摘要:
A packet filter can be programmed by a remote controller to detect packets meeting a particular criterion and to report detection of these packets to the controller. The reports from the packet filter are collected and analyzed by the remote controller. A streams module that incorporates the packet filter is used within a Solaris operating system environment that has been enhanced to support an object framework. The streams module exports a programming interface to the packet filter defined in an interface definition language (IDL). The streams module can be pushed onto a network device in a similar fashion to other streams modules. The streams module responds to requests from one remote controller or to requests from more than one remote controller. These remote controller requests arrive as remote procedure call (RPC) requests on the IDL object references exported by the module. The packet filter within the streams module is fully programmable, and it collects and returns information to the controller through a call back object on the controller. The particular traces collected can be configured dynamically by the controller, by issuing RPC requests to the packet filters through the IDL interfaces. Alternately, a standard Solaris environment can be used. In such a case, a standard (i.e., non-object oriented) RPC approach is employed. Furthermore, the above approach will work with other UNIX systems that support stream modules. Moreover, because other operating systems have streams-like input/output capabilities, the approach can be extended to non-UNIX systems such as DOS, Windows NT, OS/2 Warp or the Macintosh operating system.
摘要:
A bit map is maintained by a provider object of a name server to keep track of names cached by a cache object of the client. The bit map is indexed by performing a hash of the name. When a name is looked up by the server on behalf of a client, the server hashes the name, and sets the bit in the bit map indexed by the result of the hash modulo the size of the bit map. The result of the hash is returned to the client and is stored with the entry in the cache. A bit "set" in the bit map indicates that the client caches at least one name that hashes into the bit. When the server invalidates a name, a hash of the name to be invalidated is used to find the corresponding bit in the bit mask. If the bit is set, the server sends an invalidation request to the client. The invalidation request includes the result of the hash, and the size of the provider's bit map. The client invalidates all entries that hash into the specified bit in the bitmap on the server. Alternatively, the invalidation request also includes the name to be invalidated and the client invalidates only the entry that matches the name.
摘要:
Transparent routing within the cluster is achieved (without changing the networking code on each node of the cluster) by using a pair of modules interposed appropriately on the networking stack. In a "clustered" system built out of several computers, using the present invention, the networking subsystem appears to applications as if the applications are running on a single computer. In addition, no modifications to the networking code is needed. The present invention is extensible to a variety of networking protocols, not just TCP/IP as the packet filter allows the routing within the cluster to be done dynamically. No modifications to the applications is needed (same binaries will work). A packet filter and remote communication between the modules through IDL enable the modules to do their job. A name server that maintains the port name space is used.
摘要:
In a computer system having a kernel supporting an interface definition language, a file system composed of an object framework. The object framework includes a set of proxy vnodes, a set of memcache vnodes, and a set of storage vnodes. The set of proxy vnodes and the set of memcache vnodes are linked to the set of storage vnodes through the use of the interface definition language, and the set of proxy vnodes are linked to the set of memcache vnodes through the use of a set of pointers. Each proxy vnode of said set of proxy vnodes is typed so as to differentiate between a set of file system objects such as files, directories and devices. The set of memcache vnodes forms an interface to a virtual memory system while the set of storage vnodes forms an interface to an underlying file system. The file system also uses a set of file paging interfaces that support extensions to the file system while providing full coherence of data.
摘要:
An apparatus to automatically adjust, in accordance with a set of user preferences, a computer display parameter, such as brightness or contrast, in response to ambient light conditions is described. The apparatus includes an ambient light sensor to obtain an ambient light signal. A mapping mechanism, connected to the ambient light sensor, maps the ambient light signal to a user preference value in a user preference table. Computer display control circuitry, connected to the mapping mechanism, then adjusts the selected computer display parameter of the computer display in response to the user preference value. A preferable embodiment of the invention includes colored light sensors that produce colored ambient light signals. The colored ambient light signals are mapped into colored preference tables. By adjusting the values in the colored preference tables, the image appearing on the computer display can be matched to a replica of the image printed on paper.
摘要:
One embodiment of the present invention provides a system that uses a centralized server to coordinate assigning identifiers in a distributed computing system. The system operates by receiving a request for a block of identifiers at the centralized server from a requesting node in the distributed computing system. In response to this request, the system selects a block of identifiers from a global pool of identifiers, and then marks the global pool of identifiers to indicate that the selected block of identifiers has been assigned. The system sends the selected block of identifiers to the requesting node in order to allow the requesting node to assign identifiers from the selected block of identifiers without having to communicate with the centralized server. In one embodiment of the present invention, upon receiving an indication that the selected block of identifiers is no longer being used by the requesting node, the system marks the global pool of identifiers to indicate that the selected block of identifiers is no longer assigned.
摘要:
A system and method are provided for ensuring delivery of a communication from one computer system or node to another. A first node includes an object handler, such as an ORB (Object Request Broker), that receives object references from higher-level services operating on the first node, wherein the referenced object resides on a second node. The first node's object handler generates a message to an object handler on the second node and attempts to send the message to the second node through a transport module. The message is assigned a unique identifier, such as a sequence number. If the first object handler receives an uncertain status concerning the message (e.g., other than a certain success or failure), it issues a query to the second node to determine if the message was received. If the query is received by the second object handler before the message itself is received, the message is considered lost or rescinded by the first node. The first node stores the identifier so that it will not be re-assigned to another message and the message is then re-sent with a different identifier. The second object handler notes the identifier and status of the rescinded message and will discard any message having that identifier that is received. The second node includes two or more data structures to track the status of communications sent from the first node. The first node, in addition to a collection of identifiers of lost messages, may also record the status of communications it attempts to send and may also note the identifiers of messages that could not be transmitted (e.g., because of communication link errors).
摘要:
A method and system for event notification is disclosed. In one implementation, the system includes at least one node, an event buffer, and a remote computing system. The node is configured to detect situations of interest on that node, and to generate events in response thereto. The node sends the events to the event buffer to be stored therein. The remote computing system is used to monitor the status of the node. The remote computing system obtains from a server a set of status information for the node, and displays the status information. The remote computing system then polls the event buffer for new events, and in response to detecting one or more new events, the remote computing system obtains from the server a set of updated status information for the node. The updated status information is then displayed to show the updated status of the node.
摘要:
One embodiment of the present invention provides a method and an apparatus that ensures proper semantics for operations when operations are restarted on a secondary server in the event of a failure of a primary server. This embodiment keeps a record on the secondary server of which operation currently has exclusive access to a shared resource. The method operates by receiving a message from the primary server indicating that a first operation on the primary server has acquired exclusive access to the shared resource. In response to this message, the system updates state information, at the secondary server, to indicate that the first operation has exclusive access to the shared resource and that any prior operations have completed their exclusive accesses to the shared resource. Upon receiving notification that the primary server has failed, the secondary server is configured to act as a new primary server. When the secondary server subsequently receives an operation retry request from a client of the primary server, it performs one of several operations. If the operation retry request is for the first operation, the system knows the first operation had exclusive access to the shared resource on the primary server. In this case, the secondary server acquires exclusive access to the shared resource, and completes the first operation. If the operation retry request is for a prior completed operation, the system returns to the client a saved result of the prior operation if the client has not received such saved result. Another embodiment of the present invention includes more that one secondary server.
摘要:
One embodiment of the present invention provides a system that facilitates establishing a quorum for a cluster of computers that are geographically distributed. The system operates by detecting a change in membership of the cluster. Upon detecting the change, the system forms a potential new cluster by attempting to communicate with all other computers within the cluster. The system accumulates votes for each computer successfully contacted. The system also attempts to gain control of a quorum server located at a site separate from all computers within the cluster. If successful at gaining control, the system accumulates the quorum server's votes as well. If the total of accumulated votes is a majority of the available votes, the system forms a new cluster from the potential new cluster.