Abstract:
The illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for managing a plurality of interfaces. An application selects a subset of the plurality of interfaces. In response to the selection, the application is bound to the subset of interfaces, wherein the application listens to the subset of interfaces.
Abstract:
Retrieving dated content from a website including receiving a URL for dated content with a date field; inserting the current date in the date field; and retrieving the dated content with the URL bearing the current date in its date field. In some embodiments, date field bears an encoded date and inserting the current date in the date field includes replacing the encoded date with the current date. Typical embodiments also include bookmarking the URL, including replacing an encoded date in the date field with a date tag. Some embodiments include prompting the user for a date format. In many embodiments, the date tag includes a default date format. Some embodiments include configuring the browser with a default date format.
Abstract:
A system, apparatus and method of improving network data traffic between interconnected high-speed switches are provided. As is well known, when a packet of data is longer than a path maximum transmission unit (PMTU), the packet will be fragmented. In the case of the invention, the packet is fragmented by a transmitting router connected to a high-speed switch. When a receiving router, which is also connected to an high-speed switch, begins to receive the fragments, it will check to see whether its sub-network may handle data of a substantially longer length than the length of the fragments. If so, the receiving router will collect the fragments, reassemble them into the original packet and transmit the reassembled packet to its destination.
Abstract:
Methods, systems, and media to sub-divide an ephemeral port range and allocate ports from the sub-divided ephemeral port ranges to facilitate communication with another destination, or target, application are contemplated. Embodiments involve a client computer system having one or more source applications. Embodiments also include hardware and/or software for categorizing transactions based upon characteristics of the transactions. Such categories correspond to categories with which sub-divisions of ephemeral port numbers are assigned. After a transaction is associated with a category, a port number selected from a pool of available port numbers in a sub-division of ephemeral port numbers assigned to that category. In many embodiments, an initial configuration is implemented via a configuration file at the startup of the client computer system. In further embodiments, assignments of ephemeral port numbers to the categories of transactions are dynamically adjusted based upon, e.g., actual usage of the port numbers.
Abstract:
Methods, systems, and products are disclosed for dynamically provisioning server resources. More particularly, methods, systems, and products are disclosed for dynamically provisioning computer system resources that include monitoring a connection performance parameter of a data communications port operating in a data communications protocol having a connection backlog queue having a connection backlog queue size; and changing the connection backlog queue size in dependence upon the monitored connection performance parameter without interrupting the operation of the data communications port and without user intervention. In typical embodiments of the present invention, monitoring a connection performance parameter includes receiving a connection request and determining that the connection backlog queue is full, and changing the connection backlog queue size in dependence upon the monitored connection performance parameter includes increasing the connection backlog queue size.
Abstract:
The present invention provides a method and apparatus for handling reordered data packets. A method comprises receiving a data packet and determining if the data packet is received out of order. The method further comprises delaying transmission of an acknowledgement indicating that a data packet is missing in response to determining that the data packet is received out of order.
Abstract:
A method, system, and program for accessing data processing systems behind a NAT enabled network are provided. According to one aspect of the present invention, a NAT data processing system is located behind a NAT enabled network with a NAT device as a gateway to the NAT enabled network. A client system located outside the NAT enabled network queries the NAT device for the address of the NAT data processing system located behind the NAT enabled network. The query is automatically routed through the NAT device to a DNS server. The DNS server then returns an address for the NAT data processing system and source routing for the NAT device. The NAT device forwards the address and source routing to the client system. Then, the client system sends packets to the NAT data processing system at the address with source routing through the NAT device, such that the NAT data processing system behind the NAT enabled network is directly accessed by the client system from outside the NAT enabled network.
Abstract:
A method, system, and program for monitoring thread usage to dynamically control a thread pool are provided. An application running on the server system invokes a listener thread on a listener socket for receiving client requests at the server system and passing the client requests to one of multiple threads waiting in a thread pool. Additionally, the application sends an ioctl call in blocking mode on the listener thread. A TCP layer within the server system detects the listener thread in blocking mode and monitors a thread count of at least one of a number of incoming requests waiting to be processed and a number of said plurality of threads remaining idle in the thread pool over a sample period. Once the TCP layer detects a thread usage event, the ioctl call is returned indicating the thread usage event with the thread count, such that a number of threads in the thread pool may be dynamically adjusted to handle the thread count.
Abstract:
A receiving host in a TCP/IP network sends an acknowledgment indicating a received data packet is corrupt. The sending host will begin transmitting with a new field set in the IP header called a check-TCP-checksum bit, thereby requesting that all routers in the TCP/IP network perform a checksum on the entire received packet. Routers in the TCP/IP network will perform a complete checksum on an entire packet with the check-TCP-checksum bit set, and not just on the IP header. The routers continuously monitor the ratio of corrupt packets received on a particular port that fail the entire packet checksum to the total number of packets received on that port. If the ratio of corrupt-to-received packets exceeds a corruption threshold, the router assumes that the associated link is causing data corruption and issues a routing update indicating that the link is bad and should be avoided. Once the retransmission rate between the sender and receiver drops below a threshold level, the bad link has been detected and avoided within the TCP/IP network and the check-TCP-checksum option in the IP header is no longer set in data packets transmitted to the receiver host.