Browse Prior Art Database

Methodology for Prohibiting Program Execution Upon Detection of a Particular Local Area Network Topology

IP.com Disclosure Number: IPCOM000105387D
Original Publication Date: 1993-Jul-01
Included in the Prior Art Database: 2005-Mar-19
Document File: 2 page(s) / 65K

Publishing Venue

IBM

Related People

Johnson, WJ: AUTHOR [+2]

Abstract

A program is described which allows a user to configure a predicate for a Local Area Network (LAN) topology condition whereby the condition represented by the predicate determines prohibiting execution of one or more programs.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Methodology for Prohibiting Program Execution Upon Detection of a Particular Local Area Network Topology

      A program is described which allows a user to configure a
predicate for a Local Area Network (LAN) topology condition whereby
the condition represented by the predicate determines prohibiting
execution of one or more programs.

      Current programming environments provide tools to identify what
is running on a computer.  A human makes assessments about the system
by evaluating a multiplicity of processes in conjunction with each
other.  Many performance problems arise in environments where a
multiplicity of users and/or processes are active.  A method is
needed for automatically prohibiting execution of programs when a
particular LAN topology is detected, particularly for maintaining a
performance conscious environment.

      The preferred method for configuration is an ASCII profile
implementation which is internalized by the system at re-boot time.
The profile contains user topology constraint predicates which
determine whether to prohibit execution of one or more programs.  The
profile is read by a system at system re-boot time (like an OS/2*
CONFIG.SYS) and internalized for subsequent access.  A terminate and
stay resident program, coupled to an appropriate communications
medium for the purpose of detecting the configured topology
predicates, monitors the environment to see who is doing what.  For
example, on a mail server where performance becomes crucial, this
mechanism could be coupled to the server processes which manage mail
requesters.  Upon detection of 50 or more active users, one or more
programs can be automatically prohibi...