摘要:
A LOCATE search dynamically locates resources (e.g., logical units (LUs) and transaction program and files associated with LUs) in a computer network so that a session can be established between the origin and the destination of the search.In a network which includes end nodes associated with server nodes, a resource contained in any node is located by a requesting node. The requesting node initiates a search of the resources residing within itself. If the resource does not reside in the requesting node, the server node searches the resources known to the server node that reside anywhere in the nework. If the resource is not known by the server node, it searchers all resources that reside in its associated end nodes. If the resource does not reside in the associated end nodes, either a request is sent to a central directory if one exists or a search of all resources in the network is made.
摘要:
Enhanced type 2.1 nodes for SNA networks provide network routing of information between non-adjacent network nodes and program-to-program linkage across the network. These nodes are called "advanced peer to peer networking" (abbreviated APPN) nodes. Network state information, describing the topology and resources of the network is disseminated betweeen APPN nodes by a first data link control exchange of identification (XID) information indicating node type (and thereby distinguishing APPN nodes from other nodes) and other exchanges conducted over a newly defined control point to control point (abbreviated CP--CP) session having a message architecture unique to APPN type nodes. The XID exchange is conducted whenever a link between nodes is activated, and when the exchanging nodes are both APPN, and if both are available to participate in as CP--CP session, they automatically engage in a second exchange of session binding signals which establish a pair of sessions between the nodes. By internal conventions, the node components which use the session pair for exchanging their network state information adapt the sessions to be used in simplex modes with one session flowing from one node to the other and the other flowing in reverse from the other node to the one node. Within these sessions, for the sake of efficiency, communications are not directly acknowledged. Instead, a process transparent to the sessions monitors for link failure and upon such occurrence notifies all affected components to terminate their use of the session and deactivate the session.
摘要:
When computing a least weight path from an origin node to a destination node in a data communication network, a route-computing network node uses information provided by the origin and destination nodes to compute least weight routes from those nodes to adjacent network nodes. The route-computing network node uses information in the topology database to compute least weight routes from network nodes adjacent the origin node to network nodes adjacent the destination node. The results of the computations are concatenated to determine an optimum route from the origin node to the destination node. The topology database need not include information about the transmission groups connecting the origin/destination nodes to network nodes.
摘要:
The invention enables two nodes in a communications network to dynamically establish the transmission group number used to partially identify a given link between the nodes. When the link is being activated, both nodes simultaneously propose either a zero or a non-zero number to each other in an exchange of exchange identification (XID) messages. If only one of the nodes proposed a non-zero number, that non-zero number is selected as the transmission group number. If both nodes had proposed zero or both had proposed non-zero numbers, predetermined criteria are employed to select a controlling node. The controlling node chooses the final transmission group number and communicates that choice to the non-controlling node.
摘要:
A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.
摘要:
The present invention is an improvement in a known LOCATE process used to locate resources in a computer network. The known LOCATE process always requires that information about a target resource be verified by forwarding a LOCATE request to the node owning the target resource. The present invention improves upon this process by use of selective verification. If predetermined conditions are met, a node in the network may reply to a received LOCATE request by using information about the target resource found in its cache directory. The LOCATE request need not be propagated to the node owning the target resource except for predetermined types of sessions or where past attempts to use selective verification have not been successful.
摘要:
A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.
摘要:
A method, apparatus, and computer implemented instructions for processing a request in a data processing system. The request is received. In response to a first hash value being present within the request, the first hash value is compared to a second hash value that was computed locally, wherein the second hash value represents a current policy configuration for assigning a quality of service. In response to a match between the first hash value and the second hash value, other information in the request is used to establish a quality of service for packets associated with the request.