NETWORK TRAFFIC CONTROL IN PEER-TO-PEER ENVIRONMENTS

    公开(公告)号:CA2505630A1

    公开(公告)日:2004-06-03

    申请号:CA2505630

    申请日:2003-10-28

    Applicant: IBM

    Abstract: A method and an electronic unit are disclosed for controlling traffic on a network, especially for controlling peer-to-peer related traffic. A filter unit is intercepting messages related to peer-to-peer application from a network line, irrespective of the messages' destination, A control logic the n manages a request represented by an intercepted message subject to its conte nt and subject to peering specific information.

    Costs in data networks
    22.
    发明专利

    公开(公告)号:AU1259602A

    公开(公告)日:2002-06-03

    申请号:AU1259602

    申请日:2001-11-12

    Applicant: IBM

    Abstract: A method for deriving a set of efficient path costs for a group of nodes comprising a source node and a plurality of destination nodes in a data communications networks, wherein the path costs for paths between nodes in the group are defined in the network and each path cost comprises a restrictive cost and an additive cost, comprises iteratively identifying the paths of higher bandwidth first and, when two or more paths of equal bandwidth are encountered, selecting the path having a lower transit delay associated therewith.

    23.
    发明专利
    未知

    公开(公告)号:DE69123579T2

    公开(公告)日:1997-06-12

    申请号:DE69123579

    申请日:1991-09-06

    Applicant: IBM

    Abstract: The echo cancellation method includes starting with an arbitrary set of echo filter coefficients. The coefficients are first sequentially re-estimated using a fast converging method. These operations are repeated a predefined number of times, and then the coefficients estimation is switched to a low converging but more precise method. In addition, an adaptive threshold is being defined and readjusted and all filter coefficients lower than said threshold are being discarded. Finally, sampling time boundaries are adaptively defined based on non-discarded filter coefficients with reference to said threshold, and in such a way the final echo cancelation algorighm is adaptive to echo variations (backtracking algorithm).

    Sichere Ausführung von Software-Modulen auf einem Computer

    公开(公告)号:DE112014000337T5

    公开(公告)日:2015-09-10

    申请号:DE112014000337

    申请日:2014-03-14

    Applicant: IBM

    Abstract: Die vorliegende Erfindung bezieht sich insbesondere auf ein Verfahren zum Ausführen von Software-Modulen auf einem Computer, wobei das Verfahren aufweist: Ausführen (S4) eines Boot-Ladeprogramms (15, 16) zumindest teilweise (16) auf dem Computer (101); und bei Ausführung des Boot-Ladeprogramms: Zugreifen (S5) auf Anforderungen an einen Anfangssatz (IS) von Software-Modulen SMn; und Hardware-Spezifikationen des Computers; Ermitteln (S6) innerhalb des Anfangssatzes eines oder mehrerer Kandidatensätze (CS1, CS2) von Software-Modulen, die mit den Hardware-Spezifikationen kompatibel sind (S6a) und als RAM-Platte speicherbar sind (S6b); und Speichern (S9) der Software-Module eines Abschlusssatzes (FS) auf einer RAM-Platte (121), wobei es sich bei dem Abschlusssatz (FS) um einen des einen oder der mehreren Kandidatensätze handelt, und Anweisen, die auf der RAM-Platte gespeicherten Software-Module auszuführen, wobei sowohl der Anfangssatz als auch der Abschlusssatz von Software-Modulen Anwendungskomponenten und Betriebssystem-Abbildkomponenten aufweist und des Weiteren bevorzugt Hardware-Komponententreiber aufweist. Die vorliegende Erfindung bezieht sich des Weiteren auf ein Boot-Ladeprogramm, eine für Benutzer vertrauenswürdige Einheit und ein System.

    Secure execution of software modules on a computer

    公开(公告)号:GB2512376A

    公开(公告)日:2014-10-01

    申请号:GB201305727

    申请日:2013-03-28

    Applicant: IBM

    Abstract: Disclosed is a method of executing software modules on a computer. The method start by executing S4 a bootloader in the computer and then accessing S5 requirements as to an initial set of software modules and hardware specifications of the computer. Then determining S6 within the initial set, a candidate set CS1 of software modules that are compatible S6a with the hardware specifications and can S6b be stored as a RAM disk and storing S9 the software modules of a final set on a RAM disk , the final set being a candidate set. Executing the software modules stored on the RAM disk, wherein each of the initial set and the final set of software modules comprises application components and operating system image components and hardware component drivers. A trusted device such as a USB drive may hold the bootloader and the software modules.

    Re-organising blocks of physical storage based on the sequence in which they are accessed

    公开(公告)号:GB2499290A

    公开(公告)日:2013-08-14

    申请号:GB201221591

    申请日:2012-11-30

    Applicant: IBM

    Abstract: A method for managing a software image 325 being stored in blocks 320 of physical storage comprises, monitoring each access to the physical blocks, calculating or predicting a probable sequence of access to the physical blocks and re-organising/re-arranging the physical blocks according to the probable sequence. The method may be performed by a plurality of virtual machines 220 running on the software image, with a virtual disk having blocks mapped to the blocks of physical storage. The monitoring of accesses to the physical blocks may occur during the booting of each virtual machine. This method effectively defragments the physical storage. When the pre-fetching and storing in a cache 330 of blocks 320f adjacent to the block last accessed occurs, latency may be reduced by pre-fetching the most relevant blocks and those that are most likely required next.

    28.
    发明专利
    未知

    公开(公告)号:DE69840844D1

    公开(公告)日:2009-07-02

    申请号:DE69840844

    申请日:1998-08-10

    Applicant: IBM

    Abstract: Scheme for the computation of a restrictive cost between pairs of border nodes of a PNNI peer group. The following steps are carried out to compute the restrictive cost: a.maintaining a sorted list of said links sorted according to their restrictive cost C, b.forming logical sets of nodes by taking one link after the other from said list starting with the cheapest cost C and assigning an identifier to the two nodes connected by the respective link, whereby the nodes of a set of nodes carry a dominant unique identifier if a border node is a member of the respective set, or a unique identifier if there is no border node being a member of the respective set, uniting two sets, if such a link connects a node of a first set and a node of a second set, by assigning a dominant unique identifier to all nodes of both sets if either nodes of the first or the nodes of the second set carry a dominant unique identifier, or by assigning a unique identifier to all nodes of both sets if neither the nodes of the first nor the nodes of the second set carry a dominant unique identifier, c. applying a matrix update algorithm if said link connects a node of a first set and a node of a second set that both already carry dominant unique identifiers.

    29.
    发明专利
    未知

    公开(公告)号:DE69840809D1

    公开(公告)日:2009-06-18

    申请号:DE69840809

    申请日:1998-09-05

    Applicant: IBM

    Abstract: Scheme for the construction of the set of optimal complex node representations of a PNNI peer group based on a restrictive cost database (e.g. a cost matrix) associated with the border nodes. The resulting set of complex node representations is the optimal in that it contains all the possible complex node representations that use the minimum possible number of exception bypasses.

    30.
    发明专利
    未知

    公开(公告)号:DE60317925D1

    公开(公告)日:2008-01-17

    申请号:DE60317925

    申请日:2003-10-28

    Applicant: IBM

    Abstract: A method and an electronic unit are disclosed for controlling traffic on a network, especially for controlling peer-to-peer related traffic. A filter unit is intercepting messages related to peer-to-peer application from a network line, irrespective of the messages' destination, A control logic then manages a request represented by an intercepted message subject to its content and subject to peering specific information.

Patent Agency Ranking