Abstract:
The present invention is an apparatus for controlling client node access to data items maintained in a storage device. The data items include volatile data items. The apparatus comprises a communication device for communicating with multiple client nodes; and a processor, coupled to the storage device for polling the client nodes to exchange (e.g., retrieve and/or transmit) data related to the volatile data items, via the communication device. The processing system further controls client node access to the data items of the storage device. In this way, the apparatus and method of the present invention remedies the problems associated with directory server overload.
Abstract:
A method of controlling packet traffic in an IP network of originating, receiving and intermediate nodes to meet performance objectives established by service level agreements. Traffic statistics and performance data such as delay and loss rates relating to traffic flows are collected at intermediate nodes. A control server processes the collected data to determines data flow rates for different priorities of traffic. A static directory node is used to look up inter-node connections and determine initial traffic classes corresponding to those connections. The rates are combined with the initial traffic classes to define codes for encoding the headers of packets to determine their network priority.
Abstract:
The present invention is a directory server for monitoring network access requests, which includes a storage device for storing data items and an identifier associated with a monitoring node for at least a selected data item of the data items; a communication device for transmitting signals to the monitoring node; and a processing device, coupled to the storage device and the communication device. The processing device receives a network access request for the selected data item and, responsive to receipt of the request, automatically transmits a signal notifying the monitoring node of the request via the communication device, thereby enabling the monitoring node, e.g., a third party, to enforce traffic class priorities and access characteristics of the network.