Patents Assigned to Sun Microsystems
-
Publication number: 20090002938Abstract: An apparatus for cooling a computer system includes a fan for flowing an air to a first assembly and a second assembly, a first filter for filtering an air to a first assembly, and a second filter for filtering an air to a second assembly. The first filter is disposed at a side of the first assembly and the second filter is disposed on an opening of a wall which separates the first assembly and the second assembly.Type: ApplicationFiled: June 28, 2007Publication date: January 1, 2009Applicant: Sun Microsystems, Inc.Inventors: Thomas E. Stewart, Timothy W. Olesiewicz
-
Publication number: 20090007126Abstract: A method of implementing virtualization involves an improved approach to virtual memory management. An operating system includes a kernel, a resource control framework, a virtual memory subsystem, and a virtualization subsystem. The virtualization subsystem is capable of creating separate environments that logically isolate applications from each other. The virtual memory subsystem utilizes swap space to manage a backing store for anonymous memory. The separate environments share physical resources including swap space. When a separate environment is configured, properties are defined. Configuring a separate environment may include specifying a swap cap that specifies a maximum amount of swap space usable by the separate environment. The resource control framework includes a swap cap resource control. The swap cap resource control is enforced by the kernel such that during operation of the separate environment, the kernel enforces the swap cap specified when the separate environment was configured.Type: ApplicationFiled: June 29, 2007Publication date: January 1, 2009Applicant: SUN MICROSYSTEMS, INC.Inventors: Gerald A. Jelinek, Daniel B. Price, David S. Comay, Stephen Frances Lawrence
-
Publication number: 20090006620Abstract: A method for securing a commercial grid network over non-trusted routes involves receiving, by an administrative node in the commercial grid network, a lease request from a client to lease one of multiple resource nodes in the commercial grid network, wherein the client is separated from the resource node by a non-trusted route. The method further involves transmitting, by the administrative node, a network security key associated with the client to the resource node, storing, by the resource node, the network security key in a network security key repository specific to the resource node, establishing, by the resource node, a secure network tunnel over the non-trusted route using the network security key, transmitting a network packet securely between the client and the resource node over the secure network tunnel, and destroying, by the resource node, the secure network tunnel when a lease term associated with the client and the resource node expires.Type: ApplicationFiled: June 28, 2007Publication date: January 1, 2009Applicant: Sun Microsystems, Inc.Inventors: Kais Belgaied, Darrin P. Johnson
-
Patent number: 7471294Abstract: A method for visualizing web service interactions includes invoking a remote operation that causes a plurality of messages to be sent between two components in a connected system. The method further includes visually identifying a swim lane for each of the two components in a graphical display. For each message, a vector is plotted in the graphical display, where the vector extends from the swim lane of the message sender to the swim lane of the message recipient. The relative position of each vector depends on the time when the message was sent. A machine readable medium and an integrated development environment for representing asynchronous web service execution are also provided.Type: GrantFiled: June 22, 2005Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: Roderico Cruz, Christopher B. Webster, Todd Fast, Matthew J. Stevens
-
Method and apparatus for managing and accounting for bandwidth utilization within a computing system
Patent number: 7471689Abstract: A system and method are provided for controlling the computing bandwidth and resources provided to external entities based on subscription levels associated with those external entities. Higher subscription levels provide greater resource allocation. Accounting is accomplished by tracking bandwidth allocated and used over given periods of time.Type: GrantFiled: April 22, 2005Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: Sunay Tripathi, Jonathan I. Schwartz, Darrin Johnson -
Patent number: 7472311Abstract: One embodiment of the present invention provides a system that can test an interface between a TCP (Transmission Control Protocol) Offload Engine (TOE) and an OS (Operating System) that has a TCP software stack. Note that the TOE is a specialized integrated circuit which allows TCP-related computations to be offloaded from the processor that executes the OS. During operation, the system receives a request from the OS to perform a TCP-related computation on the TOE, wherein the TCP-related computation is associated with a portion of the TCP software stack. The system then performs the TCP-related computation by executing the portion of the TCP software stack on a processor, which can either be the same as the one that is executing the OS, or it can be a different processor. Note that performing the TCP-related computation on a processor, instead of the TOE, allows the interface between the TOE and the OS to be tested without requiring an actual TOE chip.Type: GrantFiled: October 14, 2005Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: Hsiao-Keng J. Chu, Eric T. Cheng, Sunay Tripathi
-
Patent number: 7472249Abstract: An approach for freeing memory based upon its relocatable or non-relocatable property is provided. In one embodiment, drivers and other processes that do not provide callback methods or similar capability to route DMA requests to the correct physical address are identified and all memory allocations made by the driver or other process are made from the appropriate region.Type: GrantFiled: June 30, 2006Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: Udayakumar Cholleti, Sean McEnroe, Stan J. Studzinski
-
Patent number: 7472256Abstract: Profile information can be used to target read operations that cause a substantial portion of misses in a program. A software value prediction technique that utilizes latency and is applied to the targeted read operations facilitates aggressive speculative execution without significant performance impact and without hardware support. A software value predictor issues prefetches for targeted read operations during speculative execution, and utilizes values from these prefetches during subsequent speculative execution, since the earlier prefectches should have completed, to update a software value prediction structure(s). Such a software based value prediction technique allows for aggressive speculative execution without the overhead of a hardware value predictor.Type: GrantFiled: April 12, 2005Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: Sreekumar R. Nair, Santosh G. Abraham
-
Patent number: 7472052Abstract: An apparatus and method are provided for simulating a target storage configuration for a computer system. In particular, a storage command is received from an application running on the computer system into a storage protocol stack on the computer system. The storage protocol stack is part of an operating system of the computer system and runs in kernel mode. The storage command is intercepted within the storage protocol stack by a kernel simulator module incorporated into the storage protocol stack. The intercepted storage command is forwarded from the kernel simulator module to a userland simulator module running in user mode. The userland simulator module generates a response to the storage command, where the response emulates the behavior of the target storage configuration. The response is then sent from the userland simulator module to the kernel simulator module, to be returned from the kernel simulator module to the application via the storage protocol stack.Type: GrantFiled: June 1, 2004Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: Dugald Foreman, Timothy Uglow
-
Patent number: 7472383Abstract: A system and method for providing exceptional flow control in protected code through memory layers. Code is generated. The generated code includes a sequence of normal operations and is subject to protection against copying during execution of the generated code. The generated code is instantiated as a master process into a master layer in a memory space. The master process is cloned by instantiating a copy of the master process as a child layer in the memory space. Execution points within the generated code are identified. A copy of at least a portion of the generated code containing each execution point as an exception layer is instantiated in the memory space. The generated code in the exception layer is patched at each identified execution point with operations exceptional to the normal operations sequence and which are performed upon a triggering of each execution point during execution of the generated code.Type: GrantFiled: August 13, 2004Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: Dean R. E. Long, Nedim Fresko, Christopher J. Plummer
-
Patent number: 7472253Abstract: A computer system comprising a main memory and a processor die coupled to the main memory by a first bus. The processor die includes a processor core coupled to a first cache memory and multiple base and bounds registers (BBRS). Each of BBRs have a base virtual address field, an ending virtual address field and a base physical address field. The first cache memory has a table lookaside buffer (TLB) entry stored therein.Type: GrantFiled: September 22, 2006Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: George Cameron, Blake Jones, Jeffrey Bonwick
-
Patent number: 7472323Abstract: A method and apparatus for stopping the internal clock of a microprocessor synchronously with the execution of an instruction is provided. A stop instruction is placed in a sequence of instructions to be executed by the microprocessor. The execution of the stop execution may store a stop value into a stop register of the microprocessor. Clock stop logic detects when the stop value has been stored into the stop register. The clock stop logic instructs a clock generation component, of the microprocessor, to cease generation of an internal clock signal, thereby preventing the microprocessor from changing state. As further instructions are not executed by the microprocessor, the state of the microprocessor reflects the execution of the instruction immediately prior to the stop instruction. The processing state of the microprocessor may be obtained for use in debugging the design of the microprocessor or the instructions executed thereby.Type: GrantFiled: September 26, 2005Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: Dale Robert Greenley, Chitresh Chandra Narasimhaiah, Senthilkumar Diraviam
-
Patent number: 7472264Abstract: One embodiment of the present invention provides a system that predicts a jump target for a jump instruction. During operation, the system starts fetching the jump instruction while executing a process. Next, the system uses a program counter for the process and uses state information that is specific to the process to look up the jump target for the jump instruction. Finally, the system uses the jump target returned by the lookup as a predicted jump target for the jump instruction.Type: GrantFiled: June 30, 2006Date of Patent: December 30, 2008Assignee: Sun Microsystems, Inc.Inventors: Edmond H. Yip, Paul Caprioli, Shailender Chaudhry, Jiejun Lu
-
Publication number: 20080318465Abstract: In order to monitor connectivity status associated with an interconnect cable from the end-points to which either end of the cable is attached, a storage device storing a field replaceable unit identifier is provided to uniquely identify a cable end-point, which identifier can then be accessed to determine the connectivity status.Type: ApplicationFiled: January 30, 2008Publication date: December 25, 2008Applicant: SUN MICROSYSTEMS, INC.Inventors: Bjorn Dag Johnsen, Ola Torudbakken, Inge Lars Birkeli, Andreas Bechtolsheim
-
Publication number: 20080320242Abstract: A method of implementing virtualization involves an improved approach to resource management. A virtualizing subsystem is capable of creating separate environments that logically isolate applications from each other. Some of the separate environments share physical resources including physical memory. When a separate environment is configured, properties for the separate environment are defined. Configuring a separate environment may include specifying a physical memory usage cap for the separate environment. A global resource capping background service enforces physical memory caps on any separate environments that have specified physical memory caps.Type: ApplicationFiled: June 19, 2007Publication date: December 25, 2008Applicant: SUN MICROSYSTEMS, INC.Inventors: Gerald A. Jelinek, Daniel B. Price, David S. Comay, Stephen Frances Lawrence
-
Publication number: 20080314979Abstract: In order to monitoring connectivity of cabling in a system comprising chassis components and cables interconnecting the chassis components, machine readable labels are applied to cable connectors and chassis component connectors, the machine readable labels on a cable connector and a chassis component to which the cable connector is connected are scanned, and the scanned connectivity information is recorded.Type: ApplicationFiled: January 17, 2008Publication date: December 25, 2008Applicant: SUN MICROSYSTEMS, INC.Inventors: Bjorn Dag Johnsen, Ola Torudbakken, Hans Ludvig Opheim, Andreas Bechtolsheim
-
Publication number: 20080317025Abstract: A switch system comprises a switch matrix providing a configurable, protocol agnostic, packet switching core, the switch matrix providing a non-blocking switch connecting a configurable number of ports together.Type: ApplicationFiled: June 4, 2008Publication date: December 25, 2008Applicant: SUN MICROSYSTEMS, INC.Inventors: Brian Manula, Ola Torudbakken, Hans Olaf Rygh
-
Publication number: 20080320474Abstract: A method of implementing virtualization involves dynamic, temporary resource pools. A virtualizing subsystem is capable of partitioning a plurality of physical resources to create resource pools. The virtualizing subsystem is further capable of creating separate environments that logically isolate applications from each other, and assigning a created separate environment to a created resource pool. A separate environment is configured by defining properties of the separate environment. Configuring the separate environment includes specifying at least one resource pool attribute. When the separate environment is started, a temporary resource pool is created from available physical resources and the separate environment is assigned to the temporary resource pool. The temporary resource pool is created in accordance with the at least one resource pool attribute specified when the separate environment was configured. The temporary resource pool may be destroyed when the separate environment is shutdown.Type: ApplicationFiled: June 19, 2007Publication date: December 25, 2008Applicant: SUN MICROSYSTEMS, INC.Inventors: Gerald A. Jelinek, Daniel B. Price, David S. Comay, Stephen Frances Lawrence
-
Publication number: 20080320117Abstract: In a system having a cluster of system components interconnected by a cluster interconnect fabric, the system components include out-of-band management network interfaces to an out-of-band management network. The system is configured to use the cluster interconnect fabric and the out-of-band management network interfaces to determine the overall connectivity and status of the cluster.Type: ApplicationFiled: May 21, 2008Publication date: December 25, 2008Applicant: SUN MICROSYSTEMS, INC.Inventors: Bjorn Dag Johnsen, Ola Torudbakken, Andreas Bechtolsheim
-
Publication number: 20080315985Abstract: In a switch system L groups of the line switch elements are connectable to cables that include L links such that each of the L links within a cable connect to a switch element of a respective one of the L groups. Fabric switch elements are connected such that a fabric switch element is connected to the line switch elements of one of the group of line switch elements.Type: ApplicationFiled: January 17, 2008Publication date: December 25, 2008Applicant: Sun Microsystems, Inc.Inventors: Bjorn Dag Johnsen, Ola Torudbakken, Andreas Bechtolsheim