摘要:
A system includes at least a user and a file system connected to the user through a network. An estimated write size of a write operation of the user into the file system is managed as an accumulated value. The timing of judging the limit of the disk usage amount is specified from the accumulated value and a predetermined threshold value, and the limit of the disk usage amount is judged at the specified timing, so that disk usage amount by a user may be limited and managed.
摘要:
In order to execute a flow control and a congestion control in a hop-by-hop manner in a data communication among computers connected to different networks, in a data communication between a client A1 and a remote server B, a communication proxy of the remote server B is located in a local server A in an LAN to which the client A belongs. A communication packet to be routed to the remote server B is stolen (received) and passed to a transport layer. A TCP communication between the client A1 and the remote server B is divided into two; a communication between the client A1 and the communication proxy of the remote server B and a communication between the communication proxy of the remote server B and the remote server B.
摘要:
A system includes at least a user and a file system connected to the user through a network. An estimated write size of a write operation of the user into the file system is managed as an accumulated value. The timing of judging the limit of the disk usage amount is specified from the accumulated value and a predetermined threshold value, and the limit of the disk usage amount is judged at the specified timing, so that disk usage amount by a user may be limited and managed.
摘要:
Disclosed here is a simulator for simulating the propriety of each created policy less-expensively and fast in an autonomic management system controlled by a policy. The simulator that analyzes the behavior of the above described autonomic management system that receives information inputs of system configuration, load balance setting, system load conditions, software performance, software's transitional performance, and target autonomic management policy to calculate the system behavior (resource utilization rate, software response time, and system throughput) by giving consideration to the system's transitional behavior at a time, then apply an autonomic management policy to the behavior, determine the system configuration and load balance setting at the next time, and use the new system configuration and load balance setting for the next time simulation.
摘要:
A system and method for virtualizing a new network storage additionally installed and an existing network storage as a single file system by inheriting a directories tree structure from the existing network storage, wherein a virtualizing system of the new network storage has the function of reading out setup information of the existing network storage according to an expansion request from the administrator, registering the existing network storage as a member of the virtualizing system, copying a directories tree structure of the existing network storage, and swapping setup information of the existing network storage and that of he new network storage with each other.
摘要:
Changes such as addition or removal of a device in a system composed of a number of devices are automatically detected and the physical location of the devices is managed. A management method of this invention includes a step (S502) of detecting the physical location of servers (S1 through S3) connected to a network switch (2) that is to be monitored, steps (S512 and S513) of collecting a globally unique MAC address which is unique to equipment of the servers (S1 through S3) connected to the network switch (2) and is not shared by the equipments, and a step (S517) of creating configuration information from the MAC address and from the physical connection location of the network switch (2).
摘要:
A system includes at least a user and a file system connected to the user through a network. An estimated write size of a write operation of the user into the file system is managed as an accumulated value. The timing of judging the limit of the disk usage amount is specified from the accumulated value and a predetermined threshold value, and the limit of the disk usage amount is judged at the specified timing, so that disk usage amount by a user may be limited and managed.
摘要:
Changes such as addition or removal of a device in a system composed of a number of devices are automatically detected and the physical location of the devices is managed. A management method of this invention includes a step (S502) of detecting the physical location of servers (S1 through S3) connected to a network switch (2) that is to be monitored, steps (S512 and S513) of collecting a globally unique MAC address which is unique to equipment of the servers (S1 through S3) connected to the network switch (2) and is not shared by the equipments, and a step (S517) of creating configuration information from the MAC address and from the physical connection location of the network switch (2).
摘要:
A system having at least a user and a file system connected to the user through a network is disclosed, in which an estimated write size of the user into the file system is managed as an accumulated value, the timing of judging the limit of the disk usage amount is specified from the accumulated value and a predetermined threshold value, and the limit of the disk usage amount is judged at the specified timing.
摘要:
In order to execute a flow control and a congestion control in a hop-by-hop manner in a data communication among computers connected to different networks, in a data communication between a client A1 and a remote server B, a communication proxy of the remote server B is located in a local server A in an LAN to which the client A belongs. A communication packet to be routed to the remote server B is stolen (received) and passed to a transport layer. A TCP communication between the client A1 and the remote server B is divided into two; a communication between the client A1 and the communication proxy of the remote server B and a communication between the communication proxy of the remote server B and the remote server B.