摘要:
Techniques for handling objects in a network cache are described. A cost function value is calculated for each of a plurality of data objects. The cost function value relates to at least one metric relating to a total time required to download a corresponding one of the plurality of data objects. Each of the plurality of data objects are handled by the network cache according to its cost function value.
摘要:
A network file server includes a first set of data processors for receiving requests from clients, and a second set of data processors for accessing read-write file systems. A respective data processor in the second set is assigned to each file system for exclusive management of read and write locks on the file system. Each data processor in the first set can authorize access to file systems directly accessed by more than one data processor in the second set. Processing of a request for access that is assigned to manage the locks on the file system to be accessed. The exclusivity of lock management eliminates cache coherency problems, and dynamic load balancing can be used to prevent the lock management from becoming a bottleneck to performance.
摘要:
The invention relates to a handheld portable card or disc (22) interface to a crash secure virtual hard disc (24) accessed through the card or disc with software storage capability, and a system (20) therefore. It virtually allows a user to log in on any computer (28) or terminal for retrieving own computer files from the hard disc (22) through the world wide web or Intranet and the like.
摘要:
An efficient mechanism for sending messages without the use of intermediate copies (i.e. without the staging of data) is provided. In particular an interface specification which allows use users of a transport protocol is defined so as to lend itself to efficient implementations. The interface specification is a complete and robust set of user functions usable within systems desiring reliable and efficient zero copy transport protocols. Two methods are provided to accomplish the implementation of an efficient zero copy protocol. The first method is especially useful in systems where the network device has limited capabilities in terms of hardware, message fragmentation and message reassembly. An additional RDRAM memory allows data to reside in an adapter while handshake operations take place between an adapter and a node so as to specify the final destination of the data. The second method takes advantage of network devices with advanced features which are exploited for maximum efficiency.
摘要:
An apparatus for and a method of memory-affinity process scheduling in CC-NUMA systems. The system includes a plurality of nodes connected to a network. A plurality of processes are running on the various nodes of the system. The system further includes at least one memory-affinity counter for each executing process for each node of the system. Process scheduling begins by assigning processes to nodes. During execution, the memory-affinity counters are incremented on every memory access. At a process rescheduling interval, the memory-affinity counters are evaluated and rescheduling is performed based on a preselected policy. At a reset interval, the memory-affinity counters are adjusted to reduce the impact of older memory accesses. The resulting memory-affinity process scheduling is NUMA aware.
摘要:
A computer network system for manipulating requests for shared data includes a plurality of groups and each group has a plurality of nodes and each node has a plurality of processors. The system further comprises a request outstanding buffer (ROB) for recording data requests, a remote access cache (RAC) for caching the results of prior memory requests which are remote to a requesting node, and a directory for recording a global state of a cache line in the system. The RAC supports only two states, Shared and Invalid, and caches only clean remote data. If the directory state is Modified/Exclusive, the line is indicated to not be in the RAC. The behavior of the RAC is described for two important cases: initial RAC does not have the line caches and initial RAC has the line cached. The requested data is supplied to the requesting node from the RAC when the RAC's line is cached and when the RAC's line is not cached, the requested data is supplied from the remote home node and the requested data is installed in the RAC. In the case when the data is not present in the RAC, the request to the remote home node is overlapped with the RAC access to minimize remote memory access latency.
摘要:
A computer system on a computer network with shared storage and that is connected through a network to playback and other systems, enables editing systems using the shared storage to turn over responsibility for transferring data to these playback and other systems. Using information from an automation control system, such as a playlist, indicating the order in which stories are to be played back by a playback system, the computer system schedules the transfer of data to the playback system in an efficient manner. The computer system may maintain a queue of requests to transfer data for programs that is ordered according to the order of the programs in a playlist specified using, for example, broadcast automation control system.
摘要:
Method and apparatus for configuring an imaging system for communication with different remote devices having different requirements. A field engineer selects a prestored configuration file for a particular device from a configuration file library stored on the imaging system hard disk. The selection is made by selecting from a drop-down pick list of equipment identified by make and model. The pick list itself is constructed from information extracted from the configuration file library. The configuration data in the selected configuration file is used to construct a new configuration file, which is later saved to the hard disk. If the device is activated, a portion of the selected configuration file is also copied to an Attribute Control File, which is later saved to the hard disk. The installed configuration files and the Attribute Control Files for activated devices are then read into system memory when the imager is rebooted. Each prestored configuration file includes presets which constitute the best imaging and formatting settings for the particular device as determined by specialists at a central service facility. The configuration file will also include the attribute information for the particular remote device.
摘要:
The invention relates to a telephone system and a method for downloading software from a server (128) to a terminal (100, 102), the method comprising the steps of attaching to the software a certificate confirming the authenticity of the software and the loader; downloading the software from a source computer (134) to the server (128); downloading the software from the server (128) to the terminal (100, 102). In the method of the invention a first electronic signature confirming the authenticity of the software is attached to the software at the server (128). After the software is downloaded, a second electronic signature is generated at the terminal from the loaded software and the authenticity of the software is checked by comparing the first electronic signature with the second.
摘要:
The present invention describes a network system, comprising at least two network units, of which at least the first network unit is provided with an insufficient amount of memory space, wherein the first network unit, which comprises said insufficient amount of memory space, is able to create a program object through the network to a second network unit which comprises a sufficient amount of memory space.