Node management in scalable distributed computing enviroment
First Claim
1. A method for independently executing software components in a node of a network containing a plurality of nodes, the method comprising the steps of:
- generating a logical hierarchy of the roles of the nodes in the network wherein any node can assume one or multiple roles, the assumption of which neither requires nor precludes the assumption of any other role; and
negotiating the role of the nodes when there is a change in the configuration of the network;
wherein at least two conflicting nodes claim the same managerial role and at least one of the conflicting nodes participates in a process of determining a node which assumes the managerial role, the negotiating step further comprising the steps, performed by each participating node, of;
setting up a database containing the names of all known nodes participating in the process;
transmitting election messages to nodes included in the data base, the election messages containing information relating to the participating nodes;
receiving election messages from other participating nodes;
updating the database using information contained in the received election messages; and
determining, based on the information contained in the updated database, which one of the participating nodes assumes the managerial role.
17 Assignments
0 Petitions
Accused Products
Abstract
A method for independently executing software components in a node of a network containing many nodes. The method including generating a logical hierarchy of the roles of the nodes where any node can assume one or multiple roles; and negotiating the role of the nodes when there is a change in the configuration of the network. Another technique locates resources requested by a node in a scalable system interconnecting many nodes in a network. The technique includes identifying resources that join the network by switching from an inactive to an active state; and informing the requester the availability of the requested resource. A further technique determines routing paths in a context bridge which is able to route packets between nodes. The technique includes setting up a list of context bridges; listening for routing information packets which are periodically broadcast by other context bridges; and updating the database using the information contained in the received routing information packets. One more technique is on routing packets from a source node to a destination node using a context bridge. The technique includes determining whether the destination node has a routable protocol; if it does not have, then routing the packet using a source route containing the address of the context bridges from the source to the destination; and if it has, then routing the packet through at least one context bridge containing routable protocols.
101 Citations
13 Claims
-
1. A method for independently executing software components in a node of a network containing a plurality of nodes, the method comprising the steps of:
-
generating a logical hierarchy of the roles of the nodes in the network wherein any node can assume one or multiple roles, the assumption of which neither requires nor precludes the assumption of any other role; and negotiating the role of the nodes when there is a change in the configuration of the network; wherein at least two conflicting nodes claim the same managerial role and at least one of the conflicting nodes participates in a process of determining a node which assumes the managerial role, the negotiating step further comprising the steps, performed by each participating node, of; setting up a database containing the names of all known nodes participating in the process; transmitting election messages to nodes included in the data base, the election messages containing information relating to the participating nodes; receiving election messages from other participating nodes; updating the database using information contained in the received election messages; and determining, based on the information contained in the updated database, which one of the participating nodes assumes the managerial role. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification