Abstract:
A network management apparatus is designed so that when reassigning the existing address, the network management apparatus extracts a link with the largest link cost from among links comprising the network based on the network configuration information and specifies a flow routed though the extracted link based on the statistic information; when receiving a path change request and a via link request to request a via link with respect to the specified flow from an external terminal, the network management apparatus selects either one of addresses of an address pair of the specified flow as a change target address; and when changing the selected change target address, the network management apparatus changes the change target address to a candidate address to be assigned by selecting an address, which is routed through a link included in the via link request and has not been assigned, as the candidate address to be assigned.
Abstract:
The present invention is an information system that includes: a first computer; a first storage apparatus; a first network apparatus, to which the first computer and the first storage apparatus are connected, providing a first fabric service; a second computer; a second storage apparatus; a second network apparatus, to which the second computer and the second storage apparatus are connected, providing a second fabric service; and a network that connects the first network apparatus and the second network apparatus, wherein the first computer accesses the first fabric service, the second computer accesses the second fabric service, and the first storage apparatus and the second storage apparatus access the first fabric service and the second fabric service, respectively.
Abstract:
When an application activation instruction is input, it is decided whether the application is expected to access a high-level protection resource or low-level protection resource (step S31). If the decision is affirmative, display is done to prompt the user to select whether to permit activation of the application (step S32). When the user inputs an activation permission instruction, the application is activated (steps S33 to S36). As a result, only when the user permits an application, which is expected to access a high-level protection resource or low-level protection resource, to access a predetermined resource immediately before its execution, the application is executed. Hence, the basic processing part and application can operate in cooperation with each other while limiting access to various kinds of resources by the application in a reasonable range.
Abstract:
During iSCSI communication, according to the contents of commands issued by a host computer, the command response time is increased due to the influence of the TCP Delayed ACK. Thus, a command issued by the host computer is analyzed, the number of TCP/IP packets required for transmitting the data requested by this command is calculated, and a precedence packet is transmitted, so that no influence is experienced due to the Delayed ACK.
Abstract:
When an application activation instruction is input, it is decided whether the application is expected to access a high-level protection resource or low-level protection resource (step S31). If the decision is affirmative, display is done to prompt the user to select whether to permit activation of the application (step S32). When the user inputs an activation permission instruction, the application is activated (steps S33 to S36). As a result, only when the user permits an application, which is expected to access a high-level protection resource or low-level protection resource, to access a predetermined resource immediately before its execution, the application is executed. Hence, the basic processing part and application can operate in cooperation with each other while limiting access to various kinds of resources by the application in a reasonable range.
Abstract:
During iSCSI communication, according to the contents of commands issued by a host computer, the command response time is increased due to the influence of the TCP Delayed ACK. Thus, a command issued by the host computer is analyzed, the number of TCP/IP packets required for transmitting the data requested by this command is calculated, and a precedence packet is transmitted, so that no influence is experienced due to the Delayed ACK.
Abstract:
In one embodiment of a method for controlling an exit tray according to the invention, a controller controls an extension tray drive motor and controls the effective length of an extension tray of an image forming apparatus or a finisher employed with the image forming apparatus, based on a signal from a sensor for detecting the position of an extension tray, a signal from a sensor for detecting the presence or absence of a long size recording sheet of paper on an exit tray, and information on the size of a recording sheet of paper on which an image is printed.
Abstract:
A virtualization switch virtualizes a data storage area provided by a server device and provides it to a server device with. This virtualization switch processes a priority control and a bandwidth control also on the output side to packets which make an access to a virtual volume and which have different demands for a QoS but identical IP headers according to a discrimination result of a TCP connection. Here, the TCP connection is discriminated by managing a TCP source port on the side of the virtualization switch.
Abstract:
An apparatus for supplying molten steel and a continuous casting method therewith are described. The apparatus is equipped with a tundish 1 having an upper nozzle 2 at the bottom, a flow control mechanism 3 disposed below the upper nozzle 2, an immersion nozzle 4 formed by a refractory material having a good electrical conductivity, one electrode 5 disposed in the inner space of the tundish 1, the other electrode 6 disposed in the immersion nozzle 4, and a power supply 7 connected to the electrodes 5 and 6. In the method, the molten steel is supplied into a mold in the state of supplying an electric current between the inner surface of the immersion nozzle 4 and the molten steel 8 passing through the inside thereof by utilizing the apparatus for supplying molten steel. The deposition of the Al oxide or the like in the molten steel onto the inner surface of the immersion nozzle and others can be prevented, and thereby the generation of the surface defects in the products can also be prevented.
Abstract:
The present invention provides a toner which does not cause problems on generation of an offensive odor and a stain on a surface of a cooling unit and which is excellent in an offset resistance, a low temperature fixability and an environmental dependency. In the toner for developing an electrostatic latent image comprising a polyester resin as a principal component which is formed by reacting dicarboxylic acids of a polybasic acid with diols of a polyhydric alcohol, dimethyl phthalate remaining in the polyester resin described above without reacting has a content of 0.1 % by weight or less.