摘要:
A method, system and computer program product for providing a seamless transition for resizing virtual machines from a development environment to a production environment. An administrative server receives an instruction from a customer to resize a virtual machine running on a cloud computing node, where the resized virtual machine requires physical resources (e.g., twenty physical processor cores) to be utilized in the production environment. Instead of the administrative server utilizing the same number of physical resources in the development environment that need to be utilized in the production environment, the administrative server utilizes a fewer number of physical resources by also utilizing virtual resources (e.g., twenty virtual processor cores and only two physical processor cores) so as to provide a development environment with the same resource capacity as the production environment but with fewer physical resources thereby more efficiently utilizing the physical resources on the cloud computing node.
摘要:
Methods and systems for providing non-proxy Secure Sockets Layer and Transport Layer Security (SSL/TLS) support in a content-based load balancer are described. A Transmission Control Protocol (TCP) connection is accepted from a client, and an SSL/TLS connection is established with the client such that random data used in key generation is created. A request is received from the client, and the request is decrypted. The request is processed, a target stack is selected, and the TCP connection, the SSL/TLS connection, and the random data are transferred to the selected target stack such that the client and selected target stack maintain an end-to-end TCP connection with a non-proxy SSL/TLS connection.
摘要:
Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.
摘要:
Methods and systems for providing end-to-end content-based load balancing are described. A Transmission Control Protocol (TCP) connection is accepted from a client and a request is received from the client. The request is processed, a target stack is selected, and the TCP connection is transferred to the selected target stack such that the client and selected target stack maintain an end-to-end TCP connection. In an exemplary embodiment, the request can be processed in a TCP kernel. In another preferred embodiment, the TCP connection can include TCP data packets and the request can include request data packets. The TCP connection transfer can be performed by replaying the TCP data packets and the request data packets to the selected target stack.
摘要:
Embodiments of the present invention provide a method, system and computer program product for Mobile IPv6 binding cache support for a load balanced sysplex. In one embodiment of the invention, a load balancing sysplex can be configured for mobile device binding cache support. The sysplex can include a distributor coupled to different targets in a load balancing arrangement, where each of the targets can support a correspondent node enabled to communicate with a mobile device. A master binding cache can be coupled to the distributor and a binding cache manager can be coupled to the distributor. Notably, the binding cache manager can perform return routability with the mobile device and can provide a corresponding entry in the master binding cache for use by a target supporting a correspondent node for the mobile device. In one aspect of the embodiment, a replica of the master binding cache can be provided in each of the targets for use by supported correspondent nodes in communicating with different mobile devices associated with binding cache entries in the replica.
摘要:
Methods, systems and computer program products for load balancing using Mobile Internet Protocol (IP) Version 6 are provided. A request for a connection is received from a client at a routing stack. A Mobile IP Version 6 Binding Update message is transmitted from the routing stack to the client responsive to the received request. The Binding Update message identifies a selected target stack so as to allow the client to communicate directly with the target stack bypassing the routing stack.
摘要:
Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing. Improved offloading of security processing is also disclosed, which provides processing efficiencies over prior art offloading techniques.
摘要:
In an APPN network having a dependent LU server (DLUS) and a dependent LU requester (DLUR), a method and apparatus that allows the DLUR to reside in an end node served by a branch extender node. The DLUS is forced to view the DLUR as residing in a different network, even though this is not the reality. This forces the DLUS to initiate a resource Locate search request to determine routes to the DLUR, rather than relying on registered DLUR trunk group vectors, which are erroneous when the DLUR is located downstream of a branch extender. In addition, the branch extender examines resource Locate request and resource Locate replies to determine if the resource being sought is a DLU. If it is, then the branch extender does not substitute itself as the owner of the DLU in the Locate requests and replies. This prevents the occurrence of both the branch extender and the DLUR reporting ownership of a DLU.
摘要:
The route calculated by the routing portion of a connection-oriented protocol between source and destination nodes is further optimized after it is initially calculated. A node X that is part of the calculated route receives or generates a connection setup request which contains the calculated route. In response to the setup request, node X examines the nodes in the calculated route to determine if node X knows of a direct link between itself and another node Y in the calculated route that is not adjacent to node X. If such a direct link is known by node X to node Y, then node X replaces that portion of the calculated route from node X to node Y with the known direct link in the connection setup request, and then forwards the connection setup request to the next node in the present calculated route, where the optimization algorithm may be performed again.
摘要:
Multiple virtual routing networks having the same identifier are defined on a shared access transport facility network. Virtual connections are defined from some or all of the network nodes to at least one of the virtual routing networks. A virtual connection contains a medium address for the node to which it is connected. When a route is calculated between a source node and a destination node, the identical identifier representing different virtual routing networks may appear in the calculated route. If it does, all portions of the route after the first occurrence up to and including the last occurrence of the identifier in the calculated route is deleted to achieve the optimal route. A destination node address is obtained from storage that is associated with the virtual connection to the destination node and information can then be directly routed to the destination node address via the calculated route in an efficient manner.