摘要:
In a system comprising a first fabric and a plurality of devices coupled to the fabric by Fibre Channel connections, the devices are logically grouped to form configurations and zones. A configuration includes at least one zone, and each zone includes at least one device as a member of the zone. Communications between the devices is restricted according to the configuration currently in effect. For example, one device may be permitted to communicate with another device only if they are members of a common zone.
摘要:
In a system comprising a first fabric and a plurality of devices coupled to the fabric by Fibre Channel connections, the devices are logically grouped to form configurations and zones. A configuration includes at least one zone, and each zone includes at least one device as a member of the zone. Communications between the devices is restricted according to the configuration currently in effect. For example, one device may be permitted to communicate with another device only if they are members of a common zone.
摘要:
A system and method for sending frames between a public device and a private device comprise a phantom device mapping, an address translation, a frame payload translation, and a CRC regeneration. The system and method assign a phantom AL_PA for the public device and establishes a phantom device mapping between the phantom AL_PA and the public device's Port_ID. With the phantom device mapping, the present invention directs all communication between the public device and the private loop device as if the communication were between a phantom device and the private device. Specifically, the system and method comprise a public-to-private address translation in one direction and a private-to-public address translation in the other direction. During the public-to-private address translation process, the source address of the frame is converted to a phantom AL_PA. The public-to-private address translation uses a Port_ID to phantom AL_PA mapping table and finds an entry where the Port_ID matches the source address. The public-to-private address translation replaces the source address of the frame with the phantom AL_PA of the matched entry, and the destination address with the AL_PA only of the destination device. The private-to-public address translation replaces the destination address of the frame with the Port_ID of the matched entry, and the source address with the fabric assigned address of the private device.
摘要:
Methods, systems and apparatuses for an operator provisioning a trustworthy workspace to a subscriber are disclosed. One method includes providing the subscriber with the trustworthy workspace, where in the trustworthy workspace comprises a virtualized content repository with trustworthy workflows for storing, sharing and processing a digital content across a plurality of repositories. The method further includes allowing the subscriber authority to sub-provision the trustworthy workspace to one or more authorized parties, wherein only the one or more authorized parties can view or modify at least a portion of the digital content.
摘要:
In a system comprising a first fabric and a plurality of devices coupled to the fabric by Fibre Channel connections, the devices are logically grouped to form configurations and zones. A configuration includes at least one zone, and each zone includes at least one device as a member of the zone. Communications between the devices is restricted according to the configuration currently in effect. For example, one device may be permitted to communicate with another device only if they are members of a common zone.
摘要:
In a communication network system having a multi-switch Fiber Channel fabric, adjacent switches are communicatively coupled together by a plurality of links. The links are selectively determined to join a trunked group for enabling frames received at one switch to be routed over the links in the trunked group to the adjacent switch in an evenly distributed manner. In one embodiment, a link within the trunked group is coupled to a pair of ports residing on adjacent switches each having a designated trunking master port. The traffic load at one switch is routed through the trunking master port which distributes the load across multiple links and guarantees that the load is received at the adjacent switch with “in-order” delivery.
摘要:
In a system comprising a first fabric and a plurality of devices coupled to the fabric by Fibre Channel connections, the devices are logically grouped to form configurations and zones. A configuration includes at least one zone, and each zone includes at least one device as a member of the zone. Communications between the devices is restricted according to the configuration currently in effect. For example, one device may be permitted to communicate with another device only if they are members of a common zone.
摘要:
In a system comprising a first fabric and a plurality of devices coupled to the fabric by fiber channel connections, the devices are logically grouped to form configurations and zones. A configuration includes at least one zone, and each zone includes at least one device as a member of the zone. Communications between the devices is restricted according to the configuration currently in effect. For example, one device may be permitted to communicate with another device only if they are members of a common zone.
摘要:
In a system comprising a first fabric and a plurality of devices coupled to the fabric by Fiber Channel connections, the devices are logically grouped to form configurations and zones. A configuration includes at least one zone, and each zone includes at least one device as a member of the zone. Communications between the devices is restricted according to the configuration currently in effect. For example, one device may be permitted to communicate with another device only if they are members of a common zone.
摘要:
Methods, systems and apparatuses for providing trustworthy workflow across trust boundaries are disclosed. One method includes a curator generating a first public key (PKC1) and a second public key (PKC2), publishing the first public key (PKC1) and the second public key (PKC2), and generating a first proxy re-encryption key (RKC1-C2) and a second proxy re-encryption key (RKC2-B). Further, a first party encrypts data having a key k, wherein k is encrypted according to the first public key (PKC1). A custodian proxy re-encrypts k from the first public key (PKC1) to the second public key (PKC2) using the first proxy re-encryption key (RK C1-C2), and the custodian proxy re-encrypts k from the second public key (PKC2) to a public key (PKB) of the second party B using the second proxy re-encryption key (RKC2-B). The second party B receiving the data and decrypting the data with the key k.