherance of any previous example, acomputer-implemented method may include sending a deregistration requestbetween the first end-point and the second end-point to cancel theresource load monitoring for the one or more resources of the end-to-endpath.

Some embodiments may be described using the expression “one embodiment”or “an embodiment” along with their derivatives. These terms mean that aparticular feature, structure, or characteristic described in connectionwith the embodiment is included in at least one embodiment. Theappearances of the phrase “in one embodiment” in various places in thespecification are not necessarily all referring to the same embodiment.Further, some embodiments may be described using the expression“coupled” and “connected” along with their derivatives. These terms arenot necessarily intended as synonyms for each other. For example, someembodiments may be described using the terms “connected” and/or“coupled” to indicate that two or more elements are in direct physicalor electrical contact with each other. The term “coupled,” however, mayalso mean that two or more elements are not in direct contact with eachother, but yet still co-operate or interact with each other.

It is emphasized that the Abstract of the Disclosure is provided toallow a reader to quickly ascertain the nature of the technicaldisclosure. It is submitted with the understanding that it will not beused to interpret or limit the scope or meaning of the claims. Inaddition, in the foregoing Detailed Description, it can be seen thatvarious features are grouped together in a single embodiment for thepurpose of streamlining the disclosure. This method of disclosure is notto be interpreted as reflecting an intention that the claimedembodiments require more features than are expressly recited in eachclaim. Rather, as the following claims reflect, inventive subject matterlies in less than all features of a single disclosed embodiment. Thusthe following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separateembodiment. In the appended claims, the terms “including” and “in which”are used as the plain-English equivalents of the respective terms“comprising” and “wherein,” respectively. Moreover, the terms “first,”“second,” “third,” and so forth, are used merely as labels, and are notintended to impose numerical requirements on their objects.

What has been described above includes examples of the disclosedarchitecture. It is, of course, not possible to describe everyconceivable combination of components and/or methodologies, but one ofordinary skill in the art may recognize that many further combinationsand permutations are possible. Accordingly, the novel architecture isintended to embrace all such alterations, modifications and variationsthat fall within the spirit and scope of the appended claims.

The invention claimed is:
 1. An apparatus, comprising: memory;processing circuitry coupled with the memory; and logic, at leastpartially implemented by the processing circuitry, the logic to: send aregistration request between a first end-point and a second end-point ofan end-to-end path, the registration request to establish resource loadmonitoring for one or more resources of the end-to-end path to beprovided to an application to be executed on a processing component ofthe first end-point, the one or more resources to comprise theprocessing component of the first end-point and a processing componentof the second end-point to be used by the application; receive one ormore acknowledgements to specify resource loads for each of the one ormore resources of the end-to-end path, at least one of the resourceloads specified in the acknowledgements to indicate a resource of theone or more resources does not meet a threshold requirement for theresource in the end-to-end path; perform an action for communicationtraffic utilizing the one or more resources based on theacknowledgement; and send a deregistration request between the firstend-point and the second end-point to cancel the resource loadmonitoring for the one or more resources of the end-to-end path for theapplication.
 2. The apparatus of claim 1, the registration requestfurther to comprise resource identifiers to identify each of the one ormore resources, the second end-point to comprise a destination end-pointof the end-to-end path, wherein at least a portion of the communicationtraffic is associated with the application.
 3. The apparatus of claim 2,the registration request further to comprise respective threshold valuesfor each of the one or more resources, the threshold values associatedwith the application, the one or more acknowledgements to comprise anacknowledgment received from a third end-point responsive to theregistration request, the third end-point between the first and secondend-points in the end-to-end path.
 4. The apparatus of claim 3, theregistration request further to comprise a monitor window value todefine a period of time to monitor the resource load for each of the oneor more resources and determine an average resource load for each of theone or more resources.
 5. The apparatus of claim 1, the one or moreresources to be provided to the application further to comprise: amemory of the first end-point, an interface of the first end-point, aswitch fabric, an interface of the second end-point, and a memory of thesecond end-point to be used by the application.
 6. The apparatus ofclaim 1, the logic to: determine whether the communication traffic iscritical communication traffic or not critical communication traffic;perform the action to comprise a change of a quality of service (QoS)scheme from a first QoS scheme to a second QoS scheme, the change to thesecond QoS scheme to reserve one or more of additional networkbandwidth, additional processing cycles, and additional memory usage forthe communication traffic relative to the first QoS scheme if thecommunication traffic is critical communication traffic; and perform theaction to comprise maintenance of current usage of network bandwidth,processing cycles, and memory for the communication traffic if thecommunication traffic is not critical communication traffic.
 7. Theapparatus of claim 1, the logic to send a second registration requestbetween the first end-point and the second end-point, the secondregistration request to establish other resource load monitoring for theone or more resources for the end-to-end path, the second registrationrequest for another application using the one or more resources of theend-to-end path, the other resource load monitoring to have differentthreshold requirements than the threshold requirements for the resourceload monitoring, the different threshold requirements associated withthe another application.
 8. The apparatus of claim 1, the logic to senda second registration request between the first end-point and a thirdend-point of a second end-to-end path, the second registration requestto establish other resource load monitoring for one or more resources ofthe second end-to-end path to be allocated to another application, theother resource load monitoring to have a different monitor window valuethan a monitor window value for the resource load monitoring.
 9. Theapparatus of claim 1, the logic to establish resource load monitoringfor one or more resources of another end-to-end path for the firstend-point and the second end-point, wherein at least one resource of theother end-to-end path is different than one resource of the end-to-endpath, wherein the one or more resources of the other end-to-end path isto be allocated to the application.
 10. The apparatus of claim 1, thelogic to receive a negative acknowledgement to indicate the resourceload monitoring for at least one of the one or more resources failed toestablish.
 11. The apparatus of claim 1, the resource load monitoring toset a resource load monitor for each of the one or more resources basedon threshold requirement values of the registration request, thethreshold requirement values associated with the application.
 12. Anon-transitory computer-readable storage medium comprising a pluralityof instructions that, when executed by processing circuitry, enableprocessing circuitry to: send a registration request between a firstend-point and a second end-point of an end-to-end path, the registrationrequest to establish resource load monitoring for one or more resourcesof the end-to-end path to be provided to an application to be executedon a processing component of the first end-point, the one or moreresources to comprise the processing component of the first end-pointand a processing component of the second end-point to be used by theapplication; receive one or more acknowledgements to specify resourceloads for each of the one or more resources of the end-to-end path, atleast one of the resource loads specified in the acknowledgements toindicate a resource of the one or more resources does not meet athreshold requirement for the resource in the end-to-end path; performan action for communication traffic utilizing the one or more resourcesbased on the acknowledgement; and send a deregistration request betweenthe first end-point and the second end-point to cancel the resource loadmonitoring for the one or more resources of the end-to-end path for theapplication.
 13. The computer-readable storage medium of claim 12,comprising a plurality of instructions, that when executed, enableprocessing circuitry to: perform the action to comprise a change of aquality of service (QoS) scheme from a first QoS scheme to a second QoSscheme, the change to the second QoS scheme to reserve one or more ofadditional network bandwidth, additional processing cycles, andadditional memory usage for the communication traffic relative to thefirst QoS scheme if the communication traffic is critical communicationtraffic; and perform the action to comprise maintenance of current usageof network bandwidth, processing cycles, and memory for thecommunication traffic if the communication traffic is not criticalcommunication traffic.
 14. The computer-readable storage medium of claim12, comprising a plurality of instructions, that when executed, enableprocessing circuitry to a second registration request between the firstend-point and the second end-point, the second registration request toestablish other resource load monitoring for the one or more resourcesfor the end-to-end path, the second registration request for anotherapplication using the one or more resources of the end-to-end path, theother resource load monitoring to have different threshold requirementsthan the threshold requirements for the resource load monitoring, thedifferent threshold requirements associated with the anotherapplication.
 15. The computer-readable storage medium of claim 12,comprising a plurality of instructions, that when executed, enableprocessing circuitry to send a second registration request between thefirst end-point and a third end-point of a second end-to-end path, thesecond registration request to establish other resource load monitoringfor one or more resources of the second end-to-end path to be allocatedto another application, the other resource load monitoring to have adifferent monitor window value than a monitor window value for theresource load monitoring.
 16. The computer-readable storage medium ofclaim 12, comprising a plurality of instructions, that when executed,enable processing circuitry to establish resource load monitoring forone or more resources of another end-to-end path for the first end-pointand the second end-point, wherein at least one resource of the otherend-to-end path is different than one resource of the end-to-end path,wherein the one or more resources of the other end-to-end path is to beallocated to the application.
 17. The computer-readable storage mediumof claim 12, comprising a plurality of instructions, that when executed,enable processing circuitry to receive a negative acknowledgement toindicate the resource load monitoring for at least one of the one ormore resources failed to establish.
 18. A computer-implemented method,comprising: sending a registration request between a first end-point anda second end-point of an end-to-end path, the registration request toestablish resource load monitoring for one or more resources of theend-to-end path to be provided to an application to be executed on aprocessing component of the first end-point, the one or more resourcescomprising the processing component of the first end-point and aprocessing component of the second end-point used by the application;receiving one or more acknowledgements specifying resource loads foreach of the one or more resources of the end-to-end path, at least oneof the resource loads specified in the acknowledgements to indicate aresource of the one or more resources is not meeting a thresholdrequirement for the resource in the end-to-end path; performing anaction for communication traffic utilizing the one or more resourcesbased on the acknowledgement; and sending a deregistration requestbetween the first end-point and the second end-point to cancel theresource load monitoring for the one or more resources of the end-to-endpath for the application.
 19. The computer-implemented method of claim18, comprising: performing the action comprising changing a quality ofservice (QoS) scheme from a first QoS scheme to a second QoS scheme, thechanging to the second QoS scheme comprising reserving one or more ofadditional network bandwidth, additional processing cycles, andadditional memory usage for the communication traffic relative to thefirst QoS scheme if the communication traffic is critical communicationtraffic; and performing the action comprising maintaining current usageof network bandwidth, processing cycles, and memory for thecommunication traffic if the communication traffic is not criticalcommunication traffic.
 20. The computer-implemented method of claim 18,comprising sending a second registration request between the firstend-point and the second end-point, the second registration request toestablish other resource load monitoring for the one or more resourcesfor the end-to-end path, the second registration request for anotherapplication using the one or more resources of the end-to-end path, theother resource load monitoring to have different threshold requirementsthan the threshold requirements for the resource load monitoring, thedifferent threshold requirements associated with the anotherapplication.
 21. The computer-implemented method of claim 18, comprisingsending a second registration request between the first end-point and athird end-point of a second end-to-end path, the second registrationrequest to establish other resource load monitoring for one or moreresources of the second end-to-end path to be allocated to anotherapplication, the other resource load monitoring to have a differentmonitor window value than a monitor window value for the resource loadmonitoring.
 22. The computer-implemented method of claim 18, comprisingestablishing resource load monitoring for one or more resources ofanother end-to-end path for the first end-point and the secondend-point, wherein at least one resource of the end-to-end path isdifferent than one resource of the other end-to-end path, wherein theone or more resources of the other end-to-end path is to be allocated tothe application.