摘要:
A virtual file system accessing subsystem is disclosed for use in connection with a computer system connected in a computer network. The computer system runs a selected operating system, such as Microsoft's MS-DOS and Windows operating systems. The virtual file system accessing subsystem facilitates the accessing of a virtual logical storage device that is identified by a virtual logical storage device identifier and that has a virtual logical storage device file system that includes at least a portion of a remote file system maintained by another device connected in the computer network. The virtual file system accessing subsystem comprises an operating system request redirector for enabling the operating system to direct access requests from an application program which identify the virtual logical storage device to a remote access element for processing. The remote access element initiates access operations in connection with the portion of the remote file system which is included in the virtual logical storage device file system in response to an access request that is generated by an application program which identifies the virtual logical storage device identifier, which access request has been transferred thereto said remote access element by the operating system. If the portion of the remote file system being accessed has not previously been mounted, the remote access element enables an automounting element to initiate a mounting operation in connection with the remote file system to mount the portion, after which the remote access element can perform the access operation.
摘要:
A network browser system facilitates browsing of resources in a network, each of the resources having a respective network address. The network browser system includes a browsing control list and a browsing computer. The browsing control list includes at least one network specifier entry that identifies at least a portion of the network, the portion having associated therewith a range of network addresses. The browsing computer is responsive to a browsing request from an operator to initiate a browsing operation in connection with the network. During the browsing operation, the browsing computer generates, from the network specifier entry in the browsing control list, a plurality of browsing request messages that are associated with respective ones of the network addresses in the network address range, and transmits the browsing request messages over the network. The resources in a network whose network addresses correspond to network addresses in the transmitted browsing request messages receive the respective browsing request messages, and transmit in response browsing response messages to the browsing computer. Each browsing response message includes browsing information, such as a name or other textual identifier for the resource, which the browsing computer can display to the operator.
摘要:
To authenticate and authorize prospective members in a reliable multicast data distribution setup, the prospective members contact a central authority to obtain a “participation certificate” for the multicast session. The central authority authenticates each node and issues a digitally signed certificate to the node. Each certificate contains information specifying the manner in which the respective node is authorized to participate in the multicast session in addition to the respective node's public key. The nodes exchange their participation certificates with each other during session-establishment dialog to prove their identities and their authorization to participate. Each node verifies the rights of other nodes based on authorization information contained in the participation certificate received from the other node. Thus, a node is allowed to participate as a repair node only if it presents a participation certificate authorizing it to do so. Disruption in network operation is avoided by reducing the ability of malicious nodes to consume resources to the detriment of legitimate session members.
摘要:
In a computer system executing a dynamically configurable operating system, a symbol definition image file builder is provided for building a symbol definition image file real time for utilities and application programs. The symbol definition image file is built upon receipt of an open request for the file and a current system definition image file does not exist. The symbol definition image file is deleted upon receipt of a close request for the file and it is determined that the file is no longer referenced and non-current. The symbol definition image file comprises all current symbol definitions and strings of the operating system. The current symbol definitions and strings are gathered by the symbol definition builder from the symbol and string tables of the root executable segment and the relocatable segments of the operating system that are currently loaded in memory. Additionally, prior to building the symbol definition image file, the symbol definitions image file builder inhibits automatic unloading of the relocatable segments until all accesses to the symbol definition image file are completed, thereby protecting the symbol definitions and the strings that are included in the symbol definition image files from becoming stale.
摘要:
“A system [comprises] includes a virtual private network and an external device interconnected by a digital network. The virtual private network has a firewall, at least one internal device and a nameserver each having a network address. The internal device also has a secondary address, and the nameserver is configured to provide an association between the secondary address and the network address. The firewall, in response to a request from the external device to establish a connection therebetween, provides the external device with the network address of the nameserver. The external device, in response to a request from an operator or the like, including the internal device's secondary address, requesting access to the internal device, generates a network address request message for transmission over the connection to the firewall requesting resolution of the network address associated with the secondary address. The firewall provides the address resolution request to the nameserver, and the nameserver provides the network address associated with the secondary address to the firewall. The firewall, in turn, provides the network address in a network address response message for transmission over the connection to the external device. The external device can thereafter use the network address so provided in subsequent communications with the firewall intended for the internal device.”
摘要:
A method and system for accurately measuring the reception characteristics of receivers in a multicast data distribution group having a sending node and a plurality of receivers. The multicast group is organized as a repair tree in which selected nodes of the multicast group comprise repair nodes for downstream receivers. Multicast data packets transmitted by the repair nodes include a retransmission count field in addition to the multicast packet header information, a session identifier, a packet sequence number and payload data. The retransmission count provides an indication of the number of times the respective packet has been retransmitted in response to a repair request. The receivers include an original packet counter and a retransmission count counter for each multicast session. Each receiver increments the original packet counter upon receipt of a packet that has not been previously received. Each receiver adds the value contained in the retransmission count field of a received packet to the retransmission count counter upon receipt of a retransmitted multicast packet that corresponds to a packet identified as a missing packet by the respective receiver. The data in the actual packet count counter and the retransmission count counter is employed to generate a loss metric at each receiver that provides a measure of the reception characteristic of the respective receiver for the particular multicast session.
摘要:
A computer system includes a global machine for providing a virtual machine for a plurality of applications programs, including a calling applications program and a called applications program which is called by said calling applications program, and further provides a global state store for storing selected global state information for controlling selected operations. The calling program conditions the global state information stored in the global state store to a calling program global state, performs predetermined calling program processing operations and calls the called applications program. The called program, upon being called by the calling program, saves the calling program global information contained in the global state store. The calling program further conditions the global state information in the global state store to a called program global state, performs predetermined called program processing operations, and thereafter restores the saved calling program global state to the global state information store and returns control to the calling program, thereby to ensure that, when the calling program is again processed, the global state information will be proper for the calling program.
摘要:
A virtual device driver registry for use in connection with a computer system for providing virtual device driver call information to a program operating in said computer system in response to a call information request. The virtual device driver registry maintains a registration database including a plurality of entries, each entry including a virtual device driver identifier and virtual device driver call information. The registry establishes the entries in the registration database in response to receipt of virtual device driver registration requests from the virtual device drivers as they are initialized. The registry responds to call information requests from the programs to provide call information for the registered virtual device drivers. Each call request includes a requested virtual device driver identifier, and the registered information supply element retrieves virtual device driver call information associated with the entry whose virtual device driver identifier corresponds to the requested virtual device driver identifier in the request. Accordingly, the virtual device driver registry ensures that the virtual device drivers in the set of virtual device drivers associated with the registry have identifiers that need only be unique for that registry. In addition, the registry provides for greater flexibility in selection of identifiers and enables use of a much larger set of identifiers than would be available using the Microsoft naming scheme, since the identifiers which are registered with the registry are not limited by the Microsoft global identifier scheme using sixteen bit identifiers.
摘要:
A dynamically configurable operating system is achieved by providing a module sub-system which intercepts requests by processes to access a module in the operating system and determines whether the module has been loaded in the kernel memory and linked the other modules located in the kernel memory and installed in the appropriate table. If the module has been into the kernel memory, and installed the module sub-system grants the requesting installed process access to the module and processing continues. If the module has not been loaded into the kernel memory, the module sub-system will retrieve a copy of the module stored and copy it into kernel memory. The module is then linked to the other modules located in the kernel and installed. Once the module is loaded and linked and installed, access is granted to the requesting process and normal processing continues.
摘要:
A network collaboration system facilitates collaborations between network clients having access to a digital network. The system uses audio mixes to provide different levels of voice conferences between the meeting participants. In a main collaboration, those participating in the main collaboration receive an audio output that includes audio inputs from the other participants. A subset group of clients may also have a voice chat, in which their audio inputs are removed from the outputs delivered to the clients not participating in the voice chat. Meanwhile, the participants in the voice chat hear each other at full volume, but hear the collaborators who are not part of the voice chat at a reduced volume.