Patent application number | Description | Published |
20080198740 | Service take-over system of multi-host system and method therefor - A service take-over system of a multi-host system and a method therefor are provided, in which the multi-host system includes a service host and at least one standby host with their operating state monitored mutually via a heartbeat mechanism. When the service host for providing a service externally fails, an external public IP address for providing a service externally of the service host is taken over to a standby host. A service environment required for taking over the service of the service host to the standby host is prepared. The preparation state of the service environment is detected, and access request data packets via the external public IP address to the service are dropped before the service environment gets ready. The service is taken over after the service environment is ready, and the access request data packets to the service are received, so as to provide the service externally. | 08-21-2008 |
20080198762 | Cross-subnet-nodes subnet node device detection method - A cross-subnet-nodes network node device detection method is provided, including the steps of disposing a boot module in each network node devices in an arbitrary subnet of a network; activating the first subnet node device to be a registry server and recording its registry information; activating other network node devices in the subnet, and dispatching the registry information of these devices to the registry server and recording it; searching for the IP address of the first available network node device in the subnet; issuing a command for searching the registry server, issuing a registry information command by the first available network node device, and obtaining the IP address of the registry server and sending it back to the discovery server; and upon receiving a command for searching the network node devices by the registry server, transmitting the information of the node devices in a subnet back to the discovery server. | 08-21-2008 |
20080198846 | System and method of data transmission and method of selecting communication path for dual-controller system - A data transmission system and method and a method of selecting a communication path for a dual-controller system are provided, which are applied in a first controller and a second controller of the dual-controller system. First of all, a corresponding transmission medium is selected according to a feature of a data request issued by a controller, then the data request is converted into a data format compatible with a medium interface corresponding to the selected transmission medium and is sent to a corresponding medium driving portion connected with the medium interface, and the data request is sent to another controller through the medium driving portion and a connected corresponding medium controller, so as to select a path of the highest transmission performance, and realize the data transmission between the two controllers. | 08-21-2008 |
20080201514 | Method of locating peripheral component interconnect devices - A method of locating peripheral component interconnect (PCI) devices is provided. The method includes analyzing peripheral component interconnect spaces (PCI spaces) of peripheral component interconnect-peripheral component interconnect bridges (PCI-PCI bridges) of a 0-numbered bus, so as to obtain a bus number of a next bus connected to each of PCI-PCI bridges and record the bus number in a linked list; continuing to record a bus number of a next bus connected to the PCI-PCI bridges corresponding to the bus number recorded in the linked list; and when no next bus number is found, traversing and locating the PCI devices according to all of the bus numbers recorded in the linked list. | 08-21-2008 |
20080201551 | Virtual disk router system and virtual disk access system and method therefor - A virtual disk (VD) router system, a VD access system, and a method therefor, applied to a dual-controller system including a first controller and a second controller, are provided. First, a mapping virtual block device (VBD) corresponding to a VD of the second controller and/or the first controller is established in the first controller and/or the second controller, and a mapping relation list and a data transmission channel of the VD and the corresponding VBD thereof are established. When the first controller/the second controller issues an access request to the VD of the second controller/the first controller, the data transmission channel is used to transmit the access request to the VD and transmit the response data to the access request from the VD. Therefore, the overall access to all the VDs in the dual-controller system can be achieved. | 08-21-2008 |
20080201605 | Dead man timer detecting method, multiprocessor switching method and processor hot plug support method - A Dead man timer detecting method, a multiprocessor switching method, and a processor hot plug support method are provided. A hot spare boot control register communicated with the Dead man timer is used to detect functions of the Dead man timer, such as enabling, timing, disabling, and responding. After an operation system is booted, the Dead man timer is used to achieve automatic switch among multiple processors and the support for the processor hot plug. The method can detect various functions of the Dead man timer, and be switched among multiple processors automatically and periodically, without being limited by the type of operation systems and processors, and realize the support to the processor hot plug, thereby improving the safety for the hot plug operation. | 08-21-2008 |
20080201610 | Integrated test method on multi-operating system platform - An integrated test method on a multi-operation system (OS) platform for performing an integrated test of a file system and disk performance in a computer with an extended firmware interface (EFI) system environment on multiple OS platforms is provided. The method includes the following steps. Scan sectors of an entire physical hard disk and perform a hardware underlying test of a disk device in the EFI environment; select and load an OS, then enter the OS environment to test the file system and the disk performance in the system environment; exit from the OS and return to the EFI environment to summarize a test result; determine whether it is necessary to load other OSes, if necessary, return and load other OSes, and if not, send the summarized test result to a server terminal for analysis and processing. | 08-21-2008 |
20080201614 | Peripheral component interconnect bus test system and method therefor - A peripheral component interconnect (PCI) bus test system and method therefor, that is applied in a PCI test card. The PCI test card includes a static random-access-memory (SRAM). In the method, the data transaction of the PCI bus signal is disintegrated into a separate data operation, while eliminating the waveform interfering transaction. Through comparing the waveform of the data operation as separated from a PCI bus signal with the standard PCI bus waveform, the quality of the PCI bus signals can be precisely analyzed, thus realizing the hardware test of PCI bus. | 08-21-2008 |
20080205286 | Test system using local loop to establish connection to baseboard management control and method therefor - A test system using a local loop to establish connection to baseboard management control is provided. The test system includes more than one host terminals having at least one network interface card (NIC) and at least one baseboard management controller (BMC) having one NIC. After establishing a connection for test between the host terminals and a remote subscriber, a connection for loop test is established with the BMC through a virtual address, so as to deliver a test instruction to the BMC for testing and to loop back a test result. The test system establishes the connection for loop test through the virtual address so as to perform a remote platform test similar to an inner loop test. Therefore, the test result will not be influenced by a network environment setting, and thus a batch test can be adopted to save the test time. | 08-28-2008 |
20080209031 | Method of collecting and managing computer device information - A method of collecting and managing computer device information is provided to collect, analyze, and manage device information of a plurality of client computers in a network through a server/client application program. The method includes installing and running a client server application program on client computers in a network and installing and running a server management application program on a server in the network; after each of the client computer is booted, selecting a corresponding data acquisition method according to the type of the operating system of the client computer, so as to perform data acquisition on the device information of the computer in real time; analyzing and summarizing the acquired device information and then sequentially assorting and storing the information; monitoring and recording the changes of the information in real time; and sending the stored information and the changes thereof to the server for statistical analysis and tracking management. | 08-28-2008 |
20080209032 | Alarm method for insufficient storage space of network storage system - An alarm method for insufficient storage space of a network storage system is provided. The method includes the following steps. Preset a time alarm threshold value according to a current operation state of the system when allocating storage spaces to users. Estimate a time that written data fully occupy a current remaining space according to a data writing speed to the storage space, a current idle memory of the system, total dirty data in a cache of the system, and the current remaining space in the storage space. Compare the estimated time value and the time alarm threshold value. And, send alarm information when the estimated time value is smaller than the time alarm threshold value. By setting the alarm threshold value of a time concept, a timely alarm of insufficient storage space is realized, which enhances the effective management of the storage space. | 08-28-2008 |
20080209100 | Hard disk testing method under extensible firmware interface - A hard disk testing method under an extensible firmware interface (EFI) is provided, which includes the following steps. A system file is backed up from the EFI of the hard disk into a storage area of a memory. The backup area of the system file is mapped as a real hard disk. A non-system file storage area is established in the memory, so as to store the non-system files of a hard disk test. Information of the system and non-system files of the hard disk test is acquired, so as to generate a system and a non-system file link table. When performing the test, the non-system files are backed up into the non-system file storage area. The system file link table and/or the non-system file link table is accessed, so as to load the system file and/or the non-system files directly from the storage area of the memory. | 08-28-2008 |
20080209122 | Method of automatically adjusting size of copy-on-write disk space of snapshot device - A method of automatically adjusting a size of a copy-on-write (COW) disk space of a snapshot device is provided. A first disk space of a snapshot device is initialized, and a COW operation is performed on a chunk of the first disk space. Next, it is determined whether a chunk sequence number of a write request is in the first disk space. Then, if the chuck sequence number of the write request is in the first disk space, the first disk space is maintained. Then, if the chuck sequence number of the write request is not in the first disk space, a second disk space is initialized, and the number of chunks of the second disk space is the same as the number of maximum successive chunks of the first disk space, and then, the COW operation is performed on the chunk of the second disk space. | 08-28-2008 |
20080209261 | Data repair and synchronization method of dual flash read only memory - A data repair and synchronization method of dual flash ROM is provided, which includes a first flash ROM and a second flash ROM that store the same system data, wherein one of the first flash ROM and the second flash ROM is used to perform a data repair on the other flash ROM with damaged data and perform a data synchronization between the two flash ROMs, thereby ensuring that once the data in one flash ROM is damaged during the system operation, the complete system data stored in the other flash ROM is used to recover the damaged operating system and the files in the system. Meanwhile, through performing the data synchronization periodically, important configuration files in the system stored in the two flash ROMs are kept to be updated and completed. | 08-28-2008 |
20080209418 | Method of dynamically adjusting number of task request - A method of dynamically adjusting the number of task requests is provided, which is applicable to an Internet Small Computer System Interface (iSCSI) protocol. When a target receives a task request transmitted by an initiator or the target completes the task request, the number of transmissible tasks is calculated according to an average access data volume, an current access data volume, and an allowable access data volume in the target, and returned to the initiator, such that the number of the task requests transmitted simultaneously by the initiator does not exceed the number of transmissible tasks, thereby achieving flow control. The allowable access data volume is obtained through interactive and dynamic adjustment between the target and the initiator. | 08-28-2008 |
20080222404 | In-system programming system and method for motherboard - An in-system programming system and method is provided, which is applicable for chip programming of a computer motherboard. Firstly, a programming interface is configured in the computer motherboard, in which one end of the programming interface is connected to an on-board programmer, and the other end is connected to a plurality of chips to be programmed, thereby achieving the communication between the on-board programmer and the chips. Next, a motherboard connector and the programming interface are connected, and the motherboard connector and the on-board programmer are communicated through a communication interface of the on-board programmer. Then, the other end of the motherboard connector is connected to a programmable master-control program. Then, when the programmable master-control program is used for programming, programming contents of the programmable master-control program are transmitted to the on-board programmer through the communication between the motherboard connector and the on-board programmer, so as to program the chip. | 09-11-2008 |
20090080668 | Apparatus and method for testing sound input and output of sound card - An apparatus and a method for testing a sound card are applicable for detecting whether a sound leakage problem occurs to a sounding interface of the sound card. The testing apparatus includes a switching circuit and a switching unit. The switching circuit is electrically connected to the sounding interface and a sound-receiving interface of the sound card respectively, and has a plurality of transfer paths. The switching circuit is used to receive a first and a second sound channel, and to connect the first and the second sound channel to corresponding transfer paths, so as to transmit the audio signal back to the sound-receiving interface. The switching unit is electrically connected to the sounding interface and the switching circuit, for receiving the first and the second sound channel. The switching unit alters the transfer paths in the switching circuit according to a first and/or a second switching audio signal. | 03-26-2009 |
20090083481 | METHOD FOR MAPPING WRITE OPERATION OF RAID DEVICE - A method for mapping a write operation of an RAID device, includes flowing steps, initiating a mirroring device built in each member disk of the RAID device; activating a kernel thread, for monitoring the operation state of the RAID device, and recording current usage information; and if an incorrect write operation occurs to a member disk of the RAID device, storing the data of the incorrect write operation into a mirroring device of another member disk of the RAID device through the kernel thread. The method ensures the integrity and safety of the data stored in the RAID device and prevents the data from being lost when the member disk of the RAID device is replaced or severely damaged. | 03-26-2009 |
20090083486 | TESTING DEVICE OF CARD READING INTERFACE AND TESTING METHOD THEREOF - A testing device and method of card reading interface are applied to a card reading interface including a plurality of memory cards, and are used to integrate memory card interfaces in a memory card slot. The testing device includes memory cards, a switching unit, a connecting part, and a connecting circuit. Wherein, the switching unit receives a switching instruction and selects a corresponding memory card according to the switching instruction. The connecting part is electrically connected between the memory card slot and the switching unit. The connecting circuit is connected between the switching unit and the memory cards, and transmits detection data to the laptop computer. The laptop computer checks the detection data before testing and after testing. Thus, the device and method thereof can detects function normally or not on the memory card slot, and reduces the plugging times from the memory card slot. | 03-26-2009 |
20090083503 | SYSTEM OF CREATING LOGICAL VOLUME AND METHOD THEREOF - A system of creating logical volume and method thereof is used to solve the problems such as creation steps are complicated, a space of storage medium is wasted and the number of snapshots to be created is limited. An available logical volume space and a timestamp storage area are allocated in the logical volume according to space allocation algorithm. According to original data and data amended at subsequent time point in the logical volume, copy-on-write operation is sequentially performed on the amended data in the logical volume to create a timestamp corresponding to the time point. The timestamp of the corresponding time point is stored in the timestamp storage area. A storage medium offset address pointer is created to record writing position of the copy-on-write operation of the corresponding time point. And the pointer is stored in the storage medium to serve as index information of address of each timestamp. | 03-26-2009 |
20090083585 | METHOD OF PRESSURE TESTING FOR PERIPHERAL COMPONENT INTERCONNECT (PCI) BUS STAGE - A method of pressure testing for peripheral component interconnect (PCI) bus stage that is used in the overall pressure testing of PCI bus. The method includes the steps of reviewing all the PCI buses in a system; obtaining a tree-shaped structure of the all the PCI buses and PCI devices of the entire system, and selecting from them a branch of PCI bus as an object of testing; performing peripheral component interconnect function test, input/output function test, and memory mapping function test of the PCI bus relative to this object of testing; and selecting a branch of PCI bus from among the remaining branches of PCI buses of the system as an object of testing to proceed with the related tests of PCI bus mentioned above, until all the branches of PCI buses to be tested have finished testing. | 03-26-2009 |
20090085605 | SYSTEM AND METHOD FOR PARALLEL BURNING USING MULTIPLEX TECHNOLOGY - A system and method for parallel burning using multiplex technology is used for burning chips of different bus types on the same transmission bus at the same time in parallel. A main control unit divides bandwidth of the transmission bus into different frequency bands, sends a control command including a command for sending data carrying bus signals of designated types, and controls data carrying the bus signals of the designated types to be transmitted in designated frequency bands of the transmission bus. Then, a sending unit sends the data carrying the bus signals of the designated types in the designated frequency band. Finally, receiving units receive the data transmitted in the designated frequency bands, and then output them to a plurality of burners such as to burn the data onto the chips of the designated bus types in parallel. | 04-02-2009 |
20090086985 | Apparatus and method for testing audio jacks of sound card - An apparatus and a method for testing audio jacks of a sound card are applicable for detecting whether at least one audio jack of the sound card in a personal computer (PC) sounds normally. Each audio jack provides at least one sound channel for transmitting a sound signal. The testing system includes driving circuits and a plurality of light-emitting units. The driving circuits are electrically connected to the sound card and an external voltage source, and used to change a current transmitting path according to the received sound signal. The light-emitting units are electrically connected to the driving circuits, and receive the current generated from the driving circuit, such that the light-emitting units emit lights. A sound channel to be tested is selected first, and a sound signal is sent to the sound channel. After the testing apparatus receives the sound signal, the light-emitting units emit lights. | 04-02-2009 |
20090089003 | Accessory-testing device and method therefor - An accessory-testing device for an information processing apparatus includes a micro-processing unit (MPU) and a signal conversion unit. The MPU sends a mimic signal. The signal conversion unit is electrically connected to the MPU and an accessory respectively, for receiving the mimic signal and converting the mimic signal into a test signal to test the accessory. The accessory receives the test signal and then responds to the test signal to output a feedback signal. The feedback signal is received by the signal conversion unit and transmitted to the MPU, such that the MPU determines if the accessory operates normally according to the feedback signal. Conventional testing methods are Therefore, it is achieved that the effects of reducing the inspection time and improving the production efficiency. | 04-02-2009 |
20090089469 | Parallel burunig system and method - A parallel burning system and method is for burning chips of various different bus types in parallel. A computer compiles configuration information according to corresponding connection relations between the chips and the micro controller units, and transmits the configuration information, burning command and burning data to a master micro controller unit of the micro controller units. The master micro controller unit distributes the burning data to slave micro controller units of the micro controller units based on the analyzed configuration information, and controls each slave micro controller unit to activate its burning operation. Then, the slave micro controller units burn the burning data onto the chips connected thereto, and transmit the burning results back to the master micro controller unit after completion of the burning operations. Finally, the master micro controller unit transmits the burning results back to the computer after completion of all the burning operations. | 04-02-2009 |
20090102426 | CHARGING SYSTEM AND METHOD FOR ELECTRONIC DEVICE - A charging system and method for an electronic device are used for controlling an external charging power supply to charge the electronic device. Electric quantity detection software running on the electronic device is used to detect electric quantity of a battery of the electronic device and to generate a signal indicating a message of performing a charging operation or indicating a message of stopping the charging operation. A Universal Serial Bus (USB) interface is disposed in the electronic device to output the signal. A USB control chip, disposed in a charging device, receives the signal and controls a switch to turn on or turn off the external charging power supply to charge or stop charging the electronic device. The charging system and method for an electronic device can effectively control the electric quantity of the battery of the electronic device without requiring a charging control circuit. | 04-23-2009 |
20090106401 | System and method for Intra Network Internet Protocol (IP) address modification by dual controller - An intranet IP address modification system and method for a dual controller, and is used to modify the intranet IP addresses dynamically under the condition of keeping an intranet based TCP connection of a dual controller from disruption and disconnection. Before modifying the intranet IP address, blocking all data transmission of an intranet connection simultaneously at both ends of the intranet connection of a dual controller; next, re-determining the network card IP's at both ends of the intranet connection based on a conflicting internet IP address; then, revising the intranet IP's and routing table according to the re-determined IP address, modifying correspondingly the remote terminal IP's in an ARP buffer storage and a corresponding MAC address, and modifying correspondingly portal IP address of the intranet connection; and finally, upon the completion of intranet IP address modification, resuming data transmission of the intranet connection simultaneously at both ends of the connection. | 04-23-2009 |
20090108809 | CHARGING SYSTEM AND METHOD FOR ELECTRONIC DEVICE CONTROLLED BY AUDIO OUTPUT - A charging system and method for an electronic device controlled by audio output are used for controlling an external charging power supply to charge the electronic device. An electric quantity detection software runs on the electronic device, for detecting an electric quantity of the electronic device and generating audio signals indicating a message of performing a charging operation or a message of stopping the charging operation. An audio output interface is disposed on the electronic device for outputting the audio signals. A decoding device is connected to the audio output interface for receiving the audio signal and controlling the external charging power supply to perform the charging operation or to stop the charging operation on the electronic device. The charging system and method for the electronic device can effectively control the electric quantity of the electronic device, without requiring any charging control circuits. | 04-30-2009 |
20090109864 | Network card testing system - A network card testing system includes a network card testing set, a network card, and a network card testing software. A plurality of twisted pairs in the network card testing set is connected with one another to form a loop. When the network card testing set is connected to the network card, a test loop is formed. The network card testing software is executed by a computer, and test data packets are directly generated and transferred through a data-link layer according to different testing strategies and network card information. And then, the test data packets are sent back through the formed test loop, and test results are calculated according to the test data packets. | 04-30-2009 |
20090113130 | SYSTEM AND METHOD FOR UPDATING DIRTY DATA OF DESIGNATED RAW DEVICE - A system and method for updating dirty data of designated raw device is applied in Linux system. A format of a command parameter for updating the dirty data of the designated raw device is determined, to obtain the command parameter with the correct format and transmit it into the Kernel of the Linux system. Then, a data structure of the designated raw device is sought based on the command parameter, to obtain a fast search tree of the designated raw device. Finally, all dirty data pages of the designated raw device are found by the fast search tree, and then are updated into a magnetic disk in a synchronous or asynchronous manner. Therefore, the dirty data of an individual raw device can be updated and written into the magnetic disk without interrupting the normal operation of the system, hereby ensuring secure, convenient, and highly efficient update of the dirty data. | 04-30-2009 |
20090113249 | Stress testing method of file system - A stress testing method of a file system includes traversing local or network storage devices with a drive letter; detecting a network mapping path of the network storage devices; calculating an absolute path of all the storage devices through a mounted point and a system volume; collecting the above information to update the path information of the file system; and then calling a corresponding test algorithm and stressing strategy according to different types of storage devices, so as to perform the stress test. The stress testing method can make the file system display storage devices without a drive letter, and call appropriate testing methods and stressing strategies for different types of storage devices, so the depth and scope of the stress testing for file system are expanded, the accuracy of the test is enhanced, and the problem of occupying too many system resources is avoided. | 04-30-2009 |
20090113454 | SYSTEM AND METHOD OF TESTING BRIDGE SAS CHANNELS - A system and a method of testing bridge SAS channels includes a control terminal, a hot-plug bridge interface, a first adaptor, an SAS back plate, and a second adaptor. The control terminal selects an SAS interface as a transmission path for sending a test signal. The hot-plug bridge interface receives and converts the test signal sent from the control terminal. The hot-plug bridge interface has a hot-plug function. The first adaptor is connected to the hot-plug bridge interface and the SAS back plate. The second adaptor is connected between the SAS back plate and a terminal unit. The control terminal sends the test signal and detects a signal under test sent back from the terminal unit, and compares whether they are consistent with each other or not. In this way, the control terminal determines whether the SAS interfaces in the SAS back plate run normally or not. | 04-30-2009 |
20090113455 | Network card testing method - A network card testing method, used to test if the network card is capable of functioning normally in a computer having Extended Firmware Interface (EFI) system. Wherein, in a protocol assignment table is recorded the connection relations of a network protocol of Extended Firmware Interface, and a driver program corresponding to a network driver interface specification (NDIS) layer. In addition, the driver corresponding to the network card is loaded at the NDIS layer. In implementing the network card test program, though the utilization of an additionally written EFI pseudo program as a medium of transmitting data for the network card testing program, and also though the utilization of an additionally written intermediate filter driver in invoking a driver suitable for the network card, the hardware testing of network card can be realized, thus increasing the category and scope of the network card testing supported by an EFI system. | 04-30-2009 |
20090119059 | Position Detecting System and Method for Electronic Device - A position detecting system and method for an electronic device used an audio signal input module of the electronic device and a signal receiver to connect to the audio signal input module convert an external position signal into an audio signal. A position detecting software running on the electronic device analyzes the audio signal. Accordingly, the current position of the electronic device is obtained. The audio signal input module of the electronic device is employed as an input port for the external position signal, thus saving the construction cost of the system. Besides, the current position of the electronic device with an ever-changing position can be obtained during a test process, such that the electronic device can start or stop a test item accordingly. | 05-07-2009 |
20090132534 | Remote replication synchronizing/accessing system and method thereof - A remote replication synchronizing/accessing system and a method thereof applied between a local system and a remote mirroring system of the local system. After the remote mirroring system is created, an initialization synchronous operation of the remote mirroring system is sequentially performed according to a sequence of data blocks in storage of the local system. A small-granulated exclusive lock function is established between the initialization synchronous operation and a data-accessing request operation of the local system. During the initialization synchronous process of the remote mirroring system, it is determined whether a data block position corresponding to the current initialization synchronous operation is the same as that corresponding to the data-accessing request operation or not. Finally, according to a position determination result and the small-granulated exclusive lock function, a data-accessing request is directed processed or processed after finishing the initialization synchronous operation. | 05-21-2009 |
20090132765 | DUAL CONTROLLER STORAGE APPARATUS AND CACHE MEMORY MIRROR METHOD THEREOF - A dual controller storage apparatus and a cache memory mirror method thereof are described. The storage apparatus includes a imaging environment module, a storage device, a first controller, and a second controller. The first controller has a virtual disk and a first cache memory. The second controller has a second cache memory. The present invent provides a imaging environment function to select the first or the second controller to serve an extranet according to the request of the extranet. If the imaging environment function selects the second controller, the data received from the extranet is written into the second cache memory. Communication between the second controller and the first controller is established, and the data of the second controller received from the extranet into the first cache memory and the virtual disk. | 05-21-2009 |
20090132772 | System and method for performing data reading and writing on physical storage device - A system and a method for performing data reading and writing on a physical storage device. A plurality of controllers under a common storage environment is used to realize data read and write operation performed on the physical storage device by a remote client. Firstly, the client assigns a controller in the plurality of controllers as a controller for executing the read and write operation, and each controller performs transmission of management data and cache data of the data to be written in the physical storage device through interlink. Then, the assigned controller reads data from the physical storage device or writes data into the physical storage device through corresponding logical storage device. | 05-21-2009 |
20090132860 | SYSTEM AND METHOD FOR RAPIDLY DIAGNOSING BUGS OF SYSTEM SOFTWARE - A system and a method for rapidly diagnosing bugs of system software are apply for rapidly localizing a system program fault that causes a system error and then feeding back to a subscriber. First, according to the subscriber's requirement, a program of system fault analysis standard is preset and written into the system. Next, a plurality of fault insertion points is added into a program module of the system according to the subscriber's requirement for the precision of the fault analysis result. Then, fault management information is generated at the fault insertion points during the running process of the system program, and the management information is monitored for collecting relevant system fault data. After that, the collected system fault data is analyzed in real time through the program of system fault analysis standard, so as to obtain the minimum fault set for causing the system error. | 05-21-2009 |
20090138530 | Data management method for logical volume manager - A data management method for logical volume manager (LVM), called LVM includes a first type of physical volume and a second type of physical volume. Access speed of the first type of physical volume is higher than that of the second type of physical volume. Each physical volume has a plurality of physical extents, and a data storage method includes the following steps. Obtaining access frequencies of all the physical extents in statistics; performing a data migration operation, migrating and saving data in the physical extents satisfying an access frequency threshold value in the second type of physical volume to the physical extents without any data in the first type of physical volume; and rewriting a corresponding physical extent number for the migrated data. | 05-28-2009 |
20090138656 | Method of skipping synchronization process for initialization of RAID1 device - A method for skipping an initialization process of synchronization of an RAID 1 device skips synchronization process of the RAID1 device through a bitmap technique. First, an RAID1 device is established, a space of the same size is divided from each member disk of the RAID1 device for storing a bitmap corresponding to each data block on each member disk. When a read/write operation is executed on the RAID1 device, before the bit value in the bitmap corresponding to the data block is read, whether the bitmap exists or not is determined first, then corresponding operation is executed according to the bit value in the bitmap corresponding to data block requesting the read/write operation. The method skips synchronization process of the RAID 1 device during the initial establishment, thereby largely saving the time required by the synchronization process for initialization, and further improving the overall performance of the RAID1 device. | 05-28-2009 |
20090138657 | DATA BACKUP SYSTEM FOR LOGICAL VOLUME MANAGER AND METHOD THEREOF - A data backup system for a logical volume manager (LVM) and a method thereof, capable of realizing data backup in the LVM having a battery backed cache memory (BBCM). The data backup system includes a physical storage device, a BBCM, an LVM, and a data backup function. The physical storage device is used to store data of the LVM. The BBCM is used to provide a plurality of index regions and a plurality of data regions. The LVM is used to manage data save position of the physical storage device. The data backup function is used to look up whether the BBCM saves the data to be backed up by the logical volume. If the BBCM has the data, the BBCM reads out the data to be backed up, and writes the data into a snapshot volume (SV). | 05-28-2009 |
20090158284 | SYSTEM AND METHOD OF PROCESSING SENDER REQUESTS FOR REMOTE REPLICATION - A system and a method of processing sender requests for remote replication are applied in local system having a plurality of network block devices (NBD). A fixed number of sender threads are created in local system to form sender thread pool. All NBDs receiving write request for corresponding remote mirror volume are serially connected to be circular linked list. A pointer is set to sequentially record latest processed NBD in circular linked list, the sender threads in the sender thread pool are allocated to actively search NBD to be processed pointed by the pointer according to a sequence in circular linked list, and processing of NBD pointed by the pointer is locked by using the sender thread, hence processing the sender request of NBD. Each time when the sender request is finished, the pointer is sequentially moved to next NBD and the sender request of corresponding NBD is performed. | 06-18-2009 |
20090178140 | NETWORK INTRUSION DETECTION SYSTEM - A network intrusion detection system (IDS) is built at an important network node and used to detect and monitor network packets. The network intrusion detection system includes a network card and a system core processor. When receiving a network packet, a micro-processor of the network card performs a packet decode procedure and a packet preprocess procedure, thereby verifying a type and a source address of the packet in advance and converting the packet into an IDS format packet. Afterwards, the system core processor determines whether the packet is an intrusion packet. Since the computation of the packet decode procedure and the packet pre-process procedure is handled by the network card, the network intrusion detection system will not lose packets due to too heavy computation burden, thereby greatly improving the accuracy of the network intrusion detection system. | 07-09-2009 |
20090182887 | Data transmission and writing method using multicast data flows - A data transmission and writing method using multicast data flows is used for performing data transmission and writing operation of a mirror file on one or more client computers simultaneously by multicast data flows sent from various servers, in a network system architecture having a plurality of client computers and servers. Firstly, the client computer sends a request information to each server in the network by using a broadcast protocol, then the client computer is added into a plurality of multicast data flows sent by a plurality of corresponding servers according to response of each server. The data of different designated parts of the mirror file required to be downloaded is received, and the received data is finally written into a disk of the client computer. This method effectively improves data transmission amount through multicast technique of network and by fully utilizing hardware performance of the client computers. | 07-16-2009 |
20090185761 | METHOD OF GENERATING IMAGE FILE - A method of generating an image file may generate corresponding image files from data units in a first storage device of a source. The method of generating an image file includes generating an image file head according to hardware parameter information of the first storage device; partitioning the first storage device into a plurality of data units with the same size; performing a compression process to compress data in the data units, respectively, thereby generating corresponding compressed data blocks; sequentially storing the compressed data blocks in a data area of the image file; creating an index table to use an index value to record start positions of the data units in the first storage device and positions of the compressed data blocks in the data area into the index table; and creating a file foot information to mark a file length of the image file. | 07-23-2009 |
20090185762 | DATA STRUCTURE FOR IMAGE FILE - A data structure for an image file includes an image file head, a data area, an index table, and file tail information. The image file head records hardware parameter information of a storage device and partitions the storage device into a plurality of data units. The data units are compressed to generate corresponding compressed data blocks. The generated compressed data blocks are stored in the data area. The index table uses an index value to record start positions of the data units and positions of the compressed data blocks in the image file into the index table. The file tail information marks a file length of the image file. During network transmission of the image file, a destination may restore the received compressed data blocks to the corresponding positions. | 07-23-2009 |
20090187684 | AUTOMATIC INSPECTION SYSTEM AND METHOD FOR NOTEBOOK COMPUTER KEYBOARD INTERFACE - An automatic inspection system and method for a notebook computer keyboard interface are described. The method includes the following steps including scanning a notebook computer keyboard array to obtain a keyboard position corresponding table; running a testing software in the notebook computer to obtain a position value of a key under test from the keyboard position corresponding table; receiving a testing command from the testing software by an USB interface; constituting a virtual keyboard matrix with at least one matrix switching chip, for controlling the close action of a corresponding key position in the virtual keyboard matrix according to the testing command; transferring the actual key position value corresponding to the output close action to the notebook computer according to the configuration of the notebook computer keyboard interface; and receiving and comparing the actual key position value with the position value of the key under test. | 07-23-2009 |
20090187719 | DATA BACKUP METHOD FOR LOGICAL VOLUME MANAGER - A data backup method for logical volume manager (LVM) is used for backup the original data in the LV when adding newly data into a logical volume of the LVM. Before adding a snapshot volume, a new storage space is created. The LVM writes the data to be altered in the logical volume into the new storage space. The LVM then renames the logical volume to the snapshot volume, and names the new storage space to the logical volume. According to the method, reading and writing times of the physical disk can be reduced, so as to quicken backup efficiency. | 07-23-2009 |
20090193436 | Alarm display system of cluster storage system and method thereof - An alarm display system of a cluster storage system and a method thereof are described. A reasonable single abnormal event processing manner is adopted to classify the alarm priority through abnormal events detected by different nodes sharing a common device in the cluster storage system, and analyze load of each node. That is, nodes with lower loads are analyzed to obtain all the abnormal events of the common device and the node most affected by the abnormal events in the cluster storage system. Afterward, the analysis result is transmitted to each node, and each node then informs a subscriber with an alarm prompt, so as to reasonably and correctly alarm the subscriber with abnormal events of the common device and impacts thereof on the nodes. | 07-30-2009 |
20090198768 | ASYNCHRONOUS REQUEST-RESPONSE COMMUNICATION METHOD - An asynchronous request-response communication method is applied in data transmission for applications running in a server. The asynchronous request-response method includes the following steps. Establish a socket and a connection port corresponding to a request in a request side; set an object pool in each request side respectively, for recording connection statuses of the sockets corresponding to different requests; wait till the server has finished the request; once the server has finished the received request, the server transmits a callback message to the corresponding socket of the request side; and search a corresponding process event in the object pool according to the callback message. The request side adopts the socket and the connection port to perform the asynchronous request-response operations, thereby reducing the connection load between the server and the request side. | 08-06-2009 |
20090198830 | METHOD OF ADJUSTING NETWORK DATA SENDING SPEED ACCORDING TO DATA PROCESSING SPEED AT CLIENT - A method of adjusting a network data sending speed according to a data processing speed at a client is described. Through calculating and feeding back a data processing speed of a client computer to a server; and then, controlling and adjusting a data sending speed at the server in real time according to the data processing speed, the server adjusts the data sending speed thereof in real time according to the requirement on speed control, and sends data to the client computer at an adjusted data sending speed. This method controls and adjusts the data sending speed at the server through a feedback mechanism of the data processing speed of the client computer, thereby avoiding problems in the conventional art, such as low network data transmission efficiency and data loss, caused by mismatching between the data processing speed at the client and the data sending speed at the server. | 08-06-2009 |
20090198868 | METHOD OF ACCESSING VIRTUAL STORAGE DEVICE THROUGH VIRTUAL DATA ROUTER - A method of accessing a virtual storage device through a virtual data router (VD router) is described. A virtual disk device on a controller may be accessed from various controllers through different paths based on asynchrony of data sending/receiving of a VD router. Moreover, the method is advantageous in having high access efficiency and consistency of data access via different paths at the same time. | 08-06-2009 |
20090198988 | METHOD FOR VERIFYING REFRESHED BIOS CONTENT - A method for verifying refreshed BIOS content includes the following steps. A virtual machine (VM) is established in a computer waiting for a system BIOS update by the use of a paravirtualization technique. The VM is booted. A new BIOS file content is copied to an address space in a designated range of a memory of a computer host. The computer host is booted with the content of the new BIOS file, and the paravirtual operating system runs on the same hardware platform of the computer host. And, whether the virtual operating system adopting the new BIOS file content runs normally or not is verified to confirm the correctness and safety of the content of the new BIOS file. | 08-06-2009 |
20090199039 | FILE DATA RESTORING SYSTEM AND METHOD OF COMPUTER OPERATING SYSTEM AND SOFTWARE THEREOF - A file data restoring system and method of a computer operating system and software thereof are applied in the installation of an operating system into a client computer. Divide the file data corresponding to the operating system into data blocks according to an appointed data size. Generate a check code for each of the data blocks to form a sequence list of original check codes and a sequence list of target check codes. Compare the sequence list of original check codes with the sequence list of target check codes, after installing the operating system into the computer. If the comparison result is inconsistent, a restoring call information is sent out. The position of the inconsistent check code is acquired through the restoring call information and the comparison result. The original file data corresponding to the position of the check code is read and restored to a corresponding target file. | 08-06-2009 |
20090204773 | METHOD OF WRITING DEVICE DATA IN DUAL CONTROLLER NETWORK STORAGE ENVIRONMENT - A method of writing device data in a dual controller network storage environment is described. According to the method, functions of a virtual data router (VD router) and a mirror technology are integrated, so as to efficiently transmit internal network data and write data into disk devices on different controllers in a dual controller network storage environment. Thereby, the internal network data transmission efficiency and actual internal network utilization can be improved. | 08-13-2009 |
20090213736 | Method of processing external service request in storage area network - A method of processing an external service request in a storage area network (SAN) is used for responding a service request in the SAN with multiple controllers, and the method includes the following steps. A first controller of the SAN receives a request packet of an external network. When the first controller determines that the request packet must be transmitted to a second controller actually providing service in an internal network, the request packet is transmitted to the second controller. The second controller receives the request packet, and parses a source address contained therein for recording. The second controller executes an operation instruction corresponding to the request packet, and then generates an acknowledge packet. The second controller takes the source address as a destination address of the acknowledge packet and directly transmits the acknowledge packet to an original request initiator. | 08-27-2009 |
20090216886 | Method of multi-path accessing remote logic device under linux system - A method of multi-path accessing a remote logic device under a Linux system is used to realize a multi-path access between an initiator and a target in a storage area network (SAN). Firstly, a communication is established between the initiator and the target. Next, the initiator requests to establish at least one link session with the target. Then, the initiator obtains an iSCSI-connected host assigned by the target, and also obtains a message about connected devices corresponding to the iSCSI-connected host through transmitting a report logic unit number (LUN) command. Then, the initiator configures a device mapper, and the device mapper generates information about redundant devices according to the connected devices and the corresponding LUNs, and the redundant connected devices are mapped into a unique mapping device. | 08-27-2009 |
20090217341 | METHOD OF UPDATING INTRUSION DETECTION RULES THROUGH LINK DATA PACKET - A method of updating intrusion detection rules through a link data packet is used to dynamically update rules storages of Snort system hosts. Firstly, an update sponsor in the network transmits a link data packet with an intrusion detection rule to the Snort system host. The Snort system host acquires the intrusion detection rule from the received link data packet, and parses an operation type of the intrusion detection rule. Then, the Snort system host verifies the validity of the intrusion detection rule. Subsequently, the rules storage is updated according to the type of the valid intrusion detection rule and a rules tree. | 08-27-2009 |
20090249019 | METHOD OF ALLOCATING PHYSICAL MEMORY IN SPECIFIED ADDRESS RANGE UNDER LINUX SYSTEM PLATFORM - A method of allocating a physical memory in a specified address range under a Linux system platform is applied in a testing process of a physical memory under a Linux operating system. In this method, according to a specified address range and a size of a memory to be allocated, a large amount of physical memories in the system are allocated in a specified address range, and then the information about the allocated memories is transmitted, so as to map, inspect, and release the memories, thereby effectively supporting the test for physical memories under the Linux operating system. | 10-01-2009 |
20090249319 | Testing method of baseboard management controller - A testing method of baseboard management controller (BMC) is used for testing firmware stability of a BMC in a server. The testing method includes initializing a plurality of virtual operating systems; setting a plurality of virtual intelligent platform management interfaces (IPMIs) and a virtual BMC in the virtual operating systems; performing a firmware update on the virtual BMC through the virtual IPMI to update the firmware of the virtual BMC; performing a stability test through the virtual BMC and the server; and loading the firmware of the virtual BMC passing the stability test into a physical BMC. | 10-01-2009 |
20090252147 | STORAGE SERVER IMPLEMENTED BY INTERNET SMALL COMPUTER SYSTEMS INTERFACE IN LINUX SYSTEM - A storage server implemented by an internet small computer systems interface (iSCSI) in a Linux system includes a network subsystem and a small computer systems interface (SCSI) subsystem, and an iSCSI module and a SCSI module are respectively embedded in the network subsystem and SCSI subsystem. When receiving a link request packet from an initiator, the network subsystem creates a SCSI identifiable format packet for the SCSI subsystem by the embedded iSCSI module and the embedded SCSI module. The iSCSI module and SCSI module are respectively embedded in the network subsystem and SCSI subsystem. The iSCSI module and SCSI module can be immediately called without waiting the switch of processing, thereby solving performance bottleneck in the storage server and improving the operation speed of the storage server. | 10-08-2009 |
20090254641 | NETWORK CARD CAPABLE OF REMOTE BOOT AND METHOD THEREOF - A network card capable of remote boot and method thereof. The network card, installed on a client which connects to a server via internet and receives a plurality of boot image files from the server for booting the client. Then, a plurality of boot image files is received from the server, so as to boot the client. A linking device includes a virtual disk control module, a network storage device, and a network communication module. The virtual disk control module is used to provide a virtual disk, and to link the virtual disk to a remote disk of the server. The network storage device is used to receive bootstrap information sent by the server. The network communication module is used to establish a relevant network communication with the server. Therefore, meanwhile as the client is booted, the network card can initialize a virtual disk for booting the client. | 10-08-2009 |
20090254902 | METHOD FOR IMPROVING ACCESS EFFICIENCY OF SMALL COMPUTER SYSTEM INTERFACE STORAGE DEVICE - A method for improving an access efficiency of a small computer system interface (SCSI) storage device is used to process a plurality of access requests for a physical storage device from a request end. The task processing method includes setting a task queue in each virtual disk, for receiving a plurality of disk access tasks sent from a server; writing the disk access tasks to storage addresses in the virtual disk; executing a storage address recording, for recording the disk access tasks having the same storage address, and sending the rest disk access tasks in sequence to the physical storage device; saving the disk access tasks into a request queue of the physical storage device; executing a program sequence optimization on the disk access tasks in the request queue; and sending back the disk access tasks after the program optimization process to the virtual disk. | 10-08-2009 |
20090292882 | STORAGE AREA NETWORK SERVER WITH PARALLEL PROCESSING CACHE AND ACCESS METHOD THEREOF - A storage area network (SAN) server with a parallel processing cache and an access method thereof are described, which are supplied for a plurality of request to access data in a server through an SAN. The server includes physical storage devices, for storing data sent by the request and data transmitted to the request; copy managers, for managing the physical storage devices connected to the server, and each copy manager includes a cache memory unit, for temporarily storing the data accessed by the physical storage devices, and a data manager, for recording an index of the data in the cache memory unit, providing a cache copy stored in the cache memory unit to a corresponding request end, and confirming an access time for each virtual device manager to access the cache copy. | 11-26-2009 |
20090327640 | METHOD FOR EXPANDING LOGICAL VOLUME STORAGE SPACE - A method for expanding a logical volume (LV) storage space includes creating an LV by using an LV manager, and allocating a storage space for the LV according to a certain proportion; reserving a continuous expanding space behind the allocated storage space; determining in real time whether the LV storage space needs to be expanded or not during a data writing process till the data has been completely written; if the LV storage space needs to be expanded, obtaining a size of a new expanding space required to be reserved by calculating an increment coefficient of space expansion according to a using situation of the previously reserved expanding space, thereby further reserving a continuous expanding space within a space scope managed by the LV manager; and if the LV storage space does not need to be expanded, directly writing the data. | 12-31-2009 |
20100031093 | Internal tracing method for network attack detection - An internal tracing method for network attack detection is used to trace whole life cycle of an attack data packet for test in different phases such as an attacking phase, a defending phase, and an attacked phase through configuring and uniting three parties including an attack end point (AEP), a detect end point (DEP), and a target end point (TEP) and setting a corresponding internal check point in each part when testing a network intrusion detection system (IDS). In other words, when testing the network IDS, in a whole period that the attack data packet for test is attacking, filtered, detected, and finally transmitted to a target host, a tester may clearly know the statuses and information of the data packet in each important phase, thereby generating a test report conveniently, quickly, and accurately. | 02-04-2010 |
20100058459 | NETWORK INTERFACE CARD WITH PACKET FILTERING FUNCTION AND FILTERING METHOD THEREOF - A network interface card with a packet filtering function and a filtering method thereof are applicable to realize packet filtering through both software and hardware manners. The network interface card includes a connection port, a first filtering module, a second filtering module, and a storage unit. The connection port is used to receive a packet data from Internet. The first filtering module is connected to the connection port, and is used to detect the packet data according to a content address memory (CAM) table. The detecting process is executed by a firmware of the network interface card. The second filtering module is connected to the first filtering module, and executes a packet content detecting procedure for detecting a content of the packet data, thereby detecting the packet data by using software/firmware respectively, and thus a working efficiency of the network interface card is enhanced. | 03-04-2010 |
20100122075 | METHOD FOR CONTROLLING BOOT SEQUENCE OF SERVER - A method for controlling a boot sequence of a server includes the following steps. A boot image is created, and a first proxy server program is placed into the boot image. The first proxy server program communicates with a management server. The boot image is restored on a rewritable removable storage device, so as to enable the rewritable removable storage device to boot a managed target server. A second proxy server program is installed and executed in the management server. A basic input/output system (BIOS) of the target server is set to enable the rewritable removable storage device to act as a first boot device. Boot files in the rewritable removable storage device are modified through the first proxy server program or the second proxy server program according to a boot instruction received from the management server, thereby controlling a boot sequence of the target server. | 05-13-2010 |
20100131661 | FIBER CHANNEL STORAGE SERVER - A fiber channel (FC) storage server includes an optical network access interface and a storage device subsystem. The optical network access interface includes a first FC access module and a first small computer system interface (SCSI) module. The storage device subsystem includes a second FC access module and a second SCSI module. When the optical network access interface receives a connection request packet from an initiator, the first FC access module generates a packet in an SCSI identification format of the storage device subsystem. Further, the storage device subsystem generates a packet in an optical network access interface identification format having a response instruction through the second FC access module and the second SCSI module, and transmits the packet to the optical network access interface to complete the response process. | 05-27-2010 |
20100138893 | PROCESSING METHOD FOR ACCELERATING PACKET FILTERING - A processing method for accelerating packet filtering is used for accelerating the filtering process of packet data in a computer. The processing method accelerating packet filtering includes the steps. A plurality of packet filtering policies is loaded. Feature values of each packet filtering policy are resolved. A grouping procedure is performed on the packet filtering policies according to the feature values, so as to add the packet filtering policies meeting a threshold value to corresponding policy groups. A performing sequence of the packet filtering policies in the policy groups is determined according to a performing sequence of the packet filtering policies. A performing sequence of the policy groups is determined according to a producing sequence of the policy groups. A plurality of packet data is received. When the packets don't match the policy groups, the default policy is processed according to protocol information of the packets. | 06-03-2010 |
20100157800 | METHOD FOR PROCESSING NETWORK TRAFFIC LOADING BALANCE - A method for processing network traffic loading balance is adapted for balancing the load of a session of various data packet processing threads in a network equipment. The method includes the following steps. First, a plurality of data packet processing threads is executed, a queue is assigned to each thread for storing the received data packets, and the data packet is read from the queue by the thread for processing. Then, it is determined whether the number of the data packets in the queue satisfies a traffic threshold value. If the number of the data packets in a certain queue satisfies an operating threshold value, new data packets are allocated by the network equipment to other queues without affecting the integrity of the session. Therefore, the present method not only maintains the integrity of the session, but also ensures the uniformity in load among the data packet processing threads. | 06-24-2010 |
20100157806 | METHOD FOR PROCESSING DATA PACKET LOAD BALANCING AND NETWORK EQUIPMENT THEREOF - A method for processing data packet load balancing and a network equipment thereof, which are for balancing the load of a plurality of controllers in a network equipment. The method comprises the steps. A plurality of data packets is received. A storage queue is assigned for storing the data packets. The data packets in the storage queue are read by an allocation controller. The allocation controller assigns the data packets to different work sequences according to a work attribute of the data packets. A processing controller is commanded to perform a packet processing procedure, and at least one work queue is assigned to the processing controller for processing the data packets. After completing the packet processing procedure, the processing controller sends a completion message to a completion queue. If the allocation controller detects that the completion queue contains the completion message, the allocation controller sends the processed data packets back. | 06-24-2010 |
20100158244 | COMMUNICATION ENCRYPTION METHOD FOR SUPPORTING REMOTE MONITORING AND CONTROL SYSTEM - A communication encryption method for supporting a remote monitoring and control system includes establishing a communication network between a server and a remote host, encrypting a data to be transmitted/received, and testing terminal equipment connected to the remote host. The method includes the steps. The server sequentially partitions a test data, and performs a compression program and an encryption program to produce a plurality of first partitioned data, a compressed data, and a plurality of encrypted data respectively; next, the server transmits the encrypted data to the remote host; the remote host performs a decryption program sequentially to restore the encrypted data into the second partitioned data, then combines the second partitioned data into the compressed data, and performs a decompression program on the compressed data to restore the data into the first partitioned data, then recombines the first partitioned data to restore the data into the test data. | 06-24-2010 |
20100161786 | QOS CONTROL METHOD FOR ISCSI - A QoS control method for iSCSI supports QoS control between an initiator device and a target device, and includes the following steps. Preset two variables bucket and bucket_used. Receive a PDU sent from a connection. If the PDU carries or requests data, add lengths of data carried or requested by the PDU in the current one second and store the result to bucket_used. Determine whether bucket_used is larger than bucket or not. Rf yes, suspend the current QoS control object for iSCSI and accept no additional new PDU handling until the end of the current one second. Or otherwise, forward the PDU to an iSCSI PDU handler for subsequent execution. The QoS control method can perform a QoS control on different QoS control objects for iSCSI with a unified control granularity in the iSCSI service level, so that the complexity of the QoS control is greatly reduced. | 06-24-2010 |
20100175073 | NETWORK DEVICE FOR ACCELERATING ISCSI PACKET PROCESSING - A network device for accelerating internet small computer systems interface (iSCSI) packet processing is described, which includes a host and a network card. The host includes an online command descriptor block queue, an iSCSI host manager, and an SCSI module. SCSI commands in a CDB are processed through these modules. The network card includes an LLP module and a microprocessor. Through a protocol data unit descriptor, a PDU generator and an iSCSI network card manager in the microprocessor, protocol data units in network packets can be resolved in advance, so that the host can concentrate on executing SCSI commands, thereby accelerating the network packet processing efficiency of the network device. | 07-08-2010 |
20100180087 | METHOD FOR ACCELERATING INTERNET SMALL COMPUTER SYSTEM INTERFACE DATA AND PROCESSING SYSTEM THEREOF - A communication method for accelerating Internet small computer system interface data and a processing system thereof are used for sending a plurality of data packets to a plurality of storage devices by a target of the Internet small computer system interface. The communication method includes the following steps. An access request for accessing the storage devices is received by the target. A plurality of small computer interface commands is generated according to the access request. The small computer interface commands are read by an egress packet generator in the target. An address resolving procedure is performed by the egress packet generator for converting the small computer interface commands to a plurality of network packets. A first check code is generated according to a storage content in each network packet. The first check codes are added to the network packets. | 07-15-2010 |
20100205420 | SYSTEM AND METHOD FOR REALIZING REMOTE TEST ON COMPUTER APPARATUS WITHOUT STORAGE DEVICE - A system and a method for realizing a remote test on a computer apparatus without a storage device are described, in which a client is enabled to select a desired operating system image file from a server and use the operating system image file to provide an initial processing on an operating system of the client. The testing method includes initializing a virtual disk in the client, registering the virtual disk to a basic input and output system (BIOS) of the client, connecting to a server over network according to connection information in the virtual disk, loading boot information into the client from the server, and performing a boot procedure on the client according to the boot information. Therefore, during a booting process of the client, a virtual disk is initialized in the server, so as to be used for booting the client. | 08-12-2010 |
20100205600 | SIMULATION METHOD FOR REALIZING LARGE BATCHES AND DIFFERENT KINDS OF BASEBOARD MANAGEMENT CONTROLLERS USING A SINGLE SERVER - A simulation method for realizing large batches and different kinds of baseboard management controllers using a single server includes providing a virtual baseboard management controller by a target terminal according to different customized virtual baseboard management controller resources correspondingly. The simulation method includes initializing large batches and different kinds of virtual baseboard controller programs according to a customizable virtual baseboard controller resource. If a client requests to access one baseboard controller or multiple baseboard controllers, which virtual baseboard controller will provide a service is determined according to the information of the accessing request of the client. Then an output result is generated according to the behaviors defined in the customized resource. Finally, the output result is transferred to the client. Therein, the client may connect to the target terminal through Internet or a bus. | 08-12-2010 |
20100211943 | METHOD FOR SIMPLIFYING PROCESS FOR INSTALLING APPLICATION OF WINDOWS OPERATING SYSTEM - A method for simplifying a process for installing an application of a Windows operating system is applied. The method includes the following steps. An answer file is created, in which an installation profile is created according to an installation sequence of installation packages of the Windows operating system and a configuration file is created according to environment parameters of the Windows operating system. The answer file is loaded. An original Windows Preinstallation Environment Image (WIM) file is read, and is stored into a memory unit, and the original WIM file defined as a target WIM file. The answer file is added and modified into a Windows image file of the target WIM file. The target WIM file is initiated and an installation procedure of the Windows operating system is performed. | 08-19-2010 |
20100215052 | ISCSI NETWORK INTERFACE CARD WITH ARP/ICMP RESOLUTION FUNCTION - An iSCSI network interface card with an ARP/ICMP resolution function is applicable to provide a communication interface between a host and a client, and includes a first connection interface, an ARP procedure, an ICMP procedure, a storage unit, and a processor. The first connection interface is connected to the host. The ARP procedure queries an IP address of the client. The ICMP procedure transfers a message of failing to reach the IP address of the client and detects a connecting status to the Internet. The storage unit is connected to the first connection interface and stores the network packet, the ARP procedure, and the ICMP procedure. The processor is connected to the first connection interface and the storage unit, and executes the ARP procedure and the ICMP procedure according to a service request. | 08-26-2010 |
20100246592 | LOAD BALANCING METHOD FOR NETWORK INTRUSION DETECTION - A load balancing method for network intrusion detection includes the following steps. Packets are received from a client. The data packets include a protocol type and a protocol property. An intrusion detection procedure is loaded on a receiving end. A corresponding request queue is set for each intrusion detection procedure. The request queue is used for storing the data packets. The data packets are processed a separation procedure, and are categorized into data packets of a chain type and data packets of a non-chain type according to the protocol type. The data packets of the chain type are processed by a first distribution procedure. The data packets of the non-chain type are processed by a second distribution procedure. The distribution procedures distribute the data packets to the corresponding request queues according to the protocol property. The corresponding intrusion detection procedure is performed on the data packets in each request queue. | 09-30-2010 |
20100250651 | DATA ACCESS METHOD FOR MAKING ASYNCHRONOUS REQUEST TO BLOCK DEVICE - A data access method for making an asynchronous request to a block device is adapted to access a block device in a server end and perform corresponding processing according to a plurality of data access requests. The data access method includes the steps. A current request is received from a client. A virtual device of the block device is invoked. The current request is compared with a request queue storing a plurality of requests to be processed. The requests to be processed are selected from the request queue according to an access address of the current request. A request merging program is performed on the requests to be processed with adjacent access addresses and the current request to generate a merged request. The merged request is submitted to the request queue. The requests having low access capacities is merged, so as to improve the access efficiency of the block device. | 09-30-2010 |
20100250728 | METHOD FOR CONTROLLING WEB PAGE OPERATION IN BROWSER/SERVER ARCHITECTURE - A method for controlling a web page operation in browser/server architecture is adapted to prevent the same page from being operated by more than one people at the same time. The method includes establishing a status record table for recording a usage status of web page by server; checking usage status of web page in status record table after server receiving a request for operating the web page from a second browser; accepting request and submitting an operation control right of the web page to second browser if the usage status is idle; sending a check message to first browser to check whether first browser is still using the web page or not if usage status in status record table indicates that web page is used by first browser; rejecting request and transmitting usage status of web page to second browser if first browser is still using the web page. | 09-30-2010 |
20100250832 | STORAGE SERVICE DEVICE WITH DUAL CONTROLLER AND BACKUP METHOD THEREOF - A storage service device with a dual controller and a backup method thereof are applicable to provide the same view service to an event-login log and a configuration file of a server. The storage service device includes a first control module, a second control module, a battery unit, a basic input/output system (BIOS), and a backup procedure. Once a power failure occurs to the server, the following backup procedure is performed a hardware interrupt signal is sent to the battery unit, so as to provide an operation power to a first memory module and a second memory module; an index page of the first memory module is synchronized with that of the second memory module; and the updated index pages are recorded into a first flash memory and a second flash memory respectively. | 09-30-2010 |
20100250879 | DATA MANIPULATION METHOD OF LOGICAL VOLUME MANAGER - A data manipulation method of a logical volume manager is applicable to data management of dependent snapshot volumes (SVs) of a logical volume manager. The data management method includes the following steps generating a plurality of SVs, defining the SV generated at first as a first SV, defining the SV generated at last as a last SV, and defining the rest SVs as middle SVs; selecting a middle SV; combining content stored in the selected middle SV into a neighboring SV; according to the combined SV, combining meta-data of the selected middle SV into meta-data of the middle SV; deleting the selected middle SV. The logical volume manager does not need copy the data again, thereby saving access time in data management. | 09-30-2010 |
20100251013 | METHOD FOR PROCESSING BAD BLOCK IN REDUNDANT ARRAY OF INDEPENDENT DISKS - A method for processing a bad block in a redundant array of independent disks (RAID) is presented, which is characterized by a software RAID constructed by a scale computer interface disk, and adapted to backup data in a bad block in the software RAID. The method includes invoking an access error program to intercept an access instruction for a data block in the software RAID when the data block is a bad block; searching a disk number and a logical block address of the data block in the software RAID according to the access instruction; selecting the scale computer interface disk; and mapping data stored in the data block, the disk number, and the logical block address to a reserved local memory of the scale computer interface disk. Through the above steps, the data in the bad block can be mapped to a normal block, thus maintaining the data integrity. | 09-30-2010 |
20100251355 | METHOD FOR OBTAINING DATA FOR INTRUSION DETECTION - A method for obtaining data for intrusion detection obtains data after forward chain filtering of a firewall. Modes of obtaining the data include a socket communication mode and a character device work mode. The method for obtaining the data for intrusion detection obtains the data filtered by the firewall, and reduces false alarms. Moreover, the method obtains the data after a network address translation (NAT) operation, so as to locate an attacker and a victim correctly. The method further obtains a decrypted Internet Protocol Security (IPsec) data packet, so as to process an IPsec data stream normally. | 09-30-2010 |