Browse Prior Art Database

Enterprise Address Book Shadowing

IP.com Disclosure Number: IPCOM000108756D
Original Publication Date: 1992-Jun-01
Included in the Prior Art Database: 2005-Mar-22
Document File: 2 page(s) / 109K

Publishing Venue

IBM

Related People

Berg, M: AUTHOR [+10]

Abstract

A method for automatic updates of users on a system is disclosed. The information for users is maintained throughout a network at a frequency chosen by the system administrators. Only the fields for a user that changed since the last update are communicated into the network after an initialization of the data.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Enterprise Address Book Shadowing

       A method for automatic updates of users on a system is
disclosed.  The information for users is maintained throughout a
network at a frequency chosen by the system administrators.  Only the
fields for a user that changed since the last update are communicated
into the network after an initialization of the data.

      Address book shadowing keeps track of any changes made to the
user's information and to propagate those changes to any system in
the network that requests those changes through APPC LU6.2.

      An LU6.2 protocol was designed that sends and receives records
in the conversation.  This involved designing the following types of
records to be used in the LU6.2 conversation:
o  I record - Initialization record that contains the data that is
needed to start the conversation.
o  R record - The type of request that the collector is making.
o  A record - For adding a user to the shadowing network. Defined in
such a way as to only send fields that are used and to send in
each field the amount of data specified.
o  C record - Changing a field for a user.  Identifying information
and only the specified data is sent.
o  D record - For deleting a user from the shadowing network.
o  E record - An error record for errors.

      The systems first do an initialization of the address book
data.  This can be done either offline or by sending "A records" to
the other system via LU6.2.  The offline processing basically writes
"A records" to tape or diskette and, when initializing the other
system, it "receives" those records with common processing (the
collector does not know if the "A records" are coming from tape or by
communication).

      From then on, any changes made to the supplier system's address
book are logged to the change log with a timestamp. It is saved in
the change log until it has been supplied to all collector systems.

      Some of the fields in address book shadowing are defined on
some systems and not other systems.  In order to meet all the needs
of maintaining these self-defined fields, the ability was added to
pass through changes to these self-defined fields to other systems in
the network in case other systems had these fields defined.

      The supplier system keeps track of when the last change log
entry was sent to each collector system.  Therefore, when each
collector system collects, only the changes made since the last
collection to that system are supplied.

      On the collector side, the adds, changes, and deletes need to
be evaluated to ensure the operation was th...