Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for accessing remote data and computer using the method

A technology of remote computer and access method, which is applied in the field of remote data access method and the computer using the method, and can solve problems such as limited application programs, application programs that cannot be used, errors, etc.

Inactive Publication Date: 2006-10-25
ACER INC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the problem with network computers is that applications are limited to Java or JavaScript, so existing applications (such as Microsoft Word) cannot be used, making their functions very limited
[0004] Another kind of structure is so-called remote installation service (remote installation services, RIS), and its concept is to utilize a RIS server to manage the software that terminal computer needs in a unified way, but its shortcoming is: before carrying out the operation of remote installation, except In addition to installing the same operating system and corresponding RIS application programs on both the RIS server and the terminal computer, further settings (such as DHCP, DNS host) are required on the terminal computer. On the other hand, since the data is transmitted through the RIS server Before transmitting to the terminal computer, it needs to be converted into RIS format by RIS application program, so if the data to be transmitted has a copy protection mechanism instead of a standard data format, errors may occur during the conversion process
However, although this method is superior to the aforementioned method, since the simulator 202 needs to be responsible for the entire process of data access, it needs an independent central processing unit, dynamic random access memory, control unit... and other components, which seems to be a miniature host computer, so the construction cost of the emulator 202 is very high, especially under the network architecture with multiple computers 500, if each computer 500 is installed, then its overall cost is even more considerable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for accessing remote data and computer using the method
  • Method for accessing remote data and computer using the method
  • Method for accessing remote data and computer using the method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The above and other technical content, features and effects of the present invention will be clearly understood in the detailed description of a preferred embodiment in conjunction with the accompanying drawings.

[0040] refer to figure 2 and image 3 , under the system architecture of the present invention, a near-end computer 100 is connected to a remote computer 200, and its connection mode can be through a local area network (LAN), a wide area local area network (WLAN) or the Internet (Internet) etc. etc. Therefore, the local computer 100 can communicate with the remote computer 200 through a standard network transmission protocol (such as TCP / IP).

[0041] The near-end computer 100 includes a network adapter card (NIC) 1 for physical network connection, a processor (processor) 2 connected to the network adapter card 1, a read-only memory 3, a random access memory ( RAM, or main memory) 4. A plurality of computer program codes have been stored in the read-only ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The remote data access method of the present invention uses a computer to access data in a remote computer. The steps are to first receive a read request from a processor in the computer to be sent to a hard disk, and then use a simulator to interrupt the read request, and send an interrupt signal to the processor, so that the processor enters an independent operation mode that has nothing to do with an operating system. After the processor enters the independent operation mode, a The corresponding data is read from the hard disk and stored in a data register. Finally, the emulator sends an interrupt request (IRQ) to the processor in the normal mode to complete the read operation.

Description

technical field [0001] The present invention relates to a remote data access method independent of the operating system and a computer using the method, in particular to a method for remote data access using a processor system management mode and a computer using the method. Background technique [0002] Due to the increasing popularity of computer networks, once the demand for a certain computer is insufficient, for example, when the application program or operating system needs to be replaced or upgraded, the required program is often downloaded from a remote computer through a local area network, the Internet, etc. However, for network systems For administrators, in order to effectively manage and grasp the situation of each computer in a unified manner, there is a concept of centralizing and managing all software through remote computers. [0003] A network computer (network computer, NC) is a terminal computer with a simple operating system. Once the computer is turned ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/00G06F13/16G06F13/24
Inventor 赖怡吉
Owner ACER INC