摘要:
The present invention provides a method and apparatus for handling reordered data packets. A method comprises receiving a data packet and determining if the data packet is received out of order. The method further comprises delaying transmission of an acknowledgement indicating that a data packet is missing in response to determining that the data packet is received out of order.
摘要:
The present invention provides a method and apparatus for handling reordered data packets. A method comprises receiving a data packet and determining if the data packet is received out of order. The method further comprises delaying transmission of an acknowledgement indicating that a data packet is missing in response to determining that the data packet is received out of order.
摘要:
The present invention provides a method for handling reordered data packets. A method comprises receiving a data packet and determining if the data packet is received out of order. The method further comprises delaying transmission of an acknowledgement indicating that a data packet is missing in response to determining that the data packet is received out of order.
摘要:
Determining availability of a destination for computer network communications that include providing on a caching device a destination availability cache comprising at least one cache entry representing availability of a destination and providing, from the caching device to a source, through computer network communications, information indicating the availability of the destination. In typical embodiments, the cache entry comprises a network address of a destination device and a time limitation for the cache entry.
摘要:
The present invention provides a method and apparatus for discovering a path maximum transmission unit. The method comprises receiving a data packet from a first remote device for transmission to a second remote device and determining if a size of the received data packet is greater than a maximum transmission unit (MTU) value. In response to determining that the size of the received data packet is greater than the MTU value, the method further comprises transmitting a portion of the received data packet to the second remote device and transmitting a message to the first remote device indicating that the size of the received data packet exceeds the MTU value.
摘要:
In a method of reducing network congestion between a source computer and a destination computer, a receiving router receives a source quench message and determines whether originator of the source quench message is the destination computer or an intermediate router. If the receiving router determines the originator to be the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines the originator to be an intermediate router, the receiving computer determines if there is an alternative route from the receiving router to the destination computer. If the receiving router determines there is no alternative route from the receiving router to the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines there is an alternative route to the destination computer, the receiving router does not forward the source quench message to the source computer, and, going forward, routes packets to the destination computer by the alternative route.
摘要:
Disclosed is a virtual world server receives an update signal corresponding to an RFID tag. The virtual world server determines an RFID tag identifier, an RFID reader identifier, and an associated asset name from the update. The virtual world server looks up a virtual area associated with the RFID reader identifier. The virtual world server teleports a virtual asset associated with the RFID tag identifier to a virtual area in the virtual world. The virtual world server renders a model of the asset in a virtual world based on an avatar perspective.
摘要:
A method, system, and program provide for efficient send socket call handling by a transport layer. A transport layer of a network protocol stack receives a send socket call for data of a specified length from an application layer. Responsive to detecting that there is insufficient memory for a single memory allocation to a buffer in the transport layer for at least the specified length, the transport layer blocks the send socket call. The transport layer only wakes the send socket call upon detection of sufficient memory for the single memory allocation within the buffer of the transport layer for at least the specified length, wherein waking the send socket call triggers a kernel to perform the single memory allocation in the buffer and to write the data to the single memory allocation in a single pass.
摘要:
In a method of reducing network congestion between a source computer and a destination computer, a receiving router receives a source quench message and determines whether originator of the source quench message is the destination computer or an intermediate router. If the receiving router determines the originator to be the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines the originator to be an intermediate router, the receiving computer determines if there is an alternative route from the receiving router to the destination computer. If the receiving router determines there is no alternative route from the receiving router to the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines there is an alternative route to the destination computer, the receiving router does not forward the source quench message to the source computer, and, going forward, routes packets to the destination computer by the alternative route.
摘要:
A computer implemented method, data processing system, and computer program product for securing confidential and sensitive information displayed on a computer monitor. Confidential information is displayed in an application on a computer, wherein the application is registered in a registration list comprising a list of all applications containing confidential information. A monitoring device is used to monitor an area around a user of the computer for a possible intruder. Responsive to detecting a possible intruder, an action for securing the confidential information displayed on the computer is identified based on the applications specified in the registration list. The action is then executed.