会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method and apparatus for reliably choosing a master network manager during initialization of a network computing system
    • 在网络计算系统的初始化期间可靠地选择主网络管理器的方法和装置
    • US06941350B1
    • 2005-09-06
    • US09692346
    • 2000-10-19
    • Giles Roger FrazierGregory Francis PfisterSteven Mark ThurberDono Van-Mierop
    • Giles Roger FrazierGregory Francis PfisterSteven Mark ThurberDono Van-Mierop
    • G06F15/16G06F15/173
    • G06F15/17375H04L63/061
    • A method in a node within network computing system for selecting a master network manager, wherein the first node is associated with a first priority. Requests are sent to the network computing system to discover other nodes within the network computing system. A second priority from the request is identified in response to receiving a response to one of the requests from another node within the network computing system. The first node shifts to a standby mode if it discovers a master subnet manager or the second priority is higher than the first priority. The first node shifts to a master mode if a response containing a priority higher than the first priority is absent in responses received by the first node and the first node has completed checking all other nodes in the network computing system. In the case where the priority received is equal, the comparison is further made on the globally unique identifier which is received from the same node, in which case the node with the lowest globally unique identifier wins the arbitration.
    • 网络计算系统内用于选择主网络管理器的节点中的方法,其中所述第一节点与第一优先级相关联。 将请求发送到网络计算系统以发现网络计算系统内的其他节点。 响应于响应于来自网络计算系统内的另一个节点的一个请求的响应来识别来自请求的第二优先级。 如果发现主子网管理器或第二优先级高于第一优先级,则第一节点转移到待机模式。 如果在由第一节点接收的响应中缺少包含高于第一优先级的优先级的响应,则第一节点转移到主模式,并且第一节点已经完成了对网络计算系统中的所有其他节点的检查。 在接收到的优先级相等的情况下,进一步对从同一节点接收到的全局唯一标识符进行比较,在这种情况下,具有最低全局唯一标识符的节点赢得仲裁。
    • 3. 发明授权
    • Method and system for reliably defining and determining timeout values in unreliable datagrams
    • 用于在不可靠数据报中可靠地定义和确定超时值的方法和系统
    • US06748559B1
    • 2004-06-08
    • US09692349
    • 2000-10-19
    • Gregory Francis PfisterGiles Roger FrazierDanny Marvin NealSteven Mark Thurber
    • Gregory Francis PfisterGiles Roger FrazierDanny Marvin NealSteven Mark Thurber
    • G06F1100
    • H04L41/00H04L41/046H04L41/0806H04L41/082H04L41/12H04L43/0852
    • A method for managing allocation of network resources within the distributed computer system is provided. Specifically, the network traversal time and the end node response time for requests and/or packets being routed in a switch-connected system area network are utilized to determine the total round trip time for completion of the particular network operation. The sum of the timeout values for all switches that participate in routing the request from a requester (source) to the receptor node (target) is provided to the requester's channel adapter (CA). The time-out values are provided by the switch manufacturer and are sent to a network Subnet Manager (SM) via SM packets (SMP). The timeout values added together represent the SubnetTimeout. The time-out value of the target channel adapter (CA), the ResponseTime, is also provided to the requester. The requester then utilizes one of two timeout equations to calculate the overall response time required for the request to be completed. A timer is started and the elapsed time to complete the request is monitored and compared with the overall response time calculated. When the timer expires before a response is received at the requester, the operation is assumed to have failed and the network resources being utilized by the request may be reallocated to another network operation.
    • 提供了一种管理分布式计算机系统内网络资源分配的方法。 具体地,利用在交换机连接的系统区域网络中路由的请求和/或分组的网络遍历时间和终止节点响应时间来确定完成特定网络操作的总往返时间。 参与将请求从请求者(源)路由到接收节点(目标)的所有交换机的超时值的总和提供给请求者的信道适配器(CA)。 超时值由交换机制造商提供,并通过SM数据包(SMP)发送到网络子网管理器(SM)。 添加的超时值表示SubnetTimeout。 目标通道适配器(CA)的超时值ResponseTime也提供给请求者。 然后,请求者使用两个超时方程之一来计算请求完成所需的总体响应时间。 启动定时器,并监视完成请求的经过时间,并与计算的总响应时间进行比较。 当定时器在请求者接收到响应之前到期时,假设该操作已经失败,并且该请求所利用的网络资源可能被重新分配到另一个网络操作。
    • 6. 发明授权
    • Method and system for choosing a queue protection key that is tamper-proof from an application
    • 从应用程序中选择防篡改的队列保护密钥的方法和系统
    • US06851059B1
    • 2005-02-01
    • US09692353
    • 2000-10-19
    • Gregory Francis PfisterRenato John RecioDanny Marvin NealSteven Mark Thurber
    • Gregory Francis PfisterRenato John RecioDanny Marvin NealSteven Mark Thurber
    • H04L9/00H04L29/06
    • H04L63/06
    • A method for enabling a Q_key that is tamper proof from applications on a distributed computer system to protect selected network operations is provided. Applications and an operating system (OS) execute on the end nodes and each may access various network resources. In the invention, the network resources are configured for selective access by particular applications or OS.In a preferred embodiment, a control bit of a Q_key, which allows applications to authenticate their use of particular communication resources, i.e., the send and receive queues, is reserved and utilized to signal whether a particular application is allowed access to the resources. Setting the control bit to 0 allows the Q_key to be set by an application directly. When the control bit is set to 1, the Q_key cannot be set by an application and can only be set using a privileged operation performed only by the OS.
    • 提供了一种用于启用防止来自分布式计算机系统上的应用程序的防篡改的Q_key以保护所选网络操作的方法。 应用和操作系统(OS)在终端节点上执行,每个可以访问各种网络资源。 在本发明中,网络资源被配置用于特定应用或OS的选择性访问。在优选实施例中,Q_key的控制位允许应用程序认证其对特定通信资源的使用,即发送和接收队列, 被保留并用于发出特定应用是否被允许访问资源。 将控制位设置为0允许应用程序直接设置Q_key。 当控制位设置为1时,Q_key不能由应用程序设置,只能使用仅由操作系统执行的特权操作进行设置。
    • 7. 发明授权
    • Systems and arrangements to adjust resource accessibility based upon usage modes
    • 基于使用模式调整资源可访问性的系统和安排
    • US07657945B2
    • 2010-02-02
    • US11070053
    • 2005-03-02
    • Thomas M. BreyGiles Roger FrazierGregory Francis PfisterWilliam J. Rooney
    • Thomas M. BreyGiles Roger FrazierGregory Francis PfisterWilliam J. Rooney
    • G06F7/04H04L9/32
    • H04L63/06H04L9/083H04L63/105
    • Systems and arrangements to adjust resource accessibility based upon usage modes are contemplated. Embodiments may include a supervisor instance such as an operating system that is adapted to select one or more supervisor keys from a set of supervisor keys available to the host node or platform upon which the supervisor instance is operating. The supervisor instance may select the supervisor key(s) based upon an association of the supervisor instance with a usage mode represented by a supervisor key name. In many embodiments, supervisor key names may be associated with resources via with one or more of the supervisor keys based upon the resources needed when operating in the usage modes by a system administrator. Once the supervisor instance is initialized, the supervisor instance may issue client keys that allow access to subsets of the resources available to the supervisor instance based upon usage modes of the clients.
    • 考虑了基于使用模式来调整资源可访问性的系统和布置。 实施例可以包括诸如操作系统的管理程序实例,该操作系统适于从主管节点或平台上可用的一组管理程序密钥选择一个或多个管理程序密钥,主管节点或平台正在其上运行。 主管实例可以基于主管实例与由主管密钥名称表示的使用模式的关联来选择主管密钥。 在许多实施例中,基于由系统管理员在使用模式下操作时所需的资源,管理员密钥名称可以通过一个或多个管理员密钥与资源相关联。 一旦管理程序实例被初始化,管理程序实例可以发布客户端密钥,其允许基于客户端的使用模式来访问可用于管理程序实例的资源的子集。
    • 8. 发明授权
    • Method and apparatus for grouping data for transfer according to recipient buffer size
    • 用于根据接收者缓冲区大小分组用于传送的数据的方法和装置
    • US06898638B2
    • 2005-05-24
    • US09758737
    • 2001-01-11
    • Giles Roger FrazierGregory Francis PfisterRenato John Recio
    • Giles Roger FrazierGregory Francis PfisterRenato John Recio
    • G06F13/00G06F15/16G06F15/17H04L12/28H04L12/56H04L13/08H04L29/08
    • H04L67/1097H04L47/266H04L47/30
    • A method, apparatus, and computer implemented instructions for transferring data. A request is sent by a requester to a responder. The request includes an amount of available processing space at the requestor. When the request is received from the responder, data is identified using the request. The data is placed into a plurality of subsequences of data packets for transfer to the requester, wherein each packet within the set of subsequences hold data in amount less than or equal to the amount of available space. These subsequences are then sent to the requestor one subsequence at a time. A new subsequence is sent each time the available processing space at the requester becomes free to process data from another subsequence. The requestor receives a subsequence from the plurality of subsequences in response to the request each time the amount of available processing space is free, wherein data within each of the set of subsequences fits within the amount of available processing space.
    • 一种用于传送数据的方法,装置和计算机实现的指令。 请求者向请求者发送请求。 该请求包括请求者可用的处理空间量。 当从响应者接收到请求时,使用该请求来识别数据。 将数据放入数据分组的多个子序列中,以传送到请求者,其中该子序列集合内的每个分组保持小于或等于可用空间量的数据。 然后,这些子序列一次发送到请求者一个子序列。 每当请求者的可用处理空间自由地处理来自另一子序列的数据时,新的子序列被发送。 每当可用处理空间的数量是空闲时,请求者响应于该请求从多个子序列中接收子序列,其中每组子序列中的数据适合可用处理空间的量。
    • 9. 发明授权
    • System and method for simultaneously establishing multiple connections
    • 同时建立多个连接的系统和方法
    • US07165110B2
    • 2007-01-16
    • US09903725
    • 2001-07-12
    • Danny Marvin NealGregory Francis PfisterRenato John Recio
    • Danny Marvin NealGregory Francis PfisterRenato John Recio
    • G06F15/16G06F11/30G06F12/14H04L9/32H04L9/00
    • H04L29/06H04L69/14H04L69/22Y02D50/30
    • A system and method for establishing multiple connections using a private data field of a communication management protocol is provided. With the present invention, a Service ID identifies a specific consumer and the private data field contains a list of connection attributes for each connection that is to be established. An active side requests a connection and the passive side replies to the connection request. The active side sends the passive side a connection establishment request. This connection establishment request includes a Service ID which identifies a passive side process associated with a service. This connection establishment request also includes communication attributes of one or more connected services and datagram services associated with the Service ID. The passive passes the connection request to a process associated with the service. If the passive side process does not wish to carry out the service, a negative reply message is returned to the active side. If the passive side process does wish to carry out the service, a positive reply is returned to the active side and the reply includes the communication attributes for the connection and unreliable services associated with the Service ID used in the connection establishment request.
    • 提供了一种使用通信管理协议的私有数据字段建立多个连接的系统和方法。 利用本发明,服务ID标识特定消费者,并且专用数据字段包含要建立的每个连接的连接属性的列表。 主动端请求连接,被动方回复连接请求。 主动端将被动方发送连接建立请求。 该连接建立请求包括识别与服务相关联的被动侧进程的服务ID。 该连接建立请求还包括与服务ID相关联的一个或多个连接的服务和数据报服务的通信属性。 被动将连接请求传递给与服务关联的进程。 如果被动侧进程不希望执行该服务,则将一个否定的回复消息返回到主动端。 如果被动侧进程确实希望执行该服务,则肯定的答复返回到主动侧,并且回复包括用于连接的通信属性和与在连接建立请求中使用的服务ID相关联的不可靠服务。