摘要:
Methods, systems and computer program products are provided for transferring a Virtual IP Address (VIPA) from a first application instance to a second application instance executing on a cluster of data processing systems having a plurality of communication protocol stacks. A list of dynamic VIPAs is distributed among the protocol stacks and a hierarchy of backup communication protocol stacks for the dynamic VIPAs is determined based on the list of dynamic VIPAs. Upon receiving notification of failure of the first stack the second stack evaluates the hierarchy of backup stacks to determine if it is the next stack in the hierarchy for the VIPA associated with the first application instance. If so, then the VIPA associated with the first application instance is transferred to the second communication protocol stack associated with the second application instance.
摘要:
Methods, systems and computer program products are provided which communicate between client applications and a transaction server by establishing a persistent secure connection between the transaction server and a Secure Socket Layer (SSL) proxy server. A first session specific SSL connection, different from the persistent secure connection, is also established between a first client application and the SSL proxy server. Communications between the first client application and the SSL proxy server transmitted over the first session specific SSL connection are then forwarded with the client's identity preserved to the transaction server over the persistent secure connection. Furthermore, a second session specific SSL connection between a second client application and the SSL proxy server may also be established and the communications between the second client application and the SSL proxy server transmitted over the second session specific SSL connection are forwarded to the transaction server over the persistent secure connection. Preferably, the persistent secure connection is an SSL connection.
摘要:
Systems and methods are disclosed for differentiated handling of VoIP call control messages according to their importance and functionality, thus providing to VoIP infrastructures a level of robust call control similar to that in PSTN networks. SIP messages are classified by their type or content, and resources of a VoIP call control server are allocated to the SIP messages according to a policy. The scheme also provides overload protection and prioritized handling of certain kinds of requests in VoIP call control servers.
摘要:
The rate staggering technique for efficient storage and retrieval of video data is embodied in a data processing system including a disk array based video server, which includes a disk array for storing video data, a processor for processing data, a memory buffer for storing video data and a rate staggering controller. Data is transferred to a network from video server through a network interface and from the network to client stations employing devices having differing resolution capabilities. The processor executes tasks under control of the rate staggering controller. These tasks include a retrieval task which retrieves scalable video from the array of disks, a storage task which stores videos temporarily in the memory buffer, and a transmission task which transmits video to client stations through the network.
摘要:
Techniques are disclosed for network distribution and provisioning of applications, such as transactional applications and parallel applications, across multiple administrative domains that ensure compliance with service level agreements. For example, a method of provisioning one or more resources in a distributed computing network to ensure compliance with a service level agreement associated with a computer application includes the following steps. Network performance is monitored between a local domain and one or more cooperating domains connected to the local domain by network paths. A present or predicted violation of the service level agreement is identified based on at least a portion of results of the monitoring step. One or more cooperating domains are selected that can effect compliance with the service level agreement by instantiating one or more network resources within at least one of the selected cooperating domains in response to a request from the local domain. Reconfiguration of the local domain is effectuated to allow the computer application to make use of the one or more newly instantiated network resources within the selected cooperating domain.
摘要:
Techniques are disclosed for network distribution and provisioning of applications, such as transactional applications and parallel applications, across multiple administrative domains that ensure compliance with service level agreements. For example, a method of provisioning one or more resources in a distributed computing network to ensure compliance with a service level agreement associated with a computer application includes the following steps. Network performance is monitored between a local domain and one or more cooperating domains connected to the local domain by network paths. A present or predicted violation of the service level agreement is identified based on at least a portion of results of the monitoring step. One or more cooperating domains are selected that can effect compliance with the service level agreement by instantiating one or more network resources within at least one of the selected cooperating domains in response to a request from the local domain. Reconfiguration of the local domain is effectuated to allow the computer application to make use of the one or more newly instantiated network resources within the selected cooperating domain.
摘要:
A computer connected to one or more networks through appropriate network interfaces is used to classify, manipulate, and/or control communications, e.g., packets sent and/or received over the network by one or more applications executing in the computer. Each application is connected to the network through one or more sockets to enable this communication. The computer also comprises one or more rule sets of one or more rules. A socket set of one or more of the sockets is associated with only one of the rule sets. The rules in the rule set are used to control one or more of the packets communicated by the applications communicating over the socket(s) associated with the respective rule set. Rules can be added to the rule set, deleted from the rule set, or modified in order to classify, manipulate, and/or control the communication of the packets, e.g. to control the rate at which the packets are sent or to provide certain security functions.
摘要:
The present invention provides a method and system for providing quality-of-service to VoIP over a wireless local access network by providing periodic, contention-free access to a wireless link for voice packets. This is achieved by coupling Session Initiation Protocol (“SIP”) signaling for call setup with the Point Coordination Function mode of operation of the 802.11 medium access control. The result is that VoIP call signaling via SIP is tied with availability of periodic time-slots on the wireless medium. The periodic time-slots are used to guarantee contention-free access to the wireless link for voice packets. Accordingly, the present invention, in effect, merges two networking technologies: SIP-based VoIP and 802.11-based wireless LANs.
摘要:
A method and system for enabling voice over Internet for computer applications includes registering session initiation protocol (SIP) as a system service and providing SIP service through an application programming interface (API) to permit access to service functions by individual software applications. A SIP link is provided within a software application to permit user invocation of SIP service functions. The link may be passed as a parameter to permit external access to an invoked service function.
摘要:
A system and method of transforming the standard compressed media stream used for distribution to a local form for a client station. A media stream is downloaded from an input source to a device in the local station and then played out the video stream in the local station. During the playout, the stream is transformed to another storage format by altering the standard/original compression form to a local form.