Abstract:
PURPOSE: To allow a moving radio mobile station to receive an incoming call in the private radio communication network consisting of an existing PBX and a LAN and integrating voice and data. CONSTITUTION: A 1st radio base station registers a LAN identification code of a 1st radio mobile station and assigns an extension number to the 1st radio mobile station in response to the 1st radio mobile station in existence its own radio cell. Then the 1st radio base station broadcasts call information including a LAN identification code of a 2nd radio mobile station and an extension number assigned to the 1st radio mobile station via a LAN channel. Then a 2nd radio base station registering the LAN identification code of the 2nd radio mobile station receives the call information via the LAN channel and transfers the call information to the 2nd radio mobile station via a radio channel. Then the 2nd radio mobile station dials an extension number included in the call information. Thus, the 1st radio mobile station receives an incoming call and a voice channel with the 2nd radio mobile station is connected.
Abstract:
PROBLEM TO BE SOLVED: To enable load distribution using a multipath in an SAS network.SOLUTION: In a path determination section 26 of an SAS expander connected to an SAS initiator and connected to an SAS target via first and second paths, an SSP control section 71 receives an SSP command frame received from the SAS initiator, a request data length management section 72 stores a request data length of the SSP command frame in a request data length storage section 73, and a data transfer amount management section 74 selects a path with less amount of data transfer out of the first and second paths stored in a data transfer amount storage section 75 and adds the request data length. The SSP command frame is then transmitted to the SAS target via the selected path and when an SSP response thereto is received, the request data length is deleted from the request data length storage section 73, and the request data length is subtracted from the data transfer amount of the selected path.
Abstract:
A method for controlling communication in a Mobile Integrated Voice and Dat (IVD) system, the system having a plurality of Cell Stations (CS's) interconnected through communication networks including a LAN, A PBX telephone network and Personal Stations (PS's). A first CS registers the LAN identifier of a first PS in accordance with the first PS that exists within its own radio cell, and assigns a PBX telephone number to the first PS. Subsequently, a calling information which includes a LAN identifier for the second PS and the PBX telephone number assigned to the first PS is broadcast via a LAN. Thereafter, the second CS which registers the LAN identifier of the second PS receives the calling information via a LAN and transfers the information of the second mobile station via radio link. The second PS then dials the PBX telephone number included in the calling information. Thus, the link between the first PS and the second PS is connected when the first PS receives the calling.
Abstract:
PROBLEM TO BE SOLVED: To allow multiple paths in an SAS network to be controlled without installation of a multipath driver on a host.SOLUTION: Each of SAS expanders 21a and 21b notifies of a virtual SAS address instead of its actual SAS address in response to an IDENTIFY ADDRESS frame from an SAS initiator 11. The SAS expander also notifies of an SAS topology including an SAS address of a virtual target port among SAS targets 32a, 32b and 32c instead of an SAS topology including SAS addresses of two actual target ports among the SAS targets 32a, 32b and 32c in response to a request of an SAS topology from the SAS initiator 11. Consequently, it appears that one SAS expander is connected to the SAS initiator 11 and three SAS targets are directly connected to the SAS expander.
Abstract:
PROBLEM TO BE SOLVED: To avoid a problem that a storage subsystem returns erroneous data to a host system without consuming storage capacity and without affecting reading performance. SOLUTION: When the data is transferred from disk drives 16 1 -16 n to a cache part 15 via a back-end I/F part 14, a redundant code verification part 13b of a data path control part 13 compares a writing history information (DC value) embedded in a redundant code of the data with a DC value embedded in a redundant code of corresponding parity and verifies whether or not the data is the erroneous data. In addition, when the data is updated, similar verification is performed when the old data for creating the parity is read and when the data is not the erroneous data, a redundant code generation part 13a of the data path control part 13 adds a redundant code in which a new DC value is embedded to a new piece of data and parity. When the data is the erroneous data, a control part 11 informs the host system of the occurrence of the problem via a front-end I/F part 12. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To realize the excellent noise suppressing performance of a hard disk drive without increasing a cost. SOLUTION: An active noise canceler 4 outputs a signal for requesting learning of a noise pattern to the hard disk drive 3, instructs the drive 3 to carry out the prescribed action, receives the noise sound of this case in a sound receiving section 12 and stores the relation between the head action information signal outputted from the drive 3 and the noise sound in a non-volatile memory section 11. The active noise canceler 4 generates a noise canceling sound by referencing the relation stored in the memory section 11 in accordance with the action information signal outputted from the drive 3. As a result, the requests for the speed responsiveness of necessary signal processing in calculating the noise canceling sound can be decreased. COPYRIGHT: (C)2003,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide gene analysis information, while protecting privacy. SOLUTION: An inquiry from the user 100 to a gene analysis system 104, having gene analysis information, is performed via an accounting system 103, and the accounting system 103 transfers the gene analysis information from the gene analysis system 104 to the user 100, using a via address which is set dynamically. Moreover, the gene analysis information is coded in the gene analysis system 104, and it is arranged, so that it cannot decoded by the accounting system 103. In this way, in the gene analysis system 104, the user 100 cannot be specified, and in the accounting system 103, the contents of the gene analysis information cannot be recognized, thus the privacy of the user 100 is protected.
Abstract:
PROBLEM TO BE SOLVED: To reduce the trouble and faults in configuring setting on access between a plurality of management units. SOLUTION: In a zone management module 20 in a blade server system, a ZP (zone permission) table generating part 21 receives user setting information on access between ports or between ZGIDs (zone group ID), generates a ZP table on the basis of the setting information and stores the ZP table in a ZP table storing part 22, and an I/T (initiator/target) table generating part 23 acquires a port attribute or a ZGID attribute, generates an I/T table on the basis of the port attribute or the ZGID attribute and stores the I/T table in an I/T table storing part 24. A validity verifying part 25 verifies whether the ZP table in the ZP table storing part 22 is in consistency with the I/T table in the I/T table storing part 24, a message output part 26 outputs a message based on a verification result, and a ZP table output part 27 outputs a finally determined ZP table so as to be applied. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method that can access a Web site and acquire information from the Web site at high speed and with high reliability. SOLUTION: A content provider receives contents provided by content clients 101 to 103 as clients for providing contents, delivers the contents from a delivery source server 105 to Internet servers 116 to 119 of a plurality of Internet service providers, and stores them in free spaces. The Internet servers 116 to 119 each functions as a mirror server for providing the contents. Access to contents from a terminal 121 of a user is made to the mirror server operated by the Internet server 116, which then provides the user with the contents. In the method, the provision of contents is not via IX lines connecting the providers together (lines called a backbone to Internet exchange points). The user can thus access contents at high speed and with high reliability. COPYRIGHT: (C)2003,JPO
Abstract:
PURPOSE: To provide a multiport bridge which is controlled by a program to control only two-port bridges in particular. CONSTITUTION: The multiport bridge is equipped with a token ring network(TRN) adapter 70 connected to a port 50, other ISDN adapter 71 or 77 connected to either a port 51 or 55 and a processor 86 which provides a virtual bridge means and virtual token ring means between the adapters. The processor 86 provides by means of a program a virtual bridge module 120 with the TRN adapter 70 and a virtual bridge module 121 or 127 with the IDSN adapter 71 or 77 connected to either the port 51 or 57. The processor 86 provides a virtual token ring module 128 which connects the virtual bridge module 121 or 127.