摘要:
Methods, systems, and media to reduce delays associated with port assignments are disclosed. More specifically, embodiments include hardware and/or software to delay binding of selected port numbers to instances of applications. Some embodiments identify port numbers for which applications generate multiple bind calls that may connect with unique remote ports. The port numbers are stored in a port list that is accessible to the protocol stack and memory is allocated for storing flags and additional port configuration data. When a bind call is associated with a port number bound to another application instance and the port number is included in the port list, the bind call may then be delayed until a connect is received from the corresponding application instance. When the resulting four tuple is unique for the computer system, the corresponding application instance is bound to the port number and connected with the remote port.
摘要:
Disclosed is a virtual world server receives an update signal corresponding to an RFID tag. The virtual world server determines an RFID tag identifier, an RFID reader identifier, and an associated asset name from the update. The virtual world server looks up a virtual area associated with the RFID reader identifier. The virtual world server teleports a virtual asset associated with the RFID tag identifier to a virtual area in the virtual world. The virtual world server renders a model of the asset in a virtual world based on an avatar perspective.
摘要:
Determining availability of a destination for computer network communications that include providing on a caching device a destination availability cache comprising at least one cache entry representing availability of a destination and providing, from the caching device to a source, through computer network communications, information indicating the availability of the destination. In typical embodiments, the cache entry comprises a network address of a destination device and a time limitation for the cache entry.
摘要:
Responsive to receiving a request for a data communications connection, a data communications module of a receiver determines whether a sender of the request is local or remote with respect to the receiver. The data communications module also determines whether a location response flag indicates local or remote. If the relative location of the sender with respect to the receiver corresponds with the location response flag, then the data communications connection is allowed. Otherwise, the connection is not allowed.
摘要:
Responsive to receiving a request for a data communications connection, a data communications module of a receiver determines whether a sender of the request is local or remote with respect to the receiver. The data communications module also determines whether a location response flag indicates local or remote. If the relative location of the sender with respect to the receiver corresponds with the location response flag, then the data communications connection is allowed. Otherwise, the connection is not allowed.
摘要:
A mechanism is provided for identifying a snooping device in a network environment. A snoop echo response extractor generates an echo request packet with a bogus MAC address that will only be received by a snooping device. The snoop echo response extractor also uses an IP address that will cause the snooping device to respond to the echo request. Non-snooping devices discard the echo request packet. Upon receiving the response packet, the snooping device is identified.
摘要:
The present invention provides a computer implemented method, data processing system and computer program product for limiting instances of a client-server program within a plurality of platforms in a restricted distributed network. The data processing system receives an invocation of the client-server program. The data processing system assigns a write file to the client-server program wherein the write file has a write file name and the write file is on a distributed file system accessible to the plurality of platforms. The data processing system determines whether the write file is available. Responsive to a determination that the write file is available, the data processing system opens the write file for writing wherein the write file is associated with the client-server program. The data processing system, responsive to a determination that the write file is available, forms an addressing file having addressing information of a first instance of the client-server program.
摘要:
The reassembly timer in a TCP/IP receiver is dynamically set to avoid data corruption on fast networks caused by IP identification wrap-around. A receiver independently sets the reassembly timer to a first reassembly time set by the user for fast networks or to a second reassembly timer set by the user for slow networks based on whether the receiver and sender are on the same subnet.
摘要:
A computer implemented method and data processing system for the detection and recovery of a network interface card TCP acceleration offload failure. Responsive to a failure to receive an acknowledgement of a transmission control protocol segment containing a request for a transmission control protocol offload function in a network interface card, the transmission control protocol segment is retransmitted without the request for a transmission control protocol offload function. When an acknowledgement of the retransmitted transmission control protocol segment without the request for a transmission control protocol offload function is received, a counter is incremented which indicates a failure of the transmission control protocol offload function. Responsive to the counter exceeding a predefined number of allowed failures, all requests to the transmission control protocol offload function for the network interface card are stopped.
摘要:
An embodiment allows an application to use a unique feature of an operating system residing on a LPAR different than its own. If the application makes a request for a feature not available in the operating system that it runs on, a transporter module can check its records to verify if such a feature exists on another operating system in a different LPAR. If it does exist, the transporter communicates to a facilitator of the operating system on the different LPAR though a hypervisor. The facilitator provides the unique feature to the transporter, who then forwards it to the application in need.