摘要:
Modeling operational policies of operating a business's or institution's actual or planned IT system. The IT system may include components such as applications, application hosts, one or more networks or components thereof, hardware, and interrelationships between the components. The IT system is to be operated in accordance with operational policies that govern existence or numerosity of components, how the components are interrelated, how the components and interrelationships are configured, and/or manual or automated processes for managing and maintaining the IT system. The modeling may involve generating code that conforms to a language by declaring abstractions using types that correspond to the components of the IT system, by declaring types of interrelationships that correspond to the interrelationships of the IT system, and by defining constraints upon and between the abstract types, where the constraints correspond to operational policies of operating the IT system.
摘要:
A network computer maintains a directory of objects having multi-valued attributes. The attributes are comprised of individual linked values having conflict-resolution data that indicates a change to an object at an attribute-value level. A second network computer stores a replica of the directory in which a replica of the objects is maintained. The computers replicate the objects in the directories and update the individual linked values of the attributes. Replication conflicts are identified and resolved with the conflict-resolution data at the attribute-value level of the objects.
摘要:
A method for monitoring replica servers in a networked computer system is provided, in which each server in the system has a replica partner vector table that includes state information about other servers in the system. The replica partner vector table includes data fields for storing an update sequence number (USN) and timestamp information that identifies the time of the last update and/or the time last successful replication attempt for each replica server in the system. After each successful replication, the server updates the entries in the replica partner vector to reflect the updated USN and timestamp information. The replica monitoring method evaluates the USN and timestamp entries in the replica partner vector table to determine if any servers in the system are latent. If the monitoring method detects that a server in the system is latent, an alert is generated whereby users and/or a network administrator are informed of the problem.
摘要:
An improved network architecture employs a super authority having an identity catalog to direct login authentication tasks to appropriate authorities. Authentication tasks may be performed by authorities across namespace boundaries if so directed by the super authority, such that a principal account may be moved without alteration of the account ID. In an embodiment of the invention, the identity catalog comprises a listing associating account IDs with appropriate authenticating authorities.
摘要:
A new method and framework for re-partitioning directory servers supporting user services in a site that receives access requests from users. According to the present invention, a management server transfers groups of directory objects from original directory servers to newly added directory servers without service interruption to users of the site. The directory objects are stored in categorical groups such that the directory objects in each group share an attribute. According to the present invention, certain groups in the original directory servers are identified for migration to the newly added servers based on a load-balancing scheme. In one embodiment, the identified groups are marked for migration to limit access to the directory objects therein. After successfully being migration, the groups are unmarked and access is resumed. In another embodiment, the management server includes a table storing location information that is updated to indicate successful transfer of the identified group of directory objects from the original server to the newly added server.
摘要:
A method for designating communication paths in a computer network is provided, in which communication paths are designated for the transmission of data throughout a network. The network may have both recipient computers, which are the intended recipients of the data, and intermediary computers, which are not the intended recipients, but merely relay the data. Each intermediary computer is grouped with the “closest” recipient computer (i.e. the recipient computer with whom it is “least expensive” to communicate). Communication paths between the resulting groups are then identified. A representation of the network is then created. The representation replaces the intermediary computers with the inter-group communication paths, so that the inter-group communication paths appear to pass directly through the locations occupied by the intermediary computers. The created representation is then further processed so that the “least expensive” communication paths may be designated.
摘要:
A system and methods for service discovery and publication are disclosed. Application programs write requests for service discovery, publication, and subscription to a service discovery application programming interface. The service discovery application programming interface invokes one or more lower-level protocols to satisfy the discovery, publication and/or subscription request. Service information retrieved from lower-layer protocols is formatted into a consistent data model and returned to the client application. In addition, service information may be stored in a persistent data store managed by a discovery persistence service communicatively connected to the service discovery API.