摘要:
A method of switching data packets through a multistage interconnection network (MIN), to prevent hot spot traffic from degrading uniform traffic performance. Each of the address bits in each packet determine the output link at each particular stage of the network to which the packet must be routed. A packet is accepted at an input buffer of the stage only if an acceptance test is met. This acceptance test depends not only on the availability of a buffer at the input buffer at a stage of the network, but also on how the address bits of the packet are related to address bits of other packets in the buffer, and on the stage of the network. If the acceptance test is not met, the packet is retained in the previous stage of the MIN, and is moved to the rear of a queue of packets in the buffer at that stage, or given a lower priority in the queue.
摘要:
A method of switching synchronous and asynchronous data packets through a multi-stage interconnection network (MIN), so as to insure that packets with the highest assignable priority level will never be blocked at any stage of the network. More specifically, this invention relates to a method of switching voice and data packets over the MIN wherein each of the address bits in each packet determine the connection to be established at each particular stage in the network and wherein each packet has therein a priority level. In each time slot of a frame, the priority level of the packets stored in a particular originating adapter are compared and the packet with the highest priority level in each adapter is forwarded through the MIN and routed through the MIN as described above. Also, at each subswitch at each stage of the MIN, if two or more packets request the same subswitch output, only the packet with the higher priority is forwarded to the subswitch output. A packet will be assigned the highest priority only if a corresponding packet for a given circuit connection with second highest priority level was successfully transmitted through the MIN.
摘要:
In a communication system comprising several stations, access to the ring is granted to one station at a time by circulating a token on the ring and updating the priority of the token is disclosed. This invention provides for a first station to transmit a token immediately after it has finished transmitting a frame containing a packet(s) needed to be transmitted from the first station without waiting for the header of the frame to return to the first station. A priority signalling packet is then transmitted on the ring from the first station after the first station transmits the token on the ring. This priority signalling packet contains information as to the particular priority level that the token should be updated to. Finally, the priority level of the token is updated to correspond to the particular priority level when the priority signalling packet reaches the station that holds the token.
摘要:
A method, data processing system, and computer program product for identifying network data processing systems. A first number of attributes for a network data processing system are identified by a processor unit. A second number of attributes for a number of potential network data processing systems are identified by the processor unit. A graphical user interface with a graphical representation of a comparison of the first number of attributes and the second number of attributes is displayed on a display device.
摘要:
A method and system are provided for partitioning a database and for balancing the processing load among processing nodes in a data processing system. A database partition is stored at each node and a logical owner node is assigned to each partition. The logical owner becomes responsible for all database requests related to the corresponding partition. Techniques for optimally assigning logical owners to all partitions in a system are provided and are responsive to parameters such as the load at each node, the combined load of the system, and the total number of assignments allowed. Techniques are also provided to accomplish the transfer of partition ownership between processing nodes when multiple transactions related to the partition are simultaneously occurring.
摘要:
This invention relates to a method of switching voice and data over a multistage interconnection network (MIN). More specifically, a plurality of bits are stored in respective storage locations of the switching elements of the MIN. Storage location of a switching element represents a particular time slot in a frame or a sequence of frames. Bits stored in each location represent specific conditions of the inputs and outputs of the switching elements and also indicate which inputs of the switching elements will be connected to which outputs of the switching elements. This storage of control information in the switching elements allows the switching network to rapidly and simultaneously change connections through the switching elements of the network.
摘要:
In a method for decision support, a request for information that is part of a context is received, data is generated in response the request, a knowledge model associated with the context is populated with the data, the knowledge model is populated with real-time data associated with the request, the knowledge model is executed, and a result of the executed knowledge model is output.
摘要:
A method of communicating between two business entities, each of the business entities utilizing a different communication protocol, wherein a business conversation is established between the entities, comprises the steps of: providing a business-to-business (B2B) protocol exchange for facilitating communications between the business entities, the B2B protocol exchange being operatively connected to the business entities. The method further includes the step of receiving, at the B2B protocol exchange, a message from one of the business entities in a first communication protocol, translating the received message in the first communication protocol into a translated message in a second protocol used by another of the business entities and sending the translated message to the other business entity. In this manner, the present invention provides a framework for facilitating communication between two business entities implemented using different communication protocols.
摘要:
The present invention relates to a method for protecting user data from unauthorized access, the method comprising the steps of, on a data processing system: maintaining said user data in encrypted form stored on a second storage, when loading an operating system using an operating system loader: receiving in a first disk key transmission step from a first user system a symmetric user key that is only accessible by the data processing system if the operating system loader has been started on behalf of said first user system, wherein the symmetric user key is received sealed to a combination of the operating system loader and a user identifier corresponding to said first user system in said first disk key transmission step; accessing the symmetric user key, if the operating system loader has been started on behalf of said first user system; decrypting in a user data decryption step said user data using the symmetric user key, maintaining said symmetric user key in a volatile memory.
摘要:
In one embodiment, the present invention is a method and apparatus for creating and editing electronic documents. One embodiment of the inventive method involves generating an electronic document in a first document format type, in accordance with one or more user-specified parameters, and converting the electronic document from the first document format type into a second document format type, in accordance with a user instruction to finalize the electronic document. In one embodiment, the first document format type is a structured document format type, such as hypertext markup language or extensible markup language, while the second document format type is a secure document format type such as portable document format.