会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 24. 发明授权
    • Direct migration of software images with streaming technique
    • 使用流技术直接迁移软件图像
    • US09086892B2
    • 2015-07-21
    • US13882247
    • 2011-11-03
    • Jacques FontignieClaudio MarinelliPaolo ScottonMarc Vuilleumier Stueckelberg
    • Jacques FontignieClaudio MarinelliPaolo ScottonMarc Vuilleumier Stueckelberg
    • G06F9/44G06F9/445
    • G06F9/4401G06F8/63
    • A mechanism is provided for migrating a software image installed on a source data-processing entity to a target data-processing entity. The target data-processing entity is booted from a preliminary bootstrap program. The software image is mounted as a remote mass memory on the target data-processing entity. A primary bootstrap program of the software image is copied onto a local mass memory of the target data-processing entity. The target data-processing entity is re-booted from the primary bootstrap program thereby loading a streaming function, and serving each request of accessing a memory block on the target data-processing entity by the streaming function. In response to the memory block missing from the local mass storage, the streaming function downloads the memory block from the software image and stores the memory block into the local mass memory. Otherwise, the streaming function retrieves the memory block from the local mass memory otherwise.
    • 提供了一种用于将安装在源数据处理实体上的软件映像迁移到目标数据处理实体的机制。 目标数据处理实体从初步引导程序启动。 该软件映像作为远程大容量存储器安装在目标数据处理实体上。 将软件映像的主引导程序复制到目标数据处理实体的本地大容量存储器中。 目标数据处理实体从主引导程序重新启动,从而加载流传输功能,并通过流传输功能为目标数据处理实体提供访问存储块的每个请求。 响应于本地大容量存储器丢失的存储器块,流式传输功能从软件映像下载存储器块,并将存储器块存储到本地大容量存储器中。 否则,流功能从本地批量存储器中检索内存块。
    • 26. 发明授权
    • PNNI topology abstraction
    • PNNI拓扑抽象
    • US06614762B1
    • 2003-09-02
    • US09364443
    • 1999-07-30
    • Ilias IlliadisPaolo Scotton
    • Ilias IlliadisPaolo Scotton
    • G01R3108
    • H04Q11/0478H04L2012/5621
    • Scheme for the computation of a restrictive cost between pairs of border nodes of a PNNI peer group. A list of said links sorted according to their restrictive cost C is maintained. Logical sets of nodes are formed by taking one link after the other from said list starting with the cheapest cost C and assigning an identifier to the two nodes connected by the respective link, whereby the nodes of a set of nodes carry a dominant unique identifier if a border node is a member of the respective set, or a unique identifier if there is no border node being a member of the respective set. Sets are united if a link connects a node of a first set and a node of a second set, by assigning a dominant unique identifier to all nodes of both sets if either nodes of the first or the nodes of the second set carry a dominant unique identifier, or by assigning a unique identifier to all nodes of both sets if neither the nodes of the first nor the nodes of the second set carry a dominant unique identifier. A Matrix update algorithm is applied if the link connects a node of a first set and a node of a second set that both already carry dominant unique identifiers.
    • 计算PNNI对等组的边界节点对之间的限制性成本的方案。 维护根据其限制成本C分类的所述链接的列表。 通过以最便宜的成本C开始,从所述列表中以一个接一个地从所述列表中取出一个链路来形成逻辑的节点集合,并且向由相应链路连接的两个节点分配一个标识符,由此一组节点的节点携带一个主要的唯一标识符,如果 边界节点是相应集合的成员,或者如果没有边界节点是相应集合的成员,则是唯一标识符。 如果链路连接第一集合的节点和第二集合的节点,则通过将主要唯一标识符分配给两个集合的所有节点,如果第二集合的第一节点或第二集合的节点中的任一个节点携带主导唯一标识符 标识符,或者通过为两个集合的所有节点分配唯一标识符,如果第二集合的第一个节点和第二个节点的节点都不具有主导的唯一标识符。 如果链路连接第二组的节点和第二组的节点,它们都已经携带显着的唯一标识符,则应用矩阵更新算法。
    • 27. 发明授权
    • Detectable of intrusions containing overlapping reachabilities
    • 可检测到包含重叠可达性的入侵
    • US06487204B1
    • 2002-11-26
    • US09310273
    • 1999-05-12
    • Marc DacierPaolo Scotton
    • Marc DacierPaolo Scotton
    • H04L1256
    • H04L63/1408H04L2012/5621H04Q11/0478
    • In an ATM network operating in accordance with PNNI standards, the operation of a switch is divided into two phases, a learning mode phase and an active mode phase. During learning mode phase, each time a reachability is received from a sending switch, the reachability is recorded in the database of the receiving switch and the received reachability is sent to other switches in the same peer group. At the end of the learning mode phase, the database of each of the switches contains the reachabilities advertised by all the switches of the peer group during the learning mode group phase. On a termination of the learning mode, the switches enter the active mode phase. During the active mode, each time a reachability is received from a sending switch, the receiving switch checks to see if the reachability has been advertised in the past by that sending switch. If it has, the reachability is considered to be valid and the receiving switch waits for the next reachability. On the other hand, if the particular reachability has never been announced before the sending node, it is compared to the reachability in the database for all other nodes of the peer group. If the reachability causes the reachability from other node to be overlapped and the overlapping is suspicious, then an alarm is raised.
    • 在根据PNNI标准操作的ATM网络中,开关的操作被分为两个阶段:学习模式阶段和活动模式阶段。 在学习模式阶段,每当从发送交换机接收到可达性时,可达性被记录在接收交换机的数据库中,并且接收到的可达性被发送到同一对等体组中的其他交换机。 在学习模式阶段结束时,每个交换机的数据库包含在学习模式组阶段期间对等体组的所有交换机发布的可达性。 在学习模式终止时,开关进入活动模式阶段。 在活动模式期间,每当从发送交换机接收到可达性时,接收交换机检查是否由该发送交换机过去通告了可达性。 如果有的话,可达性被认为是有效的,并且接收交换机等待下一个可达性。 另一方面,如果在发送节点之前从未公布特定可达性,则将其与对等组的所有其他节点的数据库的可达性进行比较。 如果可达性导致来自其他节点的可达性重叠,重叠可疑,则会发出警报。