摘要:
Available bandwidth utilization during transfer of large files over a TCP/IP network is improved by load balancing data streams and dynamically controlling the number of data streams utilized. A determination is made of the optimum number of data streams for a particular data file transfer in the early stage of transmission. An initial number of data streams, which is one unless otherwise specified or determined, is used to transmit one or more file segments, each on a different data stream, immediately followed by a second initial number of data streams, which is at least two greater than the initial number of data streams, is used to transmit another portion of the large data file. During each transmission, individual and aggregate transmission bandwidths are determined. Responsive to a determination that the latest aggregate transmission bandwidth is significantly different from the previous aggregate transmission bandwidth, the number of data streams is modified.
摘要:
A method for transferring data between a first computer and a second computer. The first computer sends a first request to the second computer in a first connection. The first request includes a request to start a session, an encrypted ID of the session, and an encrypted hash value for information in the first request. The information in the first request comprises the request to start the session and the encrypted session ID. The second computer receives the first request, and as a result, decrypts the encrypted hash value in the first request, independently determines a hash value for the information in the first request and compares the independently determined hash value to the decrypted hash value. If there is match, the second computer starts a session with the first computer. Subsequently, the first computer sends a second request to the second computer in a second connection in the session. The second request includes a request to download or upload data of a file, an encrypted ID of the session, an identity of the file to at least partially upload or download, and an encrypted hash value for information in the second request. The information in the second request comprises the request to download or upload data, the encrypted session ID and the file identity. The second computer receives the second request in the session, and as a result, decrypts the encrypted hash value in the second request, independently determines a hash value for the information in the second request and compares the independently determined hash value to the decrypted hash value. If there is match, the second computer processes the request to at least partially download or upload the file.