Managing real-time execution of transactions in a network
First Claim
1. A method for managing real-time execution of transactions between a plurality of network devices, the method comprising:
- receiving, by a first synchronization middleware, one or more transactions from requesting applications running on a first network device of the plurality of network devices, wherein the first synchronization middleware runs on the first network device;
storing, by the first synchronization middleware on the first network device, details associated with the one or more transactions, wherein the details comprise transaction identifiers for the one or more transactions, wherein the details further comprise priority parameters and security parameters for the one or more transactions, wherein the priority parameters are based at least in part upon transaction timeout values of the one or more transactions, and wherein the security parameters indicate a type of network protocol security required for a network connection between the first network device and a second network device;
prioritizing the one or more transactions based on the priority parameters associated with the one or more transactions, wherein transactions with a higher priority are synchronized before transactions with a lower priority, and wherein the prioritizing the one or more transactions based on the priority parameters associated with the one or more transactions comprises;
assigning higher priority to those transactions with shorter transaction timeout values; and
assigning lower priority to those transactions with longer transaction timeout values; and
synchronizing, by the first synchronization middleware on the first network device, the details of the one or more transactions from the first network device to a second synchronization middleware running on the second network device of the plurality of network devices, wherein the synchronization comprises checking, by the first synchronization middleware, network connectivity between the first network device and the second network device, and wherein the synchronization further comprises checking, by the first synchronization middleware, whether the network connection between the first network device and the second network device supports the type of network protocol security required by the security parameters, and wherein the synchronizing further comprises;
when the network connection between the first network device and the second network device does not support the type of network protocol security required by the security parameters, delaying the synchronizing; and
when the network connection between the first network device and the second network device does support the type of network protocol security required by the security parameters, proceeding with the synchronizing.
1 Assignment
0 Petitions
Accused Products
Abstract
Real-time execution of transactions can be managed between network devices. A method for managing real-time execution of transactions can comprise receiving one or more transactions, storing details associated with the one or more transactions, and synchronizing the details from a first network device to a second network device. Synchronizing details can comprise checking network connectivity between devices. Synchronization middleware can comprise a command engine, a synchronization engine, and a request-response engine. Synchronization middleware can be configured to process transactions, comprising checking network connectivity and determining whether transactions have expired. A method for managing real-time execution of transactions can comprise receiving real-time transactions from applications running on a network device, determining whether a network connection to a second network device is operational, if the connection is operational synchronizing the transactions, and if the connection is not operational delaying synchronization.
-
Citations
12 Claims
-
1. A method for managing real-time execution of transactions between a plurality of network devices, the method comprising:
-
receiving, by a first synchronization middleware, one or more transactions from requesting applications running on a first network device of the plurality of network devices, wherein the first synchronization middleware runs on the first network device; storing, by the first synchronization middleware on the first network device, details associated with the one or more transactions, wherein the details comprise transaction identifiers for the one or more transactions, wherein the details further comprise priority parameters and security parameters for the one or more transactions, wherein the priority parameters are based at least in part upon transaction timeout values of the one or more transactions, and wherein the security parameters indicate a type of network protocol security required for a network connection between the first network device and a second network device; prioritizing the one or more transactions based on the priority parameters associated with the one or more transactions, wherein transactions with a higher priority are synchronized before transactions with a lower priority, and wherein the prioritizing the one or more transactions based on the priority parameters associated with the one or more transactions comprises; assigning higher priority to those transactions with shorter transaction timeout values; and assigning lower priority to those transactions with longer transaction timeout values; and synchronizing, by the first synchronization middleware on the first network device, the details of the one or more transactions from the first network device to a second synchronization middleware running on the second network device of the plurality of network devices, wherein the synchronization comprises checking, by the first synchronization middleware, network connectivity between the first network device and the second network device, and wherein the synchronization further comprises checking, by the first synchronization middleware, whether the network connection between the first network device and the second network device supports the type of network protocol security required by the security parameters, and wherein the synchronizing further comprises; when the network connection between the first network device and the second network device does not support the type of network protocol security required by the security parameters, delaying the synchronizing; and when the network connection between the first network device and the second network device does support the type of network protocol security required by the security parameters, proceeding with the synchronizing. - View Dependent Claims (2, 3, 4)
-
-
5. A synchronization middleware for managing real-time execution of transactions between network devices, the middleware comprising:
-
a command engine configured for receiving transactions from a plurality of applications, wherein the command engine is further configured for receiving, from the plurality of applications, priority parameters and security parameters associated with the transactions, wherein the priority parameters and security parameters are used when synchronizing the details of the transactions, wherein the priority parameters are based at least in part upon transaction timeout values of the transactions, and wherein the security parameters indicate a type of network protocol security required for a network connection between a first network device and a second network device; a priority engine configured for prioritizing the transactions based on the priority parameters associated with the transactions, wherein transactions with a higher priority are synchronized before transactions with a lower priority, and wherein the prioritizing the transactions based on the priority parameters associated with the transactions comprises; assigning higher priority to those transactions with shorter transaction timeout values; and assigning lower priority to those transactions with longer transaction timeout values; a synchronization engine configured for synchronizing details of the transactions between the first network device and the second network device, wherein the synchronization engine is further configured for checking whether the network connection between the first network device and the second network device supports the type of network protocol security required by the security parameters, and wherein the synchronization engine is further configured for; when the network connection between the first network device and the second network device does not support the type of network protocol security required by the security parameters, delaying the synchronizing; and when the network connection between the first network device and the second network device does support the type of network protocol security required by the security parameters, proceeding with the synchronizing; and a request-response engine configured for processing the transactions, wherein the processing comprises; checking network connectivity between the first network device and the second network device; and determining whether the transactions have expired by checking transaction timeout values associated with the transactions. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method for managing real-time execution of transactions between network devices, the method comprising:
-
receiving, by a first synchronization middleware running on a first network device from a plurality of software applications running on the first network device, a plurality of real-time transactions, wherein the plurality of real-time transactions comprise transaction parameters, wherein the transaction parameters comprise for at least one real-time transaction of the plurality of real-time transactions; a transaction timeout value indicating a time period after which the real-time transaction expires; a transaction identifier uniquely identifying the real-time transaction; an application identifier indicating an application of the plurality of software applications associated with the real-time transaction; a priority parameter indicating relative priority of the real-time transaction, wherein the real-time transaction is prioritized based on the priority parameter, wherein the priority parameter is based at least in part upon the transaction timeout value of the real-time transaction, and wherein transactions with a higher priority are synchronized before transactions with a lower priority; and a security parameter indicating a type of network protocol security required for a network connection between the first network device and a second network device; prioritizing the plurality of real-time transactions based on priority parameters associated with the plurality of real-time transactions, wherein transactions with a higher priority are synchronized before transactions with a lower priority, and wherein the prioritizing the plurality of real-time transactions based on the priority parameters associated with the plurality of real-time transactions comprises; assigning higher priority to those transactions with shorter transaction timeout values; and assigning lower priority to those transactions with longer transaction timeout values; determining, by the first synchronization middleware, whether the network connection to the second network device is operational and whether the network connection to the second network device supports the type of network protocol security required by the security parameter; if the network connection to the second network device is operational and supports the required type of network protocol security, synchronizing, by the first synchronization middleware, the plurality of real-time transactions with a second synchronization middleware running on the second network device; and if the network connection to the second network device is not operational or does not support the required type of network protocol security, delaying synchronizing, by the first synchronization middleware, the plurality of real-time transactions with the second synchronization middleware running on second network device until the first of;
the network connection becomes operational and supports the required type of network protocol security, or one or more of the real-time transactions expire. - View Dependent Claims (11, 12)
-
Specification