Browse Prior Art Database

Data Flow Through Back-Level Nodes in a Network

IP.com Disclosure Number: IPCOM000122855D
Original Publication Date: 1998-Jan-01
Included in the Prior Art Database: 2005-Apr-04
Document File: 2 page(s) / 51K

Publishing Venue

IBM

Related People

Chapman, CE: AUTHOR [+3]

Abstract

When applications communicate, the data that flows between them usually consists of two parts: 1. Control data, containing information that is meaningful to the software layer that mediates the communication. 2. Application data, containing information that is meaningful to the sending and receiving applications.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 61% of the total text.

Data Flow Through Back-Level Nodes in a Network

      When applications communicate, the data that flows between them
usually consists of two parts:
  1.  Control data, containing information that is meaningful
       to the software layer that mediates the communication.
  2.  Application data, containing information that is meaningful
       to the sending and receiving applications.

      When communication is over a network, the data may flow
sequentially through many instances of the mediating software, and
problems can arise when the various instances of the mediating
software are not all at the same functional level; that is, some
instances are at the current level, but other instances are
back-level.

      Capabilities which exist only in the current level are not
supported by the back-level instances, and hence those parts of the
control data that support the new capabilities will not be accepted
by the back-level instances of the mediating software.  If both the
sending and receiving applications are interfacing with current-level
instances of the mediating software, those applications may use the
new capabilities PROVIDED that there is some way of allowing the
control data associated with the new capabilities to pass unmolested
through back-level instances of the mediating software.

      The described solution exploits the fact that the mediating
software allows the application data to be arbitrary, by causing the
control info...