Browse Prior Art Database

Resource Identification Scheme

IP.com Disclosure Number: IPCOM000074381D
Original Publication Date: 1971-Apr-01
Included in the Prior Art Database: 2005-Feb-23
Document File: 2 page(s) / 61K

Publishing Venue

IBM

Related People

Duffie, CA: AUTHOR [+2]

Abstract

This is a method of establishing and using a resource (e.g., line, terminal, component, etc.) identification scheme between a central processor and a communications controller. The design goal in defining this interface is as follows: Neither machine should be dependent upon the other's internal software architecture. For example, one machine might identify resources by indices into a Resource Control Block Vector table where another machine might use eight character symbolic names. Furthermore, even if both machines used the same type of resource identification (e.g., Resource Control Block Vector Table Index) the machines would most probably have their tables structured differently and independently.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 62% of the total text.

Page 1 of 2

Resource Identification Scheme

This is a method of establishing and using a resource (e.g., line, terminal, component, etc.) identification scheme between a central processor and a communications controller. The design goal in defining this interface is as follows: Neither machine should be dependent upon the other's

internal software architecture. For example, one machine

might identify resources by indices into a Resource Control

Block Vector table where another machine might use eight

character symbolic names. Furthermore, even if both machines

used the same type of resource identification (e.g., Resource

Control Block Vector Table Index) the machines would most

probably have their tables structured differently and

independently.

The one constraint imposed by the method is that each machine must maintain composite characteristic data for each resource that is to be identified to or by the other machine.

The method is described as follows: Each addressable resource in the system is represented by one unique number to the communications controller, and another (not necessarily the same) number to the central processor. The value of the number can range from zero to the maximum number of addressable resources supported by the machine in question.

The sending machine always refers to the resource being addressed in terms of the unique number in the receiving machine. As one machine receives the resource I.D. from the other, it converts this I.D. into an entry into...