Patents Assigned to Sun Microsystems
-
Publication number: 20080005441Abstract: A system includes a first and a second network component, and a bridge. The bridge, which resides a Media Access Control (MAC) layer of a host, includes a bridge component, a first virtual network interface card (VNIC) and a second VNIC, wherein the first VNIC is associated with the first network component and the second VNIC is associated with the second network component. Further, the bridge component is configured to send packets received from the first network component to the second network component and to send packets received from the second network component to the first network component.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: Sun Microsystems, Inc.Inventors: Nicolas G. Droux, Sunay Tripathi, Kais Belgaied, Erik Nordmark
-
Publication number: 20080002682Abstract: A method for processing packets. The method includes receiving a first packet, wherein the first packet is associated with a first protocol, classifying the first packet using a protocol associated with the first packet, sending the first packet to a first receive ring based on the classification, sending the first packet from the first receive ring to a first virtual network interface card (VNIC) based on an operating mode, sending the first packet from the first VNIC to a first protocol specific virtual network stack (VNS), wherein the first protocol specific VNS is configured to only process packets associated with the first protocol, and processing the first packet by the first protocol specific VNS to obtain a first processed packet.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: Sun Microsystems, Inc.Inventors: Thirumalai Srinivasan, Sunay Tripathi, Nicolas G. Droux
-
Publication number: 20080002703Abstract: A system including a network interface card (NIC) associated with a Media Access Control (MAC) address and a host operatively connected to the NIC. The NIC includes a default hardware receive ring (HRR), a plurality of non-default HRRs, and a hardware classifier. The hardware classifier is configured to analyze an inbound packet using a destination Internet Protocol (IP) address and to send the inbound packet to one of the plurality of non-default HRRs if the inbound packet is a unicast packet, and to send the packet to the default HRR if the inbound packet is an inbound multi-recipient packet. The host includes a plurality of virtual NICs (VNICs) and an inbound software classifier. that includes a plurality of software receive rings (SRRs) and is configured to obtain inbound packets from the default HRR, and to determine to which of the plurality of SRRs to send a copy of the packet.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: Sun Microsystems, Inc.Inventors: Sunay Tripathi, Nicolas G. Droux, Kais Belgaied
-
Publication number: 20080002736Abstract: A method for receiving incoming packets associated with a virtual Local Area Network (VLAN) includes receiving an incoming packet, classifying the incoming packet based on a VLAN tag embedded in the incoming packet, wherein the VLAN tag corresponds to the VLAN, and passing the incoming packet to a virtual network interface card (NIC) based on the VLAN tag.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: Sun Microsystems, Inc.Inventors: Nicolas G. Droux, Sunay Tripathi, Kais Belgaied
-
Publication number: 20080005526Abstract: A system for mapping memory of a computer system includes a sorter, a partitioner, and a mapper. The sorter sorts a physical memory space to obtain a sorted virtual memory space, where the physical memory space includes a plurality of memory patterns, wherein each of the plurality of memory patterns is associated with a physical device and includes at least one memory block, wherein the at least one memory block is contiguous and addressable, and the plurality of memory patterns are arranged based on a predefined number of occurrences of each memory pattern, size of contiguous memory address ranges in each of the plurality of memory patterns, size of contiguous memory address ranges in each of the plurality of memory patterns, and arrangement of contiguous address ranges in each of the plurality of memory patterns.Type: ApplicationFiled: July 3, 2006Publication date: January 3, 2008Applicant: Sun Microsystems, Inc.Inventors: Michael H. Paleczny, Olaf Manczak, Christopher A. Vick, Jay R. Freeman, Phyllis E. Gustafson
-
Publication number: 20080002714Abstract: A method for dynamically changing a virtual network interface card (VNIC) binding. If the use of a hardware receive ring (HRR) is below the first threshold and the use of the software receive ring (SRR) is above the second threshold, then: binding the first VNIC to the SRR and the second VNIC to the HRR, removing the binding from the first VNIC to the HRR, removing the binding from the second VNIC to the SRR, and reprogramming a hardware classifier to send packets associated with the r VNIC to a second HRR and to send packets associated with the second VNIC to the HRR, reprogramming a software classifier to send packets associated with the first VNIC to the SRR, wherein the software classifier is associated with a soft ring (SR) and the SR is configured to obtain packets from the second HRR.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: Sun Microsystems, Inc.Inventors: Kais Belgaied, Sunay Tripathi, Nicolas G. Droux
-
Publication number: 20080005112Abstract: A method for coordinating shared access to data objects comprises applying modification operations to a data object from a first thread of a plurality of threads on behalf of all the other threads during a session in which the first thread owns a lock on the data object. Each modification operation corresponds to a respective entry recorded in a log associated with the data object by a respective thread. The method may further comprise predicting, for a second thread, a result of a particular operation requested by the second thread on the data object. The result may be predicted using log entries corresponding to modification operations that have not yet been applied to the data object. In addition, the method includes performing one or more other operations in a non-blocking manner from the second thread during the session, where at least one other operation is dependent on the predicted result.Type: ApplicationFiled: May 30, 2006Publication date: January 3, 2008Applicant: Sun Microsystems, Inc.Inventors: Nir N. Shavit, Ori Shalev
-
Publication number: 20080002663Abstract: A method for routing packets includes receiving an outbound packet issued by a first virtual machine, wherein the first virtual machine is located on a host, determining a packet destination associated with the outbound packet, querying a routing table for a routing entry corresponding to the packet destination, wherein the routing table comprises a first routing entry referencing an external host and a second routing entry referencing a second virtual machine, wherein the second virtual machine is located on the host, if the routing entry corresponding to the packet destination is the first routing entry, passing the packet to the external host, and if the routing entry corresponding to the packet destination is the second routing entry, passing the packet to the second virtual machine.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: Sun Microsystems, Inc.Inventors: Sunay Tripathi, Erik Nordmark, Nicolas G. Droux
-
Patent number: 7316021Abstract: A processor includes logic for attaining a very fast exception handling functionality while executing non-threaded programs by invoking a multithreaded-type functionality in response to an exception condition. The processor, while operating in multithreaded conditions or while executing non-threaded programs, progresses through multiple machine states during execution. The very fast exception handling logic includes connection of an exception signal line to thread select logic, causing an exception signal to evoke a switch in thread and machine state. The switch in thread and machine state causes the processor to enter and to exit the exception handler immediately, without waiting to drain the pipeline or queues and without the inherent timing penalty of the operating system's software saving and restoring of registers.Type: GrantFiled: February 17, 2004Date of Patent: January 1, 2008Assignee: Sun Microsystems, Inc.Inventors: William N. Joy, Marc Tremblay, Gary Lauterbach, Joseph I. Chamdani
-
Patent number: 7316007Abstract: A method for arithmetic expression optimization includes receiving a first instruction defined for a first processor having a first base, the first instruction including an operator and at least one operand, converting the first instruction to a second instruction optimized for a second processor having a second base when all operands do not carry potential overflow or when the operator is insensitive to overflow, the second base being smaller than the first base, and converting to a wider base a third instruction that is the source of the overflow when the at least one operand the potential for overflow and when the operator is sensitive to overflow.Type: GrantFiled: October 14, 2003Date of Patent: January 1, 2008Assignee: Sun Microsystems, Inc.Inventors: Zhiqun Chen, Judith E. Schwabe
-
Patent number: 7315218Abstract: A circuit and method are provided for calibrating an analog oscillator in the digital domain. The circuit and method disclosed herein centers an oscillation frequency of an analog oscillator by producing a binary signal to which the analog oscillator is responsive. Changes in the binary digital signal cause the oscillation frequency of the analog oscillator to shift in a desired direction to calibrate the analog oscillator. At the completion of the calibration process, the control of the oscillation frequency of the analog oscillator is switched to the analog domain so that the analog oscillator is responsive to an analog control voltage to shift the oscillation frequency.Type: GrantFiled: December 28, 2005Date of Patent: January 1, 2008Assignee: Sun Microsystems, Inc.Inventor: Francisco Fernandez
-
Patent number: 7316010Abstract: A method for conditionally sharing dynamically compiled code between different class loaders is provided. In this method, bytecodes of a first class type are compiled into a compiled code if the bytecodes have not been compiled. The locations of sequence of instructions in the compiled code that are loader dependent are then recorded. Thereafter, the loader dependencies in the compiled code are compared to determine whether the compiled code can be used by a method of a second class type. If the loader dependencies of the second class type are different from the loader dependencies of the first class type, the compiled code for the method of the first class type is cloned. Subsequently, portions of the cloned code that are loader dependent are modified to enable the method of the second class type to use the cloned code.Type: GrantFiled: May 26, 2004Date of Patent: January 1, 2008Assignee: Sun Microsystems, Inc.Inventors: Laurent Daynes, Grzegorz Czajkowski
-
Patent number: 7315919Abstract: A cluster of multiprocessing nodes uses snooping-based cache-coherence to maintain consistency among the cache memories of the multiprocessing nodes. One or more of the multiprocessing nodes each maintain a directory table that includes a list of addresses of data last transferred by cache-to-cache transfer transactions. Thus, upon a local cache miss for requested data, a multiprocessing node searches its directory table for an address of the requested data, and if the address is found in the directory table, the multiprocessing node obtains a copy of the requested data from the last destination of the requested data as indicated in the directory table. Thereafter, a message indicating the completion of a cache-to-cache transfer is broadcast to other connected multiprocessing nodes on a “best efforts” basis in which messages are relayed from multiprocessing node to multiprocessing node using low priority status and/or otherwise unused cycles.Type: GrantFiled: June 15, 2004Date of Patent: January 1, 2008Assignee: Sun Microsystems, Inc.Inventors: Brian W. O'Krafka, Michael J. Koster
-
Publication number: 20070300076Abstract: A method for generating a word sequence for a passcode involves choosing a schema to guide the generation of the word sequence, and transforming the passcode into the word sequence using the schema, wherein the word sequence contains mnemonic structure.Type: ApplicationFiled: June 22, 2006Publication date: December 27, 2007Applicant: Sun Microsystems, Inc.Inventors: Whitfield Diffie, William A. Woods
-
Publication number: 20070300195Abstract: In some embodiments, a method is provided for determining a localized region of overlap of first and second features from respective first and second conductive layers, and determining which enclosure rules to apply to vias formed between the first and second features. In a further aspect of the invention, a method may be provided to determine whether to apply symmetric or asymmetric via metal enclosure rules to a feature as a function of the local environment of the feature. In another aspect of the invention, a computer program product is provided to encode instructions for performing such a process.Type: ApplicationFiled: June 23, 2006Publication date: December 27, 2007Applicant: SUN MICROSYSTEMS, INC.Inventor: Mu-Jing Li
-
Publication number: 20070300173Abstract: A data display apparatus uses a cluster display window and an item display window that appear simultaneously on a display screen. The cluster display window depicts underlying data elements using clustering icons arranged according to a clustering algorithm. The item display window depicts the data elements using textual information. The two display windows may have interrelated functionality, such that a change to a data element representation in one window changes a representation for the same element in another window. Various means of selecting and manipulating the representations of the data elements in the two windows are also provided.Type: ApplicationFiled: June 26, 2006Publication date: December 27, 2007Applicant: Sun Microsystems, Inc.Inventor: William A. Woods
-
Publication number: 20070296581Abstract: A system for tracking locations of portable data storage media. The system includes media with a wireless tag storing metadata pertaining to its stored data. The tag is adapted to respond to an interrogatory signal by wirelessly transmitting a signal comprising the metadata, e.g., is a high frequency radio frequency identification (RFID) tag powered inductively to transmit contents of its memory. The system includes a stationary and mobile locators that includes tag readers transmitting the interrogatory signals to the media and receiving the metadata signals from the wireless tags. Mobile ones of the locators include a communication module receiving location data (e.g., Global Positioning System (GPS) data) and sending wireless signals made up of the received location data and the received metadata signals. The system includes a media tracker that receives signals from the mobile locator and determines and stores locations of the media typically along with a time stamp.Type: ApplicationFiled: June 23, 2006Publication date: December 27, 2007Applicant: SUN MICROSYSTEMS, INC.Inventors: Jonathan P. Schnee, Leslie K. Hodge, William Lynch, Michael L. Leonhardt
-
Publication number: 20070299819Abstract: A method for enumerating an asset includes receiving an enumeration request for enumerating an asset, obtaining a data acquisition (DAQ) definition associated with the enumeration request, translating the enumeration request from an information model format to a DAQ format, wherein the DAQ definition complies with the DAQ format, identifying an actual uniform resource identifier (URI) from the DAQ definition based on the enumeration request, where the URI identifies an enumeration mechanism, triggering a protocol handler associated with the enumeration mechanism, and obtaining information about at least one instance of the asset from the protocol handler.Type: ApplicationFiled: June 22, 2006Publication date: December 27, 2007Applicant: Sun Microsystems, Inc.Inventors: Arieh Markel, Peter H. Schow
-
Publication number: 20070300166Abstract: A method for showing a display panel in a graphical user interface involves associating a client-side script variable with a display panel wrapper, where the display panel is embedded in the display panel wrapper, and where the client-side script variable indicates that the display panel is hidden. The method further involves modifying the client-side script variable to show the display panel in the graphical user interface, where showing the display panel involves showing an input control for manipulating a data area in the graphical user interface.Type: ApplicationFiled: October 19, 2006Publication date: December 27, 2007Applicant: Sun Microsystems, Inc.Inventors: Brian Douglas Ehret, Elizabeth Sanford Clayton, Karen Ann Stanley, Devjani Ray, Daniel Arthur Labrecque
-
Publication number: 20070299847Abstract: A method for managing an asset using a DAQ runtime that includes acquiring a management request from an information model, identifying an asset type of the plurality of asset types for the management request, identifying a DAQ definition based on the asset type and the management request, wherein a native asset interface definition of the plurality of native asset interface definitions is bound to the DAQ definition, obtaining a protocol of the plurality of heterogeneous protocols and a mechanism of the plurality of mechanisms from the DAQ definition, managing the asset using the protocol and the mechanism to acquire management information, and transmitting the management information to a listener.Type: ApplicationFiled: June 22, 2006Publication date: December 27, 2007Applicant: Sun Microsystems, Inc.Inventors: Arieh Markel, Alexander G. Vul, Brandon Eugene Taylor, Peter H. Schow