Abstract:
Techniques for selectively off-loading workload across multiple data centers are disclosed. For example, a technique for processing a user request in accordance with a multiple data center environment comprises the following steps/operations. A user request is obtained at a first data center. The user request is classified based on one or more classification criterion. At least a portion of a workload associated with the classified user request is off-loaded to at least a second data center to be processed, wherein the off-loading step/operation is at least based on one or more administrative policies associated with at least one of the first data center and the second data center. The workload is processed such that the user request is at least substantially satisfied in accordance with a service level agreement for the requesting user.
Abstract:
PROBLEM TO BE SOLVED: To provide a method that adjusts one time authentication of a client between sets of a store in order to execute transaction at an optional store or an optional subset of a store. SOLUTION: In a client/server environment which includes participating servers 101 and a controller server 102 and has a server group 104 in which each server 101 can communicate with the server 102, this method with which operations are adjusted between servers of the group 104 includes (1) a step where communication is performed between a client 103 and a server of the group 104 by using a limited procedure or an undefined protocol through which state information is exchanged between the client 103 and the server, (2) a step where the client 103 transfers a request for an operation to one of servers and (3) a step where plural servers communicate with the server 102 in response to the request and the operations of at least some of servers are adjusted.
Abstract:
Techniques for selectively off-loading workload across multiple data centers are disclosed. For example, a technique for processing a user request in accordance with a multiple data center environment comprises the following steps/operations. A user request is obtained at a first data center. The user request is classified based on one or more classification criterion. At least a portion of a workload associated with the classified user request is off-loaded to at least a second data center to be processed, wherein the off-loading step/operation is at least based on one or more administrative policies associated with at least one of the first data center and the second data center. The workload is processed such that the user request is at least substantially satisfied in accordance with a service level agreement for the requesting user.
Abstract:
PROBLEM TO BE SOLVED: To regulate one authentication for a client among store sets to execute transaction in an optional store or an optional sub-session of the store. SOLUTION: This method for including an entry server and a controller server, and for coordinating actions among servers of a server group under a client/server environment having the server group in which the each entry server is communicated with the control server includes the following steps 1, 2 and 3. In the step 1, the communication is carried out using a protocol limited in a procedure for transferring condition information between the client and the server among the servers of the client and server groups, or an undefined protocol. In the step 2, an operation request is transferred from the client to one of the servers. In the step 3, the communication with the control server is carried out among the plurality of servers in response to the request to coordinating the actions for at least some of the servers. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To facilitate the retrieval of an object while using a cache by sending back an object requested from another node among plural nodes by using any one of plural protocols. SOLUTION: A client requests the object stored in a server (190). The request of the object is received by a network (192). The request of the object is routed to one cache node by a network dispatcher (194). It is determined whether the cache node to receive the request of the object from the network dispatcher is the first owner of the object or not (196). When it is the first owner, the cache node serves the request of the client (197). Then, the first owner retrieves the requested object by communicating with the server (198).
Abstract:
Apparatus and methods for identifying traffic patterns to web sites based on templates that characterize the arrival of traffic to the web sites are provided. Based on these templates, determinations are made as to which web sites should be co-located so as to optimize resource allocation. Specifically, web sites whose templates are complimentary, i.e. a first web site having a peak in arrival traffic at time t1 and a second web site that has a trough in arrival traffic at time tl, are designated as being candidat es for co-location. In addition, the present invention uses the templates identified for the traffic patterns of web sites to determine thresholds for offloading traffic to other servers. These thresholds include a first threshold at which offloading should be performed, a second threshold that takes into consideration the lead time needed to begin offloading, and a thi rd threshold that takes into consideration a lag time needed to stop all offloading of traffic to the other servers.
Abstract:
A multi-processor computer system in which each processor is under the control of separate system software and access a common database. A two level lock management system is used to prevent data corruption due to unsynchronized data access by the multiple processors. By this system, subsets of data in the database are assigned respectively different lock entities. Before a task running on one of the processors access data in the database it first requests permission to access the data in a given mode with reference to the appropriate lock entity. A first level lock manager handles these requests synchronously, using a simplified model of the locking system having shared and exclusive lock modes to either grant or deny the request. All requests are then forwarded to a second level lock manager which grants or denies the requests based on a more robust model of the locking system and queues denied requests. The denied requests are granted, in turn, as the tasks which have been granted access finish processing data in the database.
Abstract:
Techniques for selectively off-loading workload across multiple data centers are disclosed. For example, a technique for processing a user request in accordance with a multiple data center environment comprises the following steps/operations. A user request is obtained at a first data center. The user request is classified based on one or more classification criterion. At least a portion of a workload associated with the classified user request is off- loaded to at least a second data center to be processed, wherein the off- loading step/operation is at least based on one or more administrative policies associated with at least one of the first data center and the second data center. The workload is processed such that the user request is at least substantially satisfied in accordance with a service level agreement for the requesting user.
Abstract:
In a client-server environment having a server group including one or more participating servers and one or more controller servers, where each participating server can communicate with at least one controller server, a method for coordinating actions among the servers in the server group comprising the steps of: (1) communicating between a client and at least one of the servers in the server group using a protocol that has limited or no defined procedures for passing state information between the client and the servers; (2) transmitting a request for an action from the client to one of the servers; and (3) communicating among a plurality of servers with at least one controller server coordinating actions of at least some of the servers in response to the request. A preferred embodiment of the method includes providing client identification information once by the client during a conversation, verifying the client identification information by one or more controller servers, generating client authentication information by one or more controller servers that is preserved in the conversation, and using the preserved client authentication information to automatically authenticate the client during the remainder of the conversation. Another preferred embodiment of the method includes transmitting a request by a client requiring participation by a plurality of servers and communicating among the servers with at least one controller server coordinating the actions of a plurality of servers in response to the request from the client.
Abstract:
A technique for performing joins in parallel on a multiple processor database system effectively deals with data skew. The join operation is performed in three stages with an optional fourth stage. The first stage is a preparatory stage, the detail of which depends on the underlying join algorithm used. This preparatory stage provides pre-processing the results of which are used in the following stage as the basis for defining subtasks for the final join operation. The data provided in the first stage is used in the second stage to both define subtasks and to optimally allocate these subtasks to different processors in such a manner that the processors are close to equally loaded in the final join operation, even in the presence of data skew. This second stage is an assignment stage the details of which depend on the underlying join algorithm. Once the second stage has completed its processing of the subtasks, the subtasks are shipped to their assigned processors for processing and the final join of the two relations in the third stage. The method used in the final join operation depends on the underlying join algorithm used. Optionally, during the actual join as performed in the third stage, there could be a dynamic re-assignment of the subtasks should the join operation become unbalanced.