Browse Prior Art Database

Transparent Access of Remote Resources

IP.com Disclosure Number: IPCOM000044531D
Original Publication Date: 1984-Dec-01
Included in the Prior Art Database: 2005-Feb-06
Document File: 2 page(s) / 33K

Publishing Venue

IBM

Related People

Desrosiers, MR: AUTHOR [+4]

Abstract

A technique is described whereby resource redirection is attained in local area network applications to allow a central processing unit (CPU), through device attachments, such as disk drives or printers, to configure a server program so as to control the resource as a shared entity. This enables all transactions to be directed to the resource by logical name, on a transparent level, to other local operations, either by local processing or network communications. A resource redirector program, when loaded into the application system 10, as shown in the figure, enables access to any of the server resources 11 available to the system on the network 12. The resources are controlled by a server program, which is user-controlled and is transparent to other programs. The server program can be used in either local or remote mode.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 88% of the total text.

Page 1 of 2

Transparent Access of Remote Resources

A technique is described whereby resource redirection is attained in local area network applications to allow a central processing unit (CPU), through device attachments, such as disk drives or printers, to configure a server program so as to control the resource as a shared entity. This enables all transactions to be directed to the resource by logical name, on a transparent level, to other local operations, either by local processing or network communications. A resource redirector program, when loaded into the application system 10, as shown in the figure, enables access to any of the server resources 11 available to the system on the network 12. The resources are controlled by a server program, which is user-controlled and is transparent to other programs. The server program can be used in either local or remote mode. An example of the resource sharing concept is as follows. When server system 11 enters the command to share diskette drive A on the network 12, a control name is specified. Any other system on the network may direct its device I/O to that code name. The server systems 11 on the network 12 are transparent to the user so that the code name may be selectively accessed. Passwords and other measures may be used to insure security. The operating system used in establishing the initial resource redirection program need not be uniform throughout the server systems on the network. For example, a one-server system ma...