-
公开(公告)号:DE2615861A1
公开(公告)日:1977-03-10
申请号:DE2615861
申请日:1976-04-10
Applicant: IBM
Inventor: ATTANASIO CLEMENT RICHARD , BELADY LASZLO ANTAL
Abstract: An operating system authenticator for determining if an operating system being loaded in a computer is valid. A user's identification code or secret key which is unique to the operating system, and a verifier value which is a predetermined function of a valid operating system and the identification code are respectively stored. A hash function, which is a function of the operating system being loaded and the identification code, is generated by the authenticator. After the operating system is loaded, the hash function is used as an authenticating value and compared with the verifier value for determining the authenticity of the loaded operating system.
-
公开(公告)号:DE69328666D1
公开(公告)日:2000-06-21
申请号:DE69328666
申请日:1993-09-10
Applicant: IBM
Inventor: ATTANASIO CLEMENT RICHARD , SMITH STEPHEN EDWIN
Abstract: The present invention provides a method and apparatus for enabling a cluster of computers to appear as a single computer to host computers outside the cluster. A host computer communicates only with a gateway to access destination nodes and processes within the cluster. The gateway has at least one message switch which processes incoming and outgoing port type messages crossing the cluster boundary. This processing comprises examining certain information on the message headers and then changing some of this header information either to route an incoming message to the proper computer node, port and process or to make an outgoing message appear as if originated at the gateway node. The message switch uses a table to match incoming messages to a particular routing function which can be run to perform the changes necessary to correctly route different kinds of messages.
-
公开(公告)号:DE69328666T2
公开(公告)日:2001-02-01
申请号:DE69328666
申请日:1993-09-10
Applicant: IBM
Inventor: ATTANASIO CLEMENT RICHARD , SMITH STEPHEN EDWIN
Abstract: The present invention provides a method and apparatus for enabling a cluster of computers to appear as a single computer to host computers outside the cluster. A host computer communicates only with a gateway to access destination nodes and processes within the cluster. The gateway has at least one message switch which processes incoming and outgoing port type messages crossing the cluster boundary. This processing comprises examining certain information on the message headers and then changing some of this header information either to route an incoming message to the proper computer node, port and process or to make an outgoing message appear as if originated at the gateway node. The message switch uses a table to match incoming messages to a particular routing function which can be run to perform the changes necessary to correctly route different kinds of messages.
-
公开(公告)号:DE69521101T2
公开(公告)日:2001-10-18
申请号:DE69521101
申请日:1995-10-06
Applicant: IBM
Inventor: ATTANASIO CLEMENT RICHARD , BUTRICO MARIA ANGELA , PETERSON JAMES LYLE , POLYZOIS CHRISTOS ALKIVIADIS , SMITH STEPHEN EDWIN
Abstract: A system and method for recovering from failures in the disk access path of a clustered computing system. Each node of the clustered computing system is provided with proxy software for handling physical disk access requests from applications executing on the node and for directing the disk access requests to an appropriate server to which the disk is physically attached. The proxy software on each node maintains state information for all pending requests originating from that node. In response to detection of a failure along the disk access path, the proxy software on all of the nodes directs all further requests for disk access to a secondary node physically attached to the same disk.
-
公开(公告)号:DE69521101D1
公开(公告)日:2001-07-05
申请号:DE69521101
申请日:1995-10-06
Applicant: IBM
Inventor: ATTANASIO CLEMENT RICHARD , BUTRICO MARIA ANGELA , PETERSON JAMES LYLE , POLYZOIS CHRISTOS ALKIVIADIS , SMITH STEPHEN EDWIN
Abstract: A system and method for recovering from failures in the disk access path of a clustered computing system. Each node of the clustered computing system is provided with proxy software for handling physical disk access requests from applications executing on the node and for directing the disk access requests to an appropriate server to which the disk is physically attached. The proxy software on each node maintains state information for all pending requests originating from that node. In response to detection of a failure along the disk access path, the proxy software on all of the nodes directs all further requests for disk access to a secondary node physically attached to the same disk.
-
-
-
-