Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ASSIGNMENT OF NETWORK CONFIGURATION FOR A WIRED NETWORK USING A WIRELESS NETWORK
Document Type and Number:
WIPO Patent Application WO/2020/028767
Kind Code:
A1
Abstract:
A technique is configured to utilize frames generated by a first layer of a protocol stack for a first network to configure network parameters associated with a second layer of the protocol stack for a second network. The frames are illustratively beacon frames generated by a data link layer of a Transmission Control Protocol/Internet Protocol (TCP/IP) stack for a wireless network, and the network parameters are illustratively IP addresses associated with a network layer of the TCP/IP stack for a wired network. Notably, the beacon frames of the wireless network may be utilized for two-way communication exchange on a per node basis for each node in the wired network.

Inventors:
PATTERSON JOHN ALLEN (US)
LESLIE DEREK J (US)
CARTER ADAM (US)
Application Number:
PCT/US2019/044830
Publication Date:
February 06, 2020
Filing Date:
August 02, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NETAPP INC (US)
International Classes:
H04L12/28
Foreign References:
US20040253969A12004-12-16
EP2701447A12014-02-26
US20080220741A12008-09-11
Attorney, Agent or Firm:
BARBAS, Charles J. (US)
Download PDF:
Claims:
CLAIMS 1. An apparatus comprising:

a processor;

a wired network interface coupled to the processor and a network;

a second network interface coupled to the processor, the second network interface capable of wireless communication; and a memory coupled to the processor, the memory including program

instructions executable by the processor to,

determine an identifier of the apparatus;

encode the identifier for a transmission in a first beacon via wireless communication;

send wirelessly the first beacon via the second network interface; receive wirelessly a second beacon via the second network interface, the second beacon including configuration information; and aPPly the configuration information to configure the first network interface. 2. The apparatus of claim 1, wherein the identifier is encoded in a first service set identifier (SSID) included in the first beacon and the configuration information is included in a second SSID included in the second beacon. 3. The apparatus of claim 1, wherein the first and second beacons operate at a link layer of a protocol stack and the configuration information is applied to configure the first network interface at a transport layer of the protocol stack. 4. The apparatus of claim 1, wherein the configuration information includes an internet protocol (IP) address and a virtual local area network (VLAN) tag. 5. The apparatus of claim 1, wherein the memory includes further program instructions executable by the processor to commission the apparatus as part of the network.

6. The apparatus of claim 1, wherein the second network interface is removably coupled to the apparatus. 7. The apparatus of claim 1, wherein the memory includes further program instructions executable by the processor to send wirelessly a third beacon via the second network interface to confirm configuration of the first network interface. 8. The apparatus of claim 1, wherein the second beacon includes a serial number of the apparatus. 10. The apparatus of claim 1, wherein the program instructions are executed in response to power-on of the apparatus. 11. A method for commissioning a node of a cluster comprising:

determining an identifier of the node having a first network interface; encoding the identifier for a transmission in a first beacon via wireless communication;

sending wirelessly the first beacon via a second network interface included in the node;

receiving wirelessly a second beacon via the second network interface, the second beacon including configuration information; and applying the configuration information to configure the first network interface. 12. The method of claim 11, wherein the identifier is encoded in a first service set identifier (SSID) included in the first beacon and the configuration information is included in a second SSID included in the second beacon. 13. The method of claim 11, wherein the first and second beacons operate at a link layer of a protocol stack and the configuration information is applied to configure the first network interface at a transport layer of the protocol stack. 14. The method of claim 11, wherein the configuration information includes an internet protocol (IP) address and a virtual local area network (VLAN) tag. 15. The method of claim 11, wherein the method is performed in response to the second network interface being coupled to the apparatus. 16 The method of claim 11, further comprises sending wirelessly a third beacon via the second network interface to confirm configuration of the first network interface.

17. The method of claim 11, wherein the second beacon includes a serial number of the apparatus. 18. The method of claim 11, wherein the method is performed in response to power- on of the node. 19. A non-transitory computer readable medium having program instructions configured to:

determine an identifier of a node having a first network interface; encode the identifier for a transmission in a first beacon via wireless communication;

send wirelessly the first beacon via a second network interface

included in the node;

receive wirelessly a second beacon via the second network interface, the second beacon including configuration information; and aPPly the configuration information to configure the first network interface. 20. The computer readable medium of claim 19 further comprising the program instructions configured to send wirelessly a third beacon via the second network interface to confirm configuration of the first network interface.

Description:
ASSIGNMENT OF NETWORK CONFIGURATION FOR A WIRED NETWORK USING A WIRELESS NETWORK

BACKGROUND

Technical Field

The disclosure generally relates to storage and compute nodes of a cluster, and more specifically, to network configuration of the storage and computer nodes of the cluster.

Background Information

A plurality of storage and compute nodes may be organized as a cluster to provide a distributed storage architecture configured to service storage requests issued by one or more clients of the cluster. The compute nodes include hardware resources, such processors, memory and networking, to provide compute services in a deployment of the cluster, while the storage nodes include such hardware resources, along with storage, to provide data storage and management services in the cluster To that end, the storage requests are directed to data stored on storage devices coupled to one or more of the storage nodes of the cluster. The data served by the storage nodes may be distributed across multiple storage units embodied as persistent storage devices, such as hard disk drives, solid state drives, flash memory systems, or other storage devices.

Configuring the storage and compute nodes as the cluster, e.g., a wired computer network, may be complicated. A typical wired network can have many nodes composed of multiple local area networks (LANs), any one of which can cause problems if not configured properly. Often, the networks are configured manually, for example, by entering commands at a console at a customer’s site, e.g., a data center. Such a process can be cumbersome and error-prone. A misconfigured node can cause performance degradation for the node and for the networked system as a whole or a lack of connectivity entirely. Additionally, it can be difficult to pinpoint the cause of the problem in a network having many nodes, because of the complicated interaction of network traffic. In some situations, the nodes are shipped to the customer’s data center for“in field” deployment where network configuration may be imposed by a system administrator of the customer. Such deployment may also encounter numerous difficulties with respect to installation and support of the nodes. For example, a data center may have tens, hundreds or even thousands of nodes that require correct network configuration parameters in order to operate properly and efficiently.

Examples of such configuration parameters include the Internet Protocol (IP) address and virtual local area network (VLAN) tags for the node. While these parameters may be pre-configured using default values or even self-configured, correct deployment in a customer network is typically not possible for a system administrator until all network components have been installed and are operating correctly.

Accordingly, there is a need for network configuration of the nodes in the cluster by means other than via the network for which the nodes are being configured.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and further advantages of the embodiments herein may be better understood by referring to the following description in conjunction with the accompanying drawings in which like reference numerals indicate identically or functionally similar elements, of which:

Fig. 1 is a block diagram of a plurality of nodes communicating with an access point over a wireless network;

Fig. 2 is a block diagram illustrating an exemplary format of a beacon frame used for communicating over the wireless network;

Fig. 3 is a block diagram of the nodes interconnected as a cluster over a wired network;

Fig. 4 is a block diagram of a node; and

Fig. 5 is a flow chart illustrating example operations for setting a SSID of the beacon frame.

OVERVIEW

The embodiments described herein are directed to a technique configured to utilize frames generated by a (first) layer of a protocol stack for a first network (i.e., acting as a configuration plane for cluster deployment) to configure network parameters for nodes of a cluster associated with another (second) layer of the protocol stack for a second network acting as an operating network (e.g., a high performance wired network) for the cluster. That is, the configuration plane is used to configure/deploy (i.e., initialize network parameters of) the nodes of the cluster to communicate on the operating network (i.e., deploy the nodes of the cluster) without the need to use the operating network for configuration. Illustratively, each node of the cluster may be configured with a wireless network interface (first network) and one or more wired interfaces (second network for cluster operation). The frames are illustratively wireless protocol beacon frames (e.g., IEEE 802.11 standard) generated by a data link layer of a Transmission Control Protocol/Internet Protocol (TCP/IP) stack for a wireless network (first network), and the network parameters are illustratively IP addresses associated with a network layer of the TCP/IP stack for the wired network (second network). Notably, the beacon frames of the wireless network may be utilized for two-way communication exchange on a per node basis for each node in the wired network.

According to an aspect of the technique, the beacon frames of the wireless network may be encoded to communicate assigned network configuration parameters to the nodes for use in the wired network, which is separate and apart from the wireless network. Each node may advertise an identifier, such as a serial number of the node and/or a Media Access Control (MAC) address, encoded in a service set identifier (SSID) of a beacon frame to an access point (AP) of the wireless network. The AP may examine the identifier and, in response, inform the node of its assigned network configuration by returning the beacon frame with configuration parameters (e.g., IP address and VLAN tag) encoded in the SSID of another beacon frame issued by the AP. In this manner, each node and the AP exchange beacon frames as a form of two-way communication using the SSID field of the beacon frame as a communication payload.

In another aspect of the technique, the information of the encoded beacon frames may be obtained from information transmitted over the wired network, such as the assigned IP addresses of one or more wired network interfaces of the nodes, and broadcast to an administrative node for configuration verification, discovery and/or reconfiguration purposes. The SSID of the wireless network interface may be encoded with the assigned IP address of the wired network interface, thereby providing an efficient and convenient way for the administrator to determine, verify and possibly change the network configuration parameters assigned to the wired network interface of the node. Illustratively the wireless network interface may be a Wi-Fi adapter coupled to the node via a Universal Serial Bus (USB) port (Wi-Fi dongle) such that the Wi-Fi dongle can be removed from the node by the administrator once the IP address has been determined. In response to a failure or error related to a wired network interface of a node (e.g., no IP address assigned), a visual indicator (e.g., a light emitting diode or similar mechanism) may be programmed according to a particular visual pattern (e.g., three long blinks followed by two short blinks) for diagnostic purposes, so that the node can be located. Accordingly, the SSID may be programmed with an error code associated with the failure and a corresponding pattern (e.g.,“3L2S” for 3 long, 2 short). In this manner, a particular node with a reported error may be specifically identified and located.

Advantageously, the encoded content of the SSID in the beacon frame transmitted by the AP may be highly dynamic in that the content may change as the AP rotates communication among various nodes of the wired network. Note that multiple SSIDs may be broadcast simultaneously to support concurrent

communication of more than one node with the AP. Initially, the SSID content may be encoded to instruct each node as to the network configuration parameters it should impose and utilize on the wired network. That is, the AP may return network configuration parameters to a node that advertises its serial number (via the SSID of the beacon frame), instructing the node to configure itself according to the parameters, such as IP address and VLAN tag, encoded in the SSID field. Note that SSIDs are typically limited to a predefined number (e.g., 32 for IEEE 802.11 standard) of characters, which can be used to advertise a variety of information such as serial number, as well as IP address (IPv4, IPv6) and VLAN tag. The two-way

communication can be effected between each node and the AP and, once initially configured, between those nodes (of the wired network) and the administrative node for discovery and/or reconfiguration purposes. The administrative node (as well as the AP) may create and use a database of serial numbers and assigned network configuration (IP address, VLAN tag) of nodes in the wired network for management configuration purposes. DESCRIPTION

Wireless Network

Fig. 1 is a block diagram of a plurality of nodes 400 for a cluster, such as storage and compute node, interconnected with an access point (AP) 110 over a wireless network 100. The nodes 400 may include functional components that cooperate to provide a distributed, scale-out storage architecture for a wired computer network 130, as described further herein. In an embodiment, the compute nodes may be physically and logically different from the storage nodes. For example, the compute nodes may illustratively include hardware resources, such processors, memory and networking, that cooperate to provide compute services for the wired network 130 (an operational data network for the cluster), while the storage nodes may include those hardware resources as well as storage that cooperate to provide data management and storage services for the network 130. Beacon frames 200 may be used by the AP 110 to wirelessly (e.g., via radio transmission) communicate network configuration information of the wired network 130 among the nodes 400. The beacon frames may be periodically transmitted over the wireless network 100 at a predetermined time, e.g., a target beacon transmission time (TBTT).

Fig. 2 is a block diagram illustrating an exemplary format of a beacon frame 200 used for communicating over the wireless network 100, according to e.g., IEEE 802.11 standard. The beacon frame includes a media access control (MAC) header

210, frame body 220 and a frame check sequence (FCS) 230. The MAC header 210 contains, among others, destination and source MAC addresses, whereas the FCS 230 contains a cyclic redundancy check that allows detection of a corrupted transmitted frame. The frame body 220 includes fields having a timestamp 222, beacon interval 224, capability information 226, a service set identifier (SSID) 250 and supported rates 228. The timestamp 222 is a value (e.g., in microseconds) representing the time on the AP 110, i.e., the time that the AP has been active, and the beacon interval 224 represents the number of time units between TBTTs. The capability information 226 contains requested or advertised optional capabilities, whereas the supported rates 228 indicate basic and/or supported data rates. The SSID 250 contains a sequence of characters (e.g., 32 characters) that uniquely identifies the wireless network 110 and that may be used to ensure that nodes connect to the proper network when multiple networks operate in a given area. The embodiments described herein are directed to a technique configured to utilize frames generated by a first layer of a protocol stack for a first network

(wireless network) to configure network parameters associated with a second layer of the protocol stack for a second network (e.g., the wired network 130). The first network acts a medium for deploying the cluster to use the second network for data operation, but without relying on the second network for configuring the deployment, i.e., the first network acts as a configuration plane for cluster deployment on the operating (second) network acting as a data plane, e.g., without the second network relying on self-deployment. The frames are illustratively wireless protocol beacon frames 200 (e.g., IEEE 802.11 standard) generated by a data link layer of a

Transmission Control Protocol/Intemet Protocol (TCP/IP) stack for a wireless network, such as wireless network 100, and the network parameters are illustratively IP addresses associated with a network layer of the TCP/IP stack for a wired network, such as wired computer network 130. Notably, the beacon frames 200 of the wireless network 100 may be utilized for two-way communication exchange on a per node basis for each node in the wired network 130. In this manner, each node and the AP exchange beacon frames as a form of two-way communication using the SSID field of the beacon frame as a communication payload.

According to an aspect of the technique, the beacon frames 200 may be encoded to communicate assigned network configuration parameters to the nodes 400 for use in the wired network 130, which is separate and apart from the wireless network 100. Each node 400 may advertise an identifier (e.g., a serial number of the node) encoded in the SSID 250 of a beacon frame 200 to the AP 110 of the wireless network 100. For more secure communication, the SSID field of the beacon frame may be encrypted. The AP may examine the identifier and, in response, inform the node 400 of its assigned network configuration by returning the beacon frame 200 with configuration parameters (e.g., IP address and VLAN tag) encoded in the SSID 250 of the frame.

In an embodiment, the wired network 130 is not established, i.e., not configured, and a node 400 advertises its SSID 250 (via the beacon frame 200) informing the AP 110 of its serial number and the fact that it is un-configured (has no IP address). The AP 110 may then encode the content of the SSID 250 of a return beacon frame to inform the node 400 of its assigned network configuration parameters (e.g., IP address and VLAN tag). That is, the AP returns a“handshake” frame to the node (identified by serial number) specifying the IP address assigned to the node, along with a VLAN tag. The node may then impose that network configuration upon itself, and transmit a confirmation beacon frame back to the AP 110, wherein the confirmation frame has the SSID encoded with the assigned IP address and VLAN tag. Upon examining the SSID of the received confirmation frame, the AP 110 may confirm (verify) that the node has imposed its IP address to match the specified network configuration; the AP may then proceed to configure a next node in the wired network 130 by encoding the SSID 250 of other return beacon frames 200. As a result, the wireless network 100 is used to initialize the network parameters of the wired network so that the nodes of the cluster are deployed to communicate on the operating network 130.

Notably, the SSID 250 may be encoded for an entirely different purpose than that for which it is intended in a typical wireless network, i.e., a static network identifier. Instead, according to the technique, the SSID encoding is used for a highly dynamic purpose of interactively configuring the nodes of the cluster for operation on the wired network. Moreover, the two-way communication handshake exchange between each node 400 and the AP 110 involves (i) a node 400 broadcasting a beacon frame 200 having the SSID 250 encoded with an identifier (e.g., serial number) of the node; (2) the AP 110 responding with a return beacon frame 200 having the SSID encoded with configuration parameters specifying an IP address and VLAN tag assigned to the node; (3) the node 400 receiving and imposing (i.e., deploying) the configuration parameters upon itself; and (4) the node 400 confirming the imposition of the configuration by transmitting a confirmation beacon frame having the SSID encoded with the assigned IP address and VLAN tag to enable the AP 110 to confirm imposition of the network configuration parameters at the node.

Notably, prior approaches that used SSID encoding to communicate information did so to typically configure a corresponding wireless network and/or interface and not to transmit information regarding other (e.g., wired) network interfaces. As described herein, the technique does not utilize SSID encoding to configure the wireless network 100 (i.e., a network corresponding to wireless interfaces of the nodes communicating with the AP) but as rather as a communication conduit (channel) to configure the wired network 130. That is, the encoded SSID 250 is used to configure the network (wired network 130) for cluster operation by using the beacon frames 200 of a different network (wireless network 100). Note that the configured node may employ the SSID to acknowledge and confirm receipt, and impose the configuration parameters, which are thereafter returned (i.e.,“echoed back”) to the AP via the SSID 250 of the beacon frame 200.

The AP 110 examines the SSID 250 to verify and record the imposed network configuration in a network configuration database, and proceeds to configuration of a next node of the wired network 130. The use of the encoded SSID beacon frames over the wireless network may be characterized as an out-of-band“configuration management plane” as opposed to the wired network“data plane.” Notably, the wireless network 100 is used primarily as a configuration plane for network configuration of the operational data network for the cluster. To avoid potential mischievousness (hacking) activity to the beacon frames, a key exchange mechanism may be used to encrypt the SSID values/content of the beacon frames.

Wired Network

In another aspect of the technique, the encoded beacon frames 200 may then be broadcast over the wired network 130 to advertise the assigned IP addresses of the nodes 400 to an administrative node of the wired network for discovery and verification purposes. In one or more embodiments, the administrative node may incorporate the AP 100, while in other embodiments, the administrative node may be embodied as a node. Each node 400 may be configured with one or more wired network interfaces and a wireless network interface. The SSID of the wireless network interface may be encoded with the assigned IP address of the wired network interface, thereby providing an efficient and convenient way for the administrator to determine (discover) the network configuration parameters assigned to the wired network interface of the node and then, if appropriate, reconfigure the node with changed parameters. That is, the wireless network acts as an initial configuration plane to“jump-start” configuration of wired network for deployment of the cluster by the administrator using the wired (or wireless) network. The wireless network interface may be a Wi-Fi adapter coupled to the node via a Universal Serial Bus

(USB) port (Wi-Fi dongle) such that the dongle can be removed from the node by the administrator once the IP address has been determined, i.e., the wired network having a sufficient initial configuration to enable further administration/control via the wired network.

Fig. 3 is a block diagram of the nodes 400 interconnected as a cluster 300 and configured to provide various services, such compute, storage and management services, for information, i.e., data and metadata, organized and stored on storage devices of the cluster. The nodes 400 may be interconnected by one or more cluster network switches 310 and include functional components that cooperate to provide a distributed, scale-out storage architecture of the cluster 300. The components of each node 400 include hardware and software functionality that enable the node to connect to and service one or more clients 320 over a computer network 130, as well as to a storage array 350 of storage devices, to thereby render the services in accordance with the distributed storage architecture.

Each client 320 may be embodied as a general-purpose computer configured to interact with the node 400 in accordance with a client/server model of information delivery. That is, the client 320 may request the services of the node 400, and the node may return the results of the services requested by the client, by exchanging packets over the network 130. The client may issue packets including file-based access protocols, such as the Network File System (NFS) and Common Internet File System (CIFS) protocols over the TCP/IP, when accessing information on the node in the form of storage objects, such as files and directories. However, in an

embodiment, the client 320 illustratively issues packets including block-based access protocols, such as the Small Computer Systems Interface (SCSI) protocol encapsulated over TCP (iSCSI) and SCSI encapsulated over FC (FCP), when accessing information in the form of storage objects such as logical units (LUNs).

Fig. 4 is a block diagram of a node 400 illustratively embodied as a computer system having one or more processing units (processors) 410, a main memory 420, a non-volatile random access memory (NVRAM) 430, one or more wired network interfaces 440 (having one or more ports 442), a wireless network interface 446 removably coupled via a USB interface 444, one or more storage controllers 450, and one or more cluster interfaces 460 interconnected by a system bus 480. Alternatively, the wireless network interface may be directly coupled to the system bus (i.e., an“on board” wireless network interface). The wired network interface 440 may include one or more ports adapted to couple the node 400 to the client(s) 320 over computer network 130, which may include point-to-point links, wide area networks, virtual private networks implemented over a public network (Internet) or a shared local area network. The network interface 440 thus includes the mechanical, electrical and signaling circuitry needed to connect the node to the network 130, which may embody an Ethernet network.

The main memory 420 may include memory locations that are addressable by the processor 410 for storing software programs and data structures associated with the embodiments described herein. The processor 410 may, in turn, include processing elements and/or logic circuitry configured to execute the software programs, such as compute service 222, data management service 424, and storage service 426, and manipulate the data structures. An operating system 425, portions of which are typically resident in memory 420 (in-core) and executed by the processing elements (e.g., processor 410), functionally organizes the node by, inter alia, invoking operations in support of the services implemented by the node. A suitable operating system 425 may include a general-purpose operating system, such as the UNIX® series, the Linux® operating system, the FreeBSD® operating system (and the like) or Microsoft Windows® series of operating systems, or an operating system with configurable functionality such as microkernels and embedded kernels. It will be apparent to those skilled in the art that other processing and memory means, including various computer readable media, may be used to store and execute program instructions pertaining to the embodiments herein.

The operating system 425 also includes a network protocol stack 426 for exchanging messages and/or other network traffic over the cluster and computer networks (wireless network 100 and wired network 130). Notably, each node 400 implements a network configuration service 490 for implementing the technique described herein, which utilizes the wireless beacon frames 200 generated by a data link layer of the network protocol (e.g., TCP/IP) stack 426 for the wireless network 100 to configure network parameters (e.g., IP addresses and VLAN tags) associated with a network layer of the TCP/IP protocol stack 426 for the wired network interfaces 440 of each node attached to the wired network 130.

The storage controller 450 cooperates with the services implemented on the node 400 to access information requested by the client 320. The information is preferably stored on storage devices such as solid state drives (SSDs) 470, illustratively embodied as flash storage devices, of storage array 350. In an embodiment, the flash storage devices may be block-oriented devices (i.e., drives accessed as blocks) based on NAND flash components, e.g., single-layer-cell (SLC) flash, multi-layer-cell (MLC) flash or triple-layer-cell (TLC) flash, although it will be understood to those skilled in the art that other block-oriented, non-volatile, solid- state electronic devices (e.g., drives based on storage class memory components) may be advantageously used with the embodiments described herein. The storage controller 450 may include one or more ports having I/O interface circuitry that couples to the SSDs 470 over an I/O interconnect arrangement, such as a conventional serial attached SCSI (SAS), serial ATA (SATA) topology, and Peripheral Component Interconnect (PCI) express.

Each cluster interface 460 may include one or more ports adapted to couple the node 400 to the other node(s) of the cluster 300. In an embodiment, a plurality of Ethernet ports (e.g., 10 Gbps) included in the one or more wired network interfaces may be used for intemode (or client) communication, although it will be apparent to those skilled in the art that other types of protocols and interconnects may be utilized within the embodiments described herein. The NVRAM 430 may include a back-up battery or other built-in last-state retention capability (e.g., non-volatile

semiconductor memory such as storage class memory) that is capable of maintaining data in light of a failure to the node and cluster environment.

The memory 220 may include a serial number 460 associated with the node and an SSID assignor module 462 to encode and assign an SSID for broadcast via the wireless network interface 446. The SSID includes a text size denoting a number of alphanumeric characters that may be encoded in the SSID field (e.g., as specified in the IEEE 802.11 specification). In an embodiment, the serial number 460 is a number that identifies the node vis-a-vis the other nodes of the cluster (i.e., the serial number is unique among the nodes of the cluster). Illustratively, the serial number 460 may correspond to a serial number tag or stamp on the node, or a media access control (MAC) address of a port 442 on the wired network interface 440. Notably, the serial number 460 may be stored in a first read-only memory unit while SSID assignor module 462 may be in a different memory unit such as a boot memory (not shown).

Illustratively, the SSID assignor module 462 can be an application, program, subroutine, function, or other logical unit of executable code (i.e., program instructions) that operates to assign an SSID to the wireless network interface 446 Notably, one or more SSIDs may be assigned to the wireless network interface for various different Wi-Fi radio frequencies (e.g., 2.4 GHz, 5GHz). Alternatively, a different SSID may be assigned for one or more of the wired network interfaces of the node at a same radio frequency, so that configuration of the node may proceed network interface-by-network interface in parallel.

Prior to cluster deployment (i.e., during cluster startup or initialization) or during reconfiguration, each network interface 440 may be assigned a default IP address (e.g., IPv4 address such as 192.168.9) using the Dynamic Host Configuration Protocol (DHCP), Automatic Private IP Addressing (APIPA), or other network address assignment protocol. Notably, the default IP address may or may not be a desired commissioned IP address to be deployed in the cluster and may not be known to the administrator or to other nodes. Accordingly, each node needs to be identified and configured (i.e., commissioned) for operation on the wired network. However, because self-discovery via the wired network may be difficult, protracted or impossible, the wireless network acting as a configuration plane may be used to discover and configure (and, in some embodiments, verify) the network interfaces (network ports) of the nodes for appropriate deployment. To that end, during startup the SSID assignor module 462 may configure the beacon transmitted from the wireless network adapter to encode the serial number in the SSID. Note that SSIDs are typically limited to a predefined number (e.g., 32 for IEEE 802.11 standard) of characters, which can be used to advertise a variety of information such as serial number, as well as IP address (IPv4, IPv6) and VLAN tag. As such, more information also may be encoded in the remaining text of the SSID, such as the assigned IP address (e.g., the default IP address) and VLAN tag for the one or more wired network adapters as well as other diagnostic information (e.g., product name and model). In this manner, each node and the AP exchange beacon frames as a form of two-way communication using the SSID field of the beacon frame as a communication payload.

The encoded content of the SSID 250 in the beacon frame 200 transmitted by the AP 110 may be highly dynamic in that the content may change as the AP rotates communication among various nodes of the wired network 130. Note that multiple SSIDs may be broadcast simultaneously to support concurrent communication of more than one node with the AP. Initially, the SSID content may be encoded to instruct each node as to the network configuration parameters it should impose and utilize on the wired network. That is, the AP may return network configuration parameters 465 to a node that advertises its serial number (via the SSID 250 of the beacon frame), instructing the node to configure itself according to the parameters, such as IP address and VLAN tag, encoded in the SSID field. Illustratively, the network configuration service may apply (i.e., impose) the network configuration parameters 465. The two-way communication can be effected between each node and the AP and, once initially configured, between those nodes (of the wired network) and the administrative node for discovery and/or reconfiguration purposes. The administrative node (as well as the AP) may create and use a database of serial numbers and assigned network configuration (IP address, VLAN tag) of nodes in the wired network for management configuration purposes.

As persons of skill in the art will recognize, the operations described above may be performed when a system is powered on, rebooted, and in response to the Wi Fi dongle (i.e., wireless network interface 446) being inserted into the USB port 444. As such, configuration may be trigger to occur for a portion of the cluster as small as a single node or for a portion as large as the whole cluster.

Note that one of the wired network interfaces 440 may be used as a management interface to the node once its IP address is discovered and identity recognized, while one or more other network interfaces may be used for data transfer to and from the node. In some aspects, the SSID assignor module 462 can select one of the multiple wired network interfaces and encode its IP address into the SSID of the wireless network interface 446. Illustratively, the selection is based on the function (i.e., management, data storage operations) of the wired network interface. For example, the SSID assignor module 462 may select the management wired network interface and encode its assigned IP address. Alternatively, the selection can be based on an order that the wired network interfaces are presented on the node. In alternative aspects, the SSID assignor module 462 can encode multiple IP addresses into the SSID of the wireless network interface.

The wired network interfaces 440 and wireless network interface 446 may be configured to operate differently with respect to data communication to and from the node so that communication is isolated between the networks. Illustratively, the wired network interfaces 440 may be configured to accept connections from other network devices (e.g., clients and other nodes) and allow data transfer to and from the node itself. In contrast, wireless network interface 446 may be configured such that network connections are not accepted and data transfer to and from the node 400 is restricted (e.g., prohibited) via wireless network interface 446. That is, the wireless network interface may be configured to employ a link layer of a network protocol stack (i.e., broadcast the SSID in a beacon frame), but may prevent communication using any higher layer of the network protocol stack (i.e., network software infrastructure) that would provide general data communications capability, e.g., via TCP/IP, via the wireless network interface 446. In this manner, security vulnerability of the nodes may be contained as the wireless network 100 on the nodes is configured to prevent TCP/IP layer communication and is restricted to link layer communication, e.g., based on SSID beacon communication. Further, communication via the link layer of the wireless network is confined to being used for configuration of the wired network and related diagnostic information. Notably the information encoded in the SSID 250 may be broadcast to the administrative node for configuration verification, discovery and/or reconfiguration purposes. As such, the information broadcast in the SSID provides an efficient and convenient way for the administrator to determine, verify and possibly change the network configuration parameters 465 assigned to the wired network interface 440 of the node. As noted, the wireless network interface 446 may be a Wi-Fi adapter coupled to the node via a USB port (Wi-Fi dongle) such that the Wi-Fi dongle can be removed from the node by the administrator once the IP address has been determined.

Diagnostic Locator

In another aspect of the technique, the information of the encoded beacon frames may be used for diagnostic location of a node in the cluster. In response to a failure or error related to a wired network interface 440 of a node (e.g., no IP address assigned), a visual indicator 448 (e.g., a light) may be programmed according to a particular visual pattern (e.g., three long blinks followed by two short blinks) for diagnostic purposes, so that the node 400 can be located. Accordingly, the SSID 250 may be programmed with an error code associated with the failure and a

corresponding pattern (e.g.,“3L2S” for 3 long, 2 short). In this manner, a particular node with a reported error may be specifically identified and located. Note that each node 400 having an error may employ a different pattern, so that multiple nodes may be located at the same time. In some aspects, the SSID 250 may start with a preamble. For example, the preamble can be an identifier of the maker or product name of the node. Thus, the SSID can be the preamble followed by the IP address in text form. For instance, assume that the maker of the node is“NetApp”, that the product is a hyper converged infrastructure (HCI) product, and that the IP address is 192.168.1.9. The SSID may be encoded as“NetApp HCI 192.168.1.9.”

Fig. 5 is a flow chart 500 illustrating example operations (e.g., diagnostic location) for setting the SSID of the beacon frame for the wireless network interface based on a network address of a network interface different from the wireless network interface, e.g., one or more of the wired network interfaces. These operations may be performed when a node is powered on or rebooted, when a wireless network interface dongle is inserted into a USB port, or at other points in time as may be considered desirable.

At block 502, the SSID assignor module attempts to determine a network address associated with a network interface. For example, the SSID assignor attempts to determine the IP address of one or more of the wired network interfaces present on the node. At decision block 504, the SSID assignor module checks if the attempt to determine (and obtain) the IP address of the wired network interface succeeded. If the SSID assignor module is able to obtain the IP address of the wired network interface, then flow proceeds to block 506. If the SSID assignor module was not able to obtain the IP address of the wired network interface, flow proceeds to block 508.

At block 506, the SSID assignor module encodes the IP address of the wired network interface into the SSID. As noted above, the IP address can be encoded into a portion or all of the text of the SSID. As indicated above, the SSID may start with an identifier of the maker of the node, followed by the IP address in text from. For example, assume that the maker of the node is“NetApp”, and that the IP address is 192.168.1.9. The SSID can be encoded as“NetApp 192.168.1.9.” Flow then proceeds to block 312.

Block 508 is reached if there was an error in obtaining the IP address of the wired network interface. At block 508, the SSID assignor attempts to determine the error. For example, the SSID assignor may receive an error code or other indicator that an IP address has not been assigned to the wired network interface. At block 510, the SSID assignor may encode the error code into some or all of the SSID. As an example, the SSID could be set to“IP Address Unavailable.” As noted above, the SSID can include an identifier of the maker of the node, for example, NetApp. Thus, an example SSID text string could be“NetApp - IP Address Unavailable.” Flow then proceeds to decision block 512.

Decision block 512 is reached from block 506 where the SSID has been set to the IP address of the wired network interface or from block 510 where the SSID has been set to indicate an error code or error message. At block 512, a check is made to determine if the indicator 448 is present on the node. If an indicator is not present, flow proceeds to block 518.

At block 514, the SSID assignor module determines a pattern for the indicator. For example, if the indicator 448 is a light (e.g., LED or other type of light) that can be programmatically turned on and off, the SSID assignor module 462 can determine a pattern for the on and off cycles. Note that different nodes may employ different indicator patterns, so that multiple nodes may be located at the same time.

At block 516, the pattern for the indicator can be encoded into the SSID. For example, if the indicator 448 is made to blink with three long blinks followed by two short blinks, the text“— ..” or“3L2S” (three long, two short) could be encoded into the SSID 250. Alternatively, the length of the period may be encoded into the SSID. For example,“5 SEC ON, 2 SEC OFF” could be encoded into the SSID to represent that the indicator would be turned on for five seconds and off for two seconds. In this way, the administrator can match the IP address or error message text to a particular location in a rack within a data center. Continuing with the example above where the IP address of the wired network interface is 192.16.1.9, the SSID may be“NetApp HCI 192.168.1.9

At block 518, the SSID assignor module can set the SSID for a wireless network interface on the computing device to be the SSID. The wireless network interface can then wirelessly transmit the SSID in beacon frames.

As will be appreciated from the above, the aspects of the disclosure provide an efficient and convenient way for a system administrator to determine IP addresses of newly installed nodes in the cluster, a data center or other collection of computing devices. In an embodiment a smart phone, table computer, laptop computer or other portable computing device having a wireless network interface may be used to scan for SSIDs being broadcast by the newly installed computing devices. A specialized application on the smart phone or other portable computing device may be used to scan the SSIDs, decode, report and/or interpret information in the SSID, such as the diagnostic information (e.g.,“3L2S”) and store the IP addresses encoded therein.

Once the IP addresses have been recorded, the wireless network interface dongle may be removed from the computing device.

Advantageously, the encoded content of the SSID in the beacon frame transmitted by the AP 110 may be highly dynamic in that the content may change as the AP rotates communication among various nodes 400 of the wired network 130. Initially, the SSID content may be encoded to instruct each node as to the network configuration parameters 465 it should impose and utilize on the wired network. That is, the AP may return network configuration parameters to a node that advertises its serial number (via the SSID of the beacon frame), instructing the node to configure itself according to the parameters, such as IP address and VLAN tag, encoded in the SSID field. Note that SSIDs are limited to a predefined number (e.g., 32) of characters, which can be used to advertise information such as serial number, as well as IP address (IPv4, IPv6) and VLAN tag. The two-way communication can be effected between each node and the AP and, once initially configured, between those nodes (of the wired network) and the administrative node for discovery and/or reconfiguration purposes. The administrative node (as well as the AP) may then create a database of serial numbers and assigned network configuration (IP address, VLAN tag) of nodes in the wired network for management configuration purposes.

The foregoing description has been directed to specific embodiments. It will be apparent, however, that other variations and modifications may be made to the described embodiments, with the attainment of some or all of their advantages. For instance, it is expressly contemplated that the components and/or elements described herein can be implemented as software encoded on a tangible (non-transitory) computer-readable medium (e.g., disks, electronic memory, and/or CDs) having program instructions executing on a computer, hardware, firmware, or a combination thereof. Accordingly this description is to be taken only by way of example and not to otherwise limit the scope of the embodiments herein. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the embodiments herein.

What is claimed is: