摘要:
A translation lookaside buffer coherency unit with Emulated Purge (TCUEP) fetches first instructions for execution in a multi-processor system. The TCUEP associates a first instruction timestamp with each of the first instructions. The TCUEP receives a multi-processor coherency operation and increments the first timestamp value in a master-tag register to form a second timestamp value after receiving the multi-processor coherency operation. The TCUEP fetches, by an instruction fetch unit in the first microprocessor, second instructions for execution in the multiprocessor system. The TCUEP associates a second instruction timestamp with each of the second instructions. The TCUEP enables an emulated purge mechanism to suppress hits in the translation lookaside buffers for the second instructions. The TCUEP after determining the first instructions are complete, purges entries in the translation lookaside buffers and disables the emulated purge mechanism.
摘要:
Compressed data sets can be merged without unraveling the compressed data sets. Concatenations of vectors of a first compressed data set that extend beyond a second compressed data set with no data vectors are represented in a third compressed data set. The no data vectors represent lack of data to be contributed from the second compressed data set. The third compressed data set represents a merger of the first and the second compressed data sets. Counterpart vectors of the first and second compressed data sets are determined using compression information for the vectors. Concatenations of the counterpart vectors are represented in the third compressed data set, as well as compression information that accounts for the determined counterpart vectors.
摘要:
Associating service agents in communication over a network to one or more respective clients coupled to the network at respective ports of the network is described. At a first service agent, a first signal is received from a first client coupled to the network at a first port. The first signal propagates over a first signal propagation path between the first service agent and the first port. An association between the first service agent and the first client is established based at least in part on a difference between: the first signal propagation path between the first service agent and the first port, and a second signal propagation path between the first service agent and a second port or between a second service agent and the first port.
摘要:
A method includes determining, by a processor, that a write request indicates a clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. The method includes determining that the data block at a current location cannot be modified. In response to a determination that the data block at the current location cannot be modified, the method includes implementing the write request with respect to the data block at a different location and indicating that the data block at the different location can be modified for subsequent write requests that indicate the clone file.
摘要:
A processing system stores a backup of virtual machine data on a storage device in a primary network storage system. A virtual machine running on a primary host machine, which is coupled to the primary network storage system, generates the virtual machine data. A replication software module replicates the backup of the virtual machine data from the primary network storage system to a secondary network storage system. In the event of a failure on the first network storage system, disaster recovery services module restores the virtual machine data from the secondary network storage system to cause the virtual machine to run on a secondary host machine coupled to the secondary network storage system, wherein the disaster recovery services module is coupled to the primary host machine and the secondary host machine over a network.
摘要:
Functionality for secure client authentication and service authorization in a shared communication network are disclosed. A managing network device of a communication network causes a securely connected client network device to perform an account authorization process with an accounting network device in parallel with a service matching process with the managing network device and one or more service providers of the communication network. The managing network device executes the service matching process and securely matches the client network device with one of the service providers. The accounting network device executes the account authorizing process with the client network device and provides a service voucher to the managing network device authorizing one or more of the service providers to service the client network device. The managing network device transmits the service voucher to the matched service provider to prompt the matched service provider to service the client network device.
摘要:
A hybrid device can execute hybrid ARP functionality to manage one-to-many associations between a single network layer address and multiple link layer addresses of other hybrid devices. In accordance with the hybrid ARP functionality, the hybrid device can determine a transmission route, a corresponding one of a plurality of network interfaces of a destination hybrid device, and a corresponding one of a plurality of link layer addresses of the destination hybrid device, based on address resolution store entries associated with the destination hybrid device. The identified link layer address can be populated in a frame for transmission to the destination hybrid device. Additionally, the hybrid ARP functionality can be configured to operate in conjunction with conventional ARP functionality implemented by upper protocol layers. The hybrid ARP functionality can serve as a “proxy” between the conventional ARP functionality and one or more hybrid devices of the hybrid communication network.
摘要:
A system and method of testing, during development, the operation of a clustered storage server system and its associated storage operating system. The system includes at least one host computer having a host operating system, and at least one virtual computer having a simulated storage operating system, at least one simulated disk, a simulated NVRAM, and a simulated flashcard within a guest operating system hosted by the host operating system. The simulated storage operating system represents an actual storage operating system. Facilities of the simulated storage operating system including the simulated disk, the simulated NVRAM, and the simulated flashcard are mapped onto corresponding facilities of the host operating system via virtualization components of the virtual computer so that the simulated storage operating system operates substantially the same as the actual storage operating system on low cost host hardware platforms.
摘要:
A virtual machine can be extended to be aware of secondary cores and specific capabilities of the secondary cores. If a unit of platform-independent code (e.g., a function, a method, a package, a library, etc.) is more suitable to be run on a secondary core, the primary core can package the unit of platform-independent code (“code unit”) and associated data according to the ISA of the secondary core. The primary core can then offload the code unit to an interpreter associated with the secondary core to execute the code unit.
摘要:
A system for integrating databases comprises a first virtual table, a second virtual table, a common table, a list, a generating section, and a selecting section. The first virtual table corresponds to a first data. The second virtual table corresponds to a second data. The common table is associated with the first and second virtual tables. The list indicates information about associations between the first and second virtual tables and the common table. The generating section generates two or more access plans from a database query on the common table. The two or more access plans involve at least one of the first and second virtual tables in accordance with the list. The selecting section selects one of the two or more access plans generated by the generating section to be used to execute the database query.