Exploiting cluster awareness infrastructure through internet socket based applications
    51.
    发明授权
    Exploiting cluster awareness infrastructure through internet socket based applications 有权
    通过基于互联网套接字的应用程序来利用群集意识基础设

    公开(公告)号:US08805958B2

    公开(公告)日:2014-08-12

    申请号:US13600344

    申请日:2012-08-31

    CPC classification number: H04L69/08 H04L69/32

    Abstract: Provided are techniques related generally to computer communication and, more specifically, to techniques that provide legacy applications with access to a cluster infrastructure. A pseudo interface layer provides applications with internet protocol (IP) family sockets access to cluster awareness protocols in a manner that may be transparent to both the application and the cluster awareness layer of a kernel.

    Abstract translation: 提供了与计算机通信相关的技术,更具体地说,涉及向遗留应用提供对集群基础设施的访问的技术。 伪接口层为互联网协议(IP)系列套接字提供应用程序,以对内核的应用程序和群集感知层可能是透明的方式访问群集感知协议。

    Endpoint-to-endpoint communications status monitoring

    公开(公告)号:US08634328B2

    公开(公告)日:2014-01-21

    申请号:US12959556

    申请日:2010-12-03

    CPC classification number: H04L41/5038 H04L43/062 H04L43/0811

    Abstract: Communication ability between nodes in a cluster-based computer system is tracked to inform applications executing on the nodes of the existence and quality of the endpoint-to-endpoint communications available between the nodes. Communications between a node and other nodes are tracked, and a database records the communication ability between the node and the other nodes for each link between the nodes. The tracking and recording are repeated at the other nodes. A registration by an application executing at a particular one of the nodes to receive notifications of changes in the communication ability with another node over a particular link (or in general) will cause notification of the application when the link status changes.

    Creating a checkpoint for modules on a communications stream
    53.
    发明授权
    Creating a checkpoint for modules on a communications stream 失效
    为通信流上的模块创建检查点

    公开(公告)号:US08527650B2

    公开(公告)日:2013-09-03

    申请号:US11751482

    申请日:2007-05-21

    CPC classification number: G06F11/1438

    Abstract: A computer implemented method, computer program product, and system for creating a checkpoint of a stream. A stream checkpoint request to create the checkpoint of the stream is received, wherein the stream is used by a process as a communications path, and wherein the communications path is modified by a set of modules. In response to identifying the identity of each module in the set of modules, the identity of each module in the set of modules is stored in the checkpoint. In response to identifying an order of the set of modules, the order of the set of modules is stored in the checkpoint. In response to sending a stream checkpoint message to each module in the set of modules, module data is received from each module in the set of modules to form received module data. The received module data is stored in the checkpoint.

    Abstract translation: 用于创建流的检查点的计算机实现的方法,计算机程序产品和系统。 接收到用于创建流的检查点的流检查点请求,其中流被进程用作通信路径,并且其中通信路径由一组模块修改。 响应于识别模块集合中的每个模块的身份,模块集合中的每个模块的身份存储在检查点中。 响应于识别该组模块的顺序,该组模块的顺序被存储在检查点中。 响应于向该组模块中的每个模块发送流检查点消息,从模块集合中的每个模块接收模块数据以形成接收到的模块数据。 接收的模块数据存储在检查点中。

    ON-DEMAND PAGING-IN OF PAGES WITH READ-ONLY FILE SYSTEM
    54.
    发明申请
    ON-DEMAND PAGING-IN OF PAGES WITH READ-ONLY FILE SYSTEM 审中-公开
    用只读文件系统的页面分页

    公开(公告)号:US20130007409A1

    公开(公告)日:2013-01-03

    申请号:US13543581

    申请日:2012-07-06

    CPC classification number: G06F12/1072

    Abstract: Disclosed is a computer implemented method to resume a process at an arrival machine that is in an identical state to a frozen process on a departure machine. The arrival machine receives checkpoint data for the process from the departure machine. It creates the process. It updates a page table, wherein the page table comprises a segment, page number, and offset corresponding to a page of the process available from a remote paging device, wherein the remote paging device is remote from the arrival machine. It resumes the process and responsively generates a page fault for the page. It looks up the page in the page table, responsive to the page fault. It determines whether the page is absent in the arrival machine. It transmits a page-in request to the departure machine, responsive to a determination that the page is absent. It receives the page from the departure machine.

    Abstract translation: 公开了一种计算机实现的方法,用于在到达机器处恢复与出发机器上的冻结过程处于相同状态的过程。 到达机器从出发机接收过程的检查点数据。 它创建的过程。 它更新页表,其中页表包括对应于从远程寻呼设备可用的过程的页面的段,页码和偏移,其中远程寻呼设备远离到达机器。 它恢复该过程,并响应地为页面生成页面错误。 它会在页面表中查找页面,以响应页面错误。 它确定到达机器中页面是否不存在。 响应于确定页面不存在,它向出发机器发送寻呼请求。 它从出发机接收页面。

    INTER-NODE COMMUNICATION SCHEME FOR NODE STATUS SHARING
    55.
    发明申请
    INTER-NODE COMMUNICATION SCHEME FOR NODE STATUS SHARING 有权
    节点状态共享的内部通信方案

    公开(公告)号:US20120203899A1

    公开(公告)日:2012-08-09

    申请号:US13425764

    申请日:2012-03-21

    CPC classification number: H04L43/10 H04L43/0817

    Abstract: A gossiping scheme for sharing node status in a cluster of nodes provides a robust mechanism for determining node status within the cluster. Nodes transmit gossip messages to each other nodes, the gossip messages listing other nodes in the cluster that are operational. When a node does not receive a gossip message from a particular node within a predetermined time period, then the node transmits messages to the other nodes indicating that the particular node is down. However, if another node has received a packet from the particular node within the predetermined time period and receives the node down message, then the other node responds with a node alive message.

    Abstract translation: 用于在节点集群中共享节点状态的八卦方案为确定集群内的节点状态提供了一种可靠的机制。 节点向每个其他节点发送八卦消息,八卦消息列出了群集中其他可操作的节点。 当节点在预定时间段内没有从特定节点接收到八卦消息时,节点向其他节点发送指示特定节点关闭的消息。 然而,如果另一节点在预定时间段内已经从特定节点接收到分组并且接收到节点向下消息,则另一个节点用节点存活消息进行响应。

    Workload migration using on demand remote paging
    56.
    发明授权
    Workload migration using on demand remote paging 有权
    工作负载迁移使用按需远程分页

    公开(公告)号:US08200771B2

    公开(公告)日:2012-06-12

    申请号:US12249720

    申请日:2008-10-10

    CPC classification number: G06F9/4856

    Abstract: In one embodiment a method for migrating a workload from one processing resource to a second processing resource of a computing platform is disclosed. The method can include a command to migrate a workload that is processing and the process can be interrupted and some memory processes can be frozen in response to the migration command. An index table can be created that identifies memory locations that determined where the process was when it is interrupted. Table data, pinned page data, and non-private process data can be sent to the second processing resource. Contained in this data can be restart type data. The second resource or target resource can utilize this data to restart the process without the requirement of bulk data transfers providing an efficient migration process. Other embodiments are also disclosed.

    Abstract translation: 在一个实施例中,公开了一种用于将工作负载从计算平台的一个处理资源迁移到第二处理资源的方法。 该方法可以包括迁移正在处理的工作负载的命令,并且可以中断进程,并且响应于迁移命令可以冻结一些内存进程。 可以创建一个索引表,用于标识确定进程中断的位置的内存位置。 表数据,固定页数据和非私有处理数据可以被发送到第二处理资源。 包含在这个数据中可以重新启动类型数据。 第二个资源或目标资源可以利用这些数据来重新启动流程,而不需要批量数据传输,提供有效的迁移过程。 还公开了其他实施例。

    Method and apparatus for removing encrypted files unassociated with a user key from an archive
    58.
    发明授权
    Method and apparatus for removing encrypted files unassociated with a user key from an archive 失效
    用于从归档中去除与用户密钥无关的加密文件的方法和装置

    公开(公告)号:US08140856B2

    公开(公告)日:2012-03-20

    申请号:US11935743

    申请日:2007-11-06

    Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file.

    Abstract translation: 本发明提供了一种计算机实现的方法,数据处理系统和计算机程序产品,用于从归档中选择性地提取压缩加密的文件。 数据处理系统从认证的用户接收预处理归档的命令,其中认证的用户与至少一个指纹相关联。 所述数据处理系统确定所述至少一个指纹未能匹配所述存档中的第一压缩加密文件的元数据中的所有指纹。 数据处理系统响应于指纹未能匹配所有指纹的确定,删除压缩加密的文件。 数据处理系统确定指纹与存档中的第二压缩加密文件的元数据中的第二指纹匹配。 数据处理系统响应于指纹与第二指纹匹配的确定,避免删除第二压缩加密文件。

    Logically Partitioned System Having Subpartitions with Flexible Network Connectivity Configuration
    59.
    发明申请
    Logically Partitioned System Having Subpartitions with Flexible Network Connectivity Configuration 失效
    具有灵活网络连接配置的子分区的逻辑分区系统

    公开(公告)号:US20100312868A1

    公开(公告)日:2010-12-09

    申请号:US12478027

    申请日:2009-06-04

    CPC classification number: G06F9/45558 G06F2009/45595

    Abstract: A method of configuring a data processing system for facilitating network communications involves creating a primary logical partition (LPAR) in the data processing system, the LPAR configured to host a specified operating system. The method further includes creating a first virtual network adapter within the LPAR, associating the first virtual network adapter with a first network address, and binding the first virtual network adapter to the LPAR. The method additionally involves creating a first logical subpartition (LSPAR) within the LPAR, the first LSPAR configured to employ said specified operating system and no other. The method also includes creating a second virtual network adapter within the LPAR, associating the second virtual network adapter with a second network address, wherein the second network address is not an alias network address of the first network address, and binding the second virtual network adapter to the first LSPAR.

    Abstract translation: 配置用于促进网络通信的数据处理系统的方法包括在数据处理系统中创建主逻辑分区(LPAR),LPAR被配置为托管指定的操作系统。 该方法还包括在LPAR内创建第一虚拟网络适配器,将第一虚拟网络适配器与第一网络地址相关联,并将第一虚拟网络适配器绑定到LPAR。 该方法还涉及在LPAR内创建第一逻辑子分区(LSPAR),第一个LSPAR被配置为采用所述指定的操作系统,而不是其他的。 该方法还包括在LPAR内创建第二虚拟网络适配器,将第二虚拟网络适配器与第二网络地址相关联,其中第二网络地址不是第一网络地址的别名网络地址,并且绑定第二虚拟网络适配器 到第一个LSPAR。

    VIRTUALIZE, CHECKPOINT, AND RESTART POSIX IPC OBJECTS DURING CHECKPOINTING AND RESTARTING OF A SOFTWARE PARTITION
    60.
    发明申请
    VIRTUALIZE, CHECKPOINT, AND RESTART POSIX IPC OBJECTS DURING CHECKPOINTING AND RESTARTING OF A SOFTWARE PARTITION 失效
    在软件分区检查和重新启动过程中的虚拟化,检查点和重启POSIX IPC对象

    公开(公告)号:US20100082816A1

    公开(公告)日:2010-04-01

    申请号:US12242218

    申请日:2008-09-30

    CPC classification number: G06F9/54 G06F9/4856

    Abstract: A WPAR is migrated. Responsive to starting a checkpoint process, data and control information is collected and stored for IPC objects in the WPAR. Responsive to receiving a request to restart the WPAR, a type of IPC object is determined. Responsive to a determination that the IPC object is not an IPC shared memory object, a kernel handle that a process wants to be used for a new IPC object is registered. A request to create a new IPC object comprising a name uniquely associated with the IPC object and a WPAR identifier is issued. An entry that matches the name and WPAR identifier is identified and a virtual kernel handle is retrieved. The new IPC object is created. The virtual kernel handle is mapped to a real kernel handle and returned to the process. Data and control information is retrieved and overlaid onto the new IPC object.

    Abstract translation: WPAR已迁移。 响应启动检查点流程,收集并存储WPAR中IPC对象的数据和控制信息。 响应于接收到重新启动WPAR的请求,确定了一种IPC对象。 注意到IPC对象不是IPC共享内存对象的确定,注册了一个进程想要用于新的IPC对象的内核句柄。 颁布了创建新的IPC对象的请求,该对象包括与IPC对象唯一相关联的名称和WPAR标识符。 识别与名称和WPAR标识符匹配的条目,并检索虚拟内核句柄。 创建新的IPC对象。 虚拟内核句柄被映射到一个真正的内核句柄并返回到该进程。 数据和控制信息被检索并覆盖到新的IPC对象上。

Patent Agency Ranking