摘要:
A method, data processing system, and computer usable code are provided for protocol definition for software bridge failover. In a first aspect of the present invention, a first software bridge determines the proper working operation of a physical adapter. Limbo packets are sent to a second software bridge alerting the second software bridge that the first software bridge is no longer bridging traffic responsive to the physical adapter failure in the first software bridge. The second software bridge receives the limbo packets, and, in response to receiving the limbo packets, asserts primary control and initiates bridging of traffic. In an alternative aspect of the present invention a first software bridge sends keep-alive packets. A second software bridge monitors the keep-alive packets from the first software bridge and, in response to a failure to detect the keep-alive packets from the first software bridge, the second software bridge initiates bridging of traffic.
摘要:
A NAT data processing system is located behind a NAT enabled network with a NAT device as a gateway to the NAT enabled network. A client system located outside the NAT enabled network queries the NAT device for the address of the NAT data processing system located behind the NAT enabled network. The query is automatically routed through the NAT device to a DNS server. The DNS server returns an address for the NAT data processing system and source routing for the NAT device. The NAT device forwards the address and source routing to the client system. The client system sends packets to the NAT data processing system at the address with source routing through the NAT device, such that the NAT data processing system behind the NAT enabled network is directly accessed by the client system from outside the NAT enabled network.
摘要:
A method, an apparatus, and computer instructions are provided for a secure network install. One aspect of the present invention provides a proxy server within the same subnet of the client for performing a lookup of the boot image file and downloading the boot image file from a boot file server in a secure manner. The client in turn downloads the file from the proxy TFTP server. Another aspect of the present invention modifies the client remote boot code to include a secure boot file download discovery (SBDD) mode. The client starts the SBDD mode by sending a request for a boot image file to a subnet broadcast address and port, which is listened by a proxy TFTP server. The proxy TFTP server receives the client request and downloads the boot image file. The client in turn downloads the boot image file from the proxy TFTP server.
摘要:
Methods, systems, and products are provided for tunneling IPv6 packets. Embodiments include receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv6 packet having an IPv6 destination address; receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv4 address for a destination IPv6 border router retrieved from a data structure associating IPv6 destination addresses with IPv4 addresses for destination IPv6 border routers; encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet; and sending the encapsulated packet to a destination IPv6 border router at the IPv4 address. In many embodiments, encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet is carried out by adding an IPv4 header to the IPv6 packet.
摘要:
A method for enabling multi-tuple TCP sockets within a computer network is disclosed. All possible connection paths between a first computer and a second computer are initially determined. Then, tuple information of all the possible connection paths are stored in a respective socket of the first and second computers as multi-tuple information. Next, one of the possible connection paths is designated as a preferred path and the remaining possible connection paths are designated as alternate paths. Finally, data packets are transmitted via the preferred path after a TCP connection has been established between the first and second computers on the preferred path.
摘要:
In a method comprising an embodiment of the invention, an original application initially binds to a port, and selects or designates a confidential key, which usefully may be a conventional cookie. The invention also sets a socket option, referred to by way of example, as SO_SECURE_REUSEPORT. The confidential key, together with the port number, is then registered with the operating system of a host associated with the port. In order for another application to subsequently bind to the port, such application must provide the operating system with a key that is identical to the confidential key. In one useful embodiment of the invention, a first application binds a socket to a particular port associated with the host. A specified key is registered with the operating system, and a second application is allowed to bind to the particular port only if the second application can furnish the operating system with a key that matches the specified key.
摘要:
A method and system for providing subgroup conversation during a teleconference enables side conversations during a virtual meeting. A passcode is used by parties to join the subgroup conversation, so that privacy of the subgroup is maintained. Alternatively, an administrator may set up subgroups and either join or invite members, who may toggle between the main teleconference and a subgroup teleconference using a standardized user input. The system may be implemented in any telephone network and across telephone networks such as public switched telephone networks (PSTNs), wireless networks, voice over Internet protocol networks and/or private branch exchanges (PBXs).
摘要:
A system and method for forwarding URL's to one or more recipients using a Wireless Access Protocol (WAP) network is provided. A mobile user views web pages on his WAP enabled wireless device, such as a mobile telephone or PDA. When the mobile user locates a web page that he prefers to view later or wants to send to another user, the mobile user invokes redirect software which composes a redirect request that includes one or more redirect entries. Each redirect entry corresponds to a redirect address and a URL. When the user finishes with selecting one or more redirect addresses, the mobile device sends the redirect request to a WAP gateway. The WAP gateway receives the redirect requests and forwards the redirect entries to the corresponding redirect addresses over a computer network, such as the Internet.
摘要:
DHCP lease negotiation is performed in advance of a specified time when the IP address is needed. The client sends a DHCP discover message with an advance lease option indicating a future time when an IP address is needed. The DHCP server reserves an IP address available at the requested time for the requesting client and sends a DHCP acknowledgment of the reservation. Thereafter, the client sends a DHCP discover message requesting the reserved IP address, and the DHCP server assigns it to the client at the scheduled time.
摘要:
A first Virtual Input/Output Server (VIOS) of a VIOS cluster performs the functions of: generating, at a sending daemon of the first VIOS, a send message that is to be transmitted to a receiving daemon at a second VIOS; in response to completion of the generating of the send message, forwarding the send message to a sending virtual small computer systems interface (vscsi) kernel extension (VKE) via a system call interface; and in response to the sending VKE receiving the send message from the sending daemon, forwarding the send message to one or more second VIOSes within the VIOS cluster utilizing a kcluster interface. The sending VKE parses at least one of a message header and a sub-header of the send message; and responsive to detection of a broadcast setting for the send message, the VKE forwards the send message to all nodes within the cluster via a cluster broadcast.