摘要:
Managing end stations locations in a bridged network includes providing a smart bridge, and performing communications operations using a network flood active port connections table, a network flood reaching table, a best path forwarding table and a best path sourcing table. An end station locations revision manages a host location (HLOC) table. End stations locations revision is invoked upon detection of changes in any end station location. The end stations locations revision exchanges location revision grandparent (LRG), a location revision child (LRC) table and a location revision wavefront distribution protocol. The locations revision passes the location revision request from the smart bridge over a topology of the bridged network. A location revision wavefront starts at the root and, spreads a location revision request for revising the HLOC of the other smart bridges. The wavefront spreads by wavefront protocol.
摘要:
A bridged network and a method for performing bridged network topology acquisition. The bridged network includes network segments and smart bridges having one or more ports. The network segments are interconnected by the smart bridges via the ports. Each of the smart bridges being configured to perform steps to accomplish the network topology acquisition. The method also performs steps to accomplish the network topology acquisition. The steps include an inventory construction that compiles a list of the ports that are connected to each of the network segments. Among the ports that are connected to any of the network segments the inventory construction respecting each port operates cooperatively so as to cause the list respecting each of the ports to converge rapidly to the state in which all the lists are similar and yielding a uniform segment inventory. The bridged network topology acquisition in each of the smart bridges operates cooperatively with the bridged network topology acquisition in other smart bridges in order to create a total network report from most recent segment inventories. The bridged network topology acquisition includes propagation, collection, and distribution. The bridges network topology acquisition affords better management of network topology changes.
摘要:
A method and apparatus are provided for detecting data races that overcome the limitations of the prior art. In some embodiments, this is accomplished by detecting a first access to an object, determining whether the first access is associated with a suspicious pattern, automatically refining a pattern detection granularity from the object to a memory location within the object if a determination is made that the first access is associated with the suspicious pattern, and reporting the data race if a second access associated with the suspicious pattern occurs at the memory location after the pattern detection granularity is refined.
摘要:
A mesh connected local area network provides automatic packet switching and routing between host computers coupled to the network. The network has a multiplicity of cut-through, nonblocking switches, each capable of simultaneously routing a multiplicity of data packets. Low host-to-host latency is achieved through the use of cut-through switches with separate internal buffers for each packet being routed. The switches are interconnected with one another and are coupled to the host computers of the network by point to point full duplex links. While each switch can be coupled to ten or more network members, i.e., switches and hosts, each link is coupled to only two network members and is dedicated to carrying signals therebetween. Whenever a new switch or link is added to the network, and whenever a switch or link fails, the switches in the network automatically reconfigure the network by recomputing the set of legal paths through the network.
摘要:
A system is disclosed for creating and implementing an access control policy framework in a weakly coherent distributed collection. A collection manager may sign certificates forming equivalence classes of replicas that share a specific authority. The collection manager and/or certain privileged replicas may issue certificates that delegate authority for control of item policy and replica policy. Further certificates may be signed that create one or more items, set policy for these one or more items, and define a set of operations authorized on the one or more items. The certificates issued according to the present system for creating and implementing a control policy framework cannot be modified or simply overridden. Once a policy certificate is issued, it may only be revoked by the collection manager or by a replica having revocation authority.
摘要:
A distributed system includes full and partial replicas of a set of data items that may be inserted, modified, or deleted by any replica. Replicas may occasionally synchronize with other arbitrarily chosen replicas to learn about updates. A replica's knowledge includes one or more knowledge fragments, where each fragment indicates a set of items. A type of knowledge fragment, called a star knowledge fragment, contains versions associated with all items in the system. Star knowledge fragments are compact because the set of items stored at a replica need not be explicitly listed. Once all replicas know of all updates in the system, partial and full replicas will have the same compact star knowledge fragment.
摘要:
A method and apparatus are provided for detecting data races that overcome the limitations of the prior art. In some embodiments, this is accomplished by detecting a first access to an object, determining whether the first access is associated with a suspicious pattern, automatically refining a pattern detection granularity from the object to a memory location within the object if a determination is made that the first access is associated with the suspicious pattern, and reporting the data race if a second access associated with the suspicious pattern occurs at the memory location after the pattern detection granularity is refined.
摘要:
A hierarchical system is disclosed for synchronizing partially-replicated collections that provides guaranteed paths of information to all replicas in a collection. Each partial replica is assigned a parent replica to act as a proxy on its behalf, and with which the replica synchronizes regularly. Each parent replica is responsible for one or more child replicas. Parent replicas have filters which are either the same as, or more inclusive than, their child replicas, and parent replicas thus store and synchronize all objects that are of interest to their one or more child replicas.
摘要:
In a distributed computer system having components which may fail intermittently, a fault monitor, coupled to one component, detects whether that component is working. Whenever the fault monitor detects that the component has failed, i.e., changed from working to broken status, the status filter transmits without delay a "broken" signal. Whenever the fault monitor detects that the component has changed from broken to working status, however, the status filter transmits a "working" signal only after a recovery time interval corresponding to a computed skepticism level, and only if the component does not fail during that recovery time interval. The status filter increases the computed skepticism level, and redetermines the recovery time interval in accordance therewith, each time that the component fails after the status filter has transmitted a "working" signal. The status filter decreases the computed skepticism level, and redetermines the recovery time interval in accordance therewith, when, after the status filter has transmitted a "working" signal, the component does not fail for at least a defined interval of time.
摘要:
A circuit-based digital communications network is provided for a large data center environment that utilizes circuit switching in lieu of packet switching in order to lower the cost of the network and to gain performance efficiencies. A method for transmitting data in such a network comprises sending a setup request for a path for transmitting the data to a destination node and then speculatively sending the data to the destination node before the setup request is completed.