Abstract:
There is disclosed a system and method for allocation of mainframe computing resources using distributed computing. In particular, the present application is directed to a system whereby a mainframe process intended for execution on a metered processor may be identified as executable on a non-metered processor. Thereafter, the mainframe computer may initiate execution of the remote process on the remote non-metered processor. If necessary, high-speed access to data available to the metered processor is provided to the non-metered processor. The process operates directly on data available to the metered processor. Once completed, the process signals the mainframe computer that the process is complete. Both metered and non-metered processor configuration and management may be accomplished using the administrative interface.
Abstract:
A method to maintain write operation atomicity where a write operation crosses a data storage medium track boundary. The method supplies a storage controller comprising a host adapter, a processor, and a NVS. The primary host adapter receives from a host computer a write request and data. The method determines if the write request will cross a data storage medium track boundary. If the write request will cross a data storage medium track boundary, the method indicates to the host adapter that the write request comprises a two-track transfer, and writes the data to the primary NVS as the data is received. If the host computer fails prior to providing all the data to the storage controller, the method discards the data written to the NVS to ensure write operation atomicity.
Abstract:
A method for performing a data exchange between an initiator and a receiver in a fibre channel protocol (FCP) is provided. A control flag is set in a write command to indicate the presence of an identifier. The identifier is copied into a command descriptor block (CDB) of the write command and appended to a data frame. The write command and data frame, including the identifier, is sent from the initiator to the receiver.
Abstract:
Provided are a system and article of manufacture for bidirectional data transfer. In certain embodiments a link layer login is sent from a first port to a second port. Subsequently, an application layer login is sent from the first port to the second port to establish a first data path, wherein the first data path is from the first port to the second port. Subsequently, another application layer login is sent from the second port to the first port to establish a second data path, wherein the second data path is from the second port to the first port. In certain other embodiments, a first data path is established from a first port to a second port. A determination is made at the first port, whether the second port has a second data path established from the second port to the first port. An application layer logout is sent from the first port to the second port, in response to determining that the second port has the second data path established from the second port to the first port. The first data path is terminated from the first port to the second port in response to receiving the application layer logout at the second port.
Abstract:
A system and a method of operating the system for non-disruptively inserting a node into the operations of an ATM ring uses the ring operations to update topology information and routing tables at the existing nodes to include therein the new node and one or more virtual paths associated with the new node. Basically, the node to be inserted establishes communications with a ring hub node over an established intra-ring management channel. The node and the ring hub node then exchange information over the management channel and the node performs its initializing routines in order that the node may operate to pass through traffic on the existing virtual paths. The new node next requests from the hub node the assignment of one or more virtual paths for directing traffic between that node and other nodes on the network. In response to the request, the hub node assigns one or more virtual paths to the requesting node and establishes a signaling channel to the node over one of the virtual paths. The hub node also notifies the other nodes of the assignment, and downloads to the new node routing tables that include the established connections over the existing virtual paths. The node may then participate in traffic shaping on existing virtual circuits, and also in call set up and call tear down operations over its assigned virtual paths in the same manner as the other nodes on the ring. A failed, or otherwise inoperative, node is removed from the ring without disrupting the traffic on the ring by essentially reversing the node insertion operations. After learning of the node failure, the hub node instructs the operative nodes to tear down the virtual path and associated virtual circuits that originate from or end at the failed node. Thereafter, the hub node directs the nodes to update their ring topology information to remove the failed node. In the meantime, the nodes continue to maintain the other virtual path and virtual circuit connections over the ring without disruption. When the failed node is later re-booted, the system follows the steps discussed above to re-insert the node, without disrupting the traffic on the ring.
Abstract:
Conversion devices and methods for converting a chassis style rifle to function as a traditional bolt style rifle. The conversion device includes a conversion component that attaches to a standard or modified standard lower receiver of a rifle to allow the rifle to remain capable of being used as either a chassis gun or standard rifle configuration as desired by the operator. The conversion component may attach to the magazine well of the rifle. The conversion component is removably installable on the lower receiver, and accessories, such as a forearm or handguard, may be removably attached to a conversion component and are supported by the lower receiver. The configuration eliminates the need to contact the upper receiver during the act of firing a shot, particularly for gripping with the off-hand or resting on separate shooting accessories. The accuracy and precision of the rifle are enhanced.
Abstract:
Various embodiments provide systems and methods for migrating data. One system includes a small computer system interface logical unit number (SCSI LUN) configured to store protected data, a processor, and memory configured to store a peer-to-peer remote copy (PPRC) application. The processor is configured to execute the PPRC application to modify the protection in transmitted data and received data. One method includes receiving unprotected data, utilizing a PPRC application to add protection to the data to generate protected data, and storing the protected data in a protected SCSI LUN. Another method includes receiving, at a protected SCSI LUN, a request to transmit protected data, utilizing a PPRC application to strip the protection from the protected data to generate unprotected data, and transmitting the unprotected data to an unprotected SCSI LUN.