摘要:
A method, system, and program provide for efficient send socket call handling by a transport layer. A transport layer of a network protocol stack receives a send socket call for data of a specified length from an application layer. Responsive to detecting that there is insufficient memory for a single memory allocation to a buffer in the transport layer for at least the specified length, the transport layer blocks the send socket call. The transport layer only wakes the send socket call upon detection of sufficient memory for the single memory allocation within the buffer of the transport layer for at least the specified length, wherein waking the send socket call triggers a kernel to perform the single memory allocation in the buffer and to write the data to the single memory allocation in a single pass.
摘要:
A method, system, and program provide for efficient send socket call handling by a transport layer. A transport layer of a network protocol stack receives a send socket call for data of a specified length from an application layer. Responsive to detecting that there is insufficient memory for a single memory allocation to a buffer in the transport layer for at least the specified length, the transport layer blocks the send socket call. The transport layer only wakes the send socket call upon detection of sufficient memory for the single memory allocation within the buffer of the transport layer for at least the specified length, wherein waking the send socket call triggers a kernel to perform the single memory allocation in the buffer and to write the data to the single memory allocation in a single pass.
摘要:
The illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for managing a plurality of interfaces. An application selects a subset of the plurality of interfaces. In response to the selection, the application is bound to the subset of interfaces, wherein the application listens to the subset of interfaces.
摘要:
A computer implemented method, data processing system, and computer program product for efficiently using disk space when unarchiving files in the same file system. An archive file is read to identify a total number of data files in the archive file. The number of headers in the archive file is determined based on the total number of data files. A location in a first disk space of a largest data file in the archive file is determined from an offset in a header corresponding to the largest data file. The largest data file is then copied from the first disk space to a second disk space. The first disk space occupied by the largest data file is then released by truncating the archive file. The obtaining, copying, and releasing steps are repeated for each data file in the archive file until all of the data files are unarchived.
摘要:
A computer implemented method, data processing system, and computer program product for efficiently using disk space when unarchiving files in the same file system. An archive file is read to identify a total number of data files in the archive file. The number of headers in the archive file is determined based on the total number of data files. A location in a first disk space of a largest data file in the archive file is determined from an offset in a header corresponding to the largest data file. The largest data file is then copied from the first disk space to a second disk space. The first disk space occupied by the largest data file is then released by truncating the archive file. The obtaining, copying, and releasing steps are repeated for each data file in the archive file until all of the data files are unarchived.
摘要:
A computer implemented method, apparatus, system, and computer usable program code for updating a domain name server. In response to detecting a failed network interface in a plurality of network interfaces on a content server, the content server identifies an IP address for the failed network interface. The content server notifies a domain name server that the IP address for the failed network interface is an unreachable IP address. The domain name server does not provide the unreachable IP address to a querying client.
摘要:
A method, network receiver and TCP network that enables a receiver-side triggering of the fast retransmit mechanism when a TCP packet/segment is lost or received out-of sequencing order. The receiver is enhanced with a Fast Retransmit Support (FRS) utility that monitors when a next received packet is out-of-order and responds by transmitting a duplicate acknowledgment (ACK) response that includes therein the same window value as the previous ACK. By including the previous clock time, even when the current window value has advanced, the fast retransmit algorithm at the transmitter is triggering before the timeout period.
摘要:
A method, network receiver and TCP network that enables a receiver-side triggering of the fast retransmit mechanism when a TCP packet/segment is lost or received out-of sequencing order. The receiver is enhanced with a Fast Retransmit Support (FRS) utility that monitors when a next received packet is out-of-order and responds by transmitting a duplicate acknowledgment (ACK) response that includes therein the same window value as the previous ACK. By including the previous clock time, even when the current window value has advanced, the fast retransmit algorithm at the transmitter is triggering before the timeout period.
摘要:
Some embodiments of the inventive subject matter are directed to detecting a request, from an application for a first instance of an operating system (OS) running a first version of the OS, to access a symbol via a special file that accesses kernel memory directly. A second instance of the OS, which manages the first OS, receives the request. The second instance of the OS runs a second version of the OS and includes a kernel shared between the first and second instances of the OS. Some embodiments are further directed to detecting data associated with the symbol, where the data is in a first data format that is compatible with the second version of the OS but incompatible with the first version of the OS and reformatting the data from the first data format to a second data format compatible with the second version of the OS.
摘要:
Some embodiments of the inventive subject matter are directed to detecting a request to access a symbol via a special file that accesses kernel memory directly. The request can come from an application from a first instance of an operating system (OS) running a first version of the OS. A second instance of the OS, which manages the first OS, receives the request. The second instance of the OS includes a kernel shared between the first and second instances of the OS. The second instance of the OS runs a second version of the OS. Some embodiments are further directed to detecting data associated with the symbol, where the data is in a first data format that is compatible with the second version of the OS but is incompatible with the first version of the OS. Some embodiments are further directed to reformatting the data from the first data format to a second data format compatible with the second version of the OS.