摘要:
An approach is provided in which a hypervisor provisions switch resources on a network interface card, which includes a virtual switch and a physical port. The hypervisor invokes a switch control module on a virtual machine, which provides control information to one or more of the switch resources. In turn, one or more of the switch resources utilize the control information to direct data packets between a source virtual machine and a destination virtual machine over one or more virtual networks that are independent of physical topology constraints of a physical network.
摘要:
A computer implemented method, apparatus, and computer usable program code for managing a software partition in logical partitioned data processing system. A virtual root process is created for the software partition, wherein the virtual root process functions as a root process for the software partition. The set of child processes is re-parented to the virtual root process in response to termination of a process having a set of child processes.
摘要:
Exemplary embodiments provide a computer implemented method, apparatus, and computer-usable program code for moving a software partition from an origination network file system client data processing system to a destination network file system client data processing system. Responsive to receiving a request to perform a checkpoint operation on a software partition, network file system related mount information for the software partition is gathered. Determined ports of a network are unblocked. Unwritten data on the origination network file system client data processing system is synchronized with a remote network file system server. The network is re-blocked. A checkpoint file is generated and stored. The checkpoint file is sent to the destination network file system data processing system.
摘要:
A method, apparatus, and computer instructions for handling intrusions. A tracer packet is sent back to an intruder causing the intrusion in response to receiving notification of an intrusion from a particular node in a network data processing system. Nodes in the network data processing system are notified of the tracer packet. Identification of the node is stored for use in tracing a route of the tracer packet through the data processing system in response to receiving a message from a node indicating receipt of the tracer packet.
摘要:
Methods, systems, and products are provided for tunneling IPv6 packets. Embodiments include receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv6 packet having an IPv6 destination address; receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv4 address for a destination IPv6 border router retrieved from a data structure associating IPv6 destination addresses with IPv4 addresses for destination IPv6 border routers; encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet; and sending the encapsulated packet to a destination IPv6 border router at the IPv4 address. In many embodiments, encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet is carried out by adding an IPv4 header to the IPv6 packet.
摘要:
In a first aspect, a first method is provided for creating a media access control (MAC) address for a device. The first method includes the steps of (1) obtaining one or more identifiers; (2) obtaining a first MAC address; and (3) creating at least a second MAC address based on the one or more identifiers and the first MAC address. Numerous other aspects are provided.
摘要:
A method, system, and computer program product for delivering data, received from a network on a network adapter to a pre-assigned port, to a storage buffer assigned to an application are disclosed. An application designates an application-specific buffer within a local data processing system for buffering data communicated with the application. The local data processing system reports to a network interface of the local data processing system a memory address of the designated application-specific buffer, and the data processing system designates a port on which to receive packets addressed to the memory address. The data processing system then sends a port registration message to the local network interface, enabling the network interface to compare the port number of incoming traffic to a registered port number and route incoming traffic from a remote data processing system directly to the designated application-specific buffers in the event of a match. In one embodiment, the present invention includes receiving in the network interface a packet addressed to the specific port and delivering data from the packet to said application-specific buffer.
摘要:
A method, system and network protocol that enables each host within a virtual local area network (VLAN) environment to automatically discover to which VLANs the host belongs. When a host initially sets up a communication interface, the host generates a series of probing packets, each including a different one of the range of possible VLAN IDs within the packet header. The probing packet requests a response from the switch indicating whether the corresponding VLAN (identified by the VLAN ID) is supported by the switch. The switch automatically drops any packets with a VLAN ID not recognized/supported/configured in the switch. The destination device only receives supported packets, and thus the interface only receives a response for those request packets having a VLAN ID associated with a supported VLAN. The host's interface then knows which VLAN ID(s) are supported, and the host assigns/utilizes only those VLAN IDs for outgoing traffic.
摘要:
A method, data processing system, and computer usable code are provided for protocol definition for software bridge failover. In a first aspect of the present invention, a first software bridge determines the proper working operation of a physical adapter. Limbo packets are sent to a second software bridge alerting the second software bridge that the first software bridge is no longer bridging traffic responsive to the physical adapter failure in the first software bridge. The second software bridge receives the limbo packets, and, in response to receiving the limbo packets, asserts primary control and initiates bridging of traffic. In an alternative aspect of the present invention a first software bridge sends keep-alive packets. A second software bridge monitors the keep-alive packets from the first software bridge and, in response to a failure to detect the keep-alive packets from the first software bridge, the second software bridge initiates bridging of traffic.
摘要:
In a first aspect, a first method is provided for creating a media access control (MAC) address for a device. The first method includes the steps of (1) obtaining one or more identifiers; (2) obtaining a first MAC address; and (3) creating at least a second MAC address based on the one or more identifiers and the first MAC address. Numerous other aspects are provided.