Abstract:
According to one embodiment of the present disclosure, a method and technique is disclosed for maintaining a network connection during transfer of the workload from a global environment of a logical partition to a workload partition of the logical partition and during any subsequent transfer(s).
Abstract:
According to one embodiment of the present disclosure, a method and technique is disclosed for maintaining a network connection during transfer of the workload from a global environment of a logical partition to a workload partition of the logical partition and during any subsequent transfer(s).
Abstract:
A computer implemented method, computer program product, and system for creating a checkpoint of a stream. A stream checkpoint request to create the checkpoint of the stream is received, wherein the stream is used by a process as a communications path, and wherein the communications path is modified by a set of modules. In response to identifying the identity of each module in the set of modules, the identity of each module in the set of modules is stored in the checkpoint. In response to identifying an order of the set of modules, the order of the set of modules is stored in the checkpoint. In response to sending a stream checkpoint message to each module in the set of modules, module data is received from each module in the set of modules to form received module data. The received module data is stored in the checkpoint.
Abstract:
A method of configuring a data processing system for facilitating network communications involves creating a primary logical partition (LPAR) in the data processing system, the LPAR configured to host a specified operating system. The method further includes creating a first virtual network adapter within the LPAR, associating the first virtual network adapter with a first network address, and binding the first virtual network adapter to the LPAR. The method additionally involves creating a first logical subpartition (LSPAR) within the LPAR, the first LSPAR configured to employ said specified operating system and no other. The method also includes creating a second virtual network adapter within the LPAR, associating the second virtual network adapter with a second network address, wherein the second network address is not an alias network address of the first network address, and binding the second virtual network adapter to the first LSPAR.
Abstract:
A computer implemented method, computer program product, and system for creating a checkpoint of a stream. A stream checkpoint request to create the checkpoint of the stream is received, wherein the stream is used by a process as a communications path, and wherein the communications path is modified by a set of modules. In response to identifying the identity of each module in the set of modules, the identity of each module in the set of modules is stored in the checkpoint. In response to identifying an order of the set of modules, the order of the set of modules is stored in the checkpoint. In response to sending a stream checkpoint message to each module in the set of modules, module data is received from each module in the set of modules to form received module data. The received module data is stored in the checkpoint.
Abstract:
A method of configuring a data processing system for facilitating network communications involves creating a primary logical partition (LPAR) in the data processing system, the LPAR configured to host a specified operating system. The method further includes creating a first virtual network adapter within the LPAR, associating the first virtual network adapter with a first network address, and binding the first virtual network adapter to the LPAR. The method additionally involves creating a first logical subpartition (LSPAR) within the LPAR, the first LSPAR configured to employ said specified operating system and no other. The method also includes creating a second virtual network adapter within the LPAR, associating the second virtual network adapter with a second network address, wherein the second network address is not an alias network address of the first network address, and binding the second virtual network adapter to the first LSPAR.
Abstract:
A gossiping scheme for sharing node status in a cluster of nodes provides a robust mechanism for determining node status within the cluster. Nodes transmit gossip messages to each other nodes, the gossip messages listing other nodes in the cluster that are operational. When a node does not receive a gossip message from a particular node within a predetermined time period, then the node transmits messages to the other nodes indicating that the particular node is down. However, if another node has received a packet from the particular node within the predetermined time period and receives the node down message, then the other node responds with a node alive message.
Abstract:
Provided are techniques related generally to computer communication and, more specifically, to techniques that provide legacy applications with access to a cluster infrastructure. A pseudo interface layer provides applications with internet protocol (IP) family sockets access to cluster awareness protocols in a manner that may be transparent to both the application and the cluster awareness layer of a kernel.
Abstract:
Communication between clusters of processing nodes is initiated by designating a link layer address and a target node name in a remote cluster. The link layer address is transmitted to the target node via a regular network transmission. The link layer address is stored locally in each cluster and the nodes in each cluster are signaled that a configuration change has been made, so that gateway nodes in the clusters can obtain the link layer address to use for subsequent communications with the other cluster, such as event notifications of node status changes.
Abstract:
An event notification method for distributed processing systems provides reduction of queue space and event processing bandwidth associated with duplicate events such as a particular event that is duplicated and results in multiple event notifications propagated for multiple consumers. When a duplicate event notification is received at an input to an event notification queue, rather than queuing the duplicate event notification, a sequence number of the event notification already in the queue is updated to indicate to the event consumer, exactly how many duplicate events have been received. The timestamp of the updated event notification may also be set to the timestamp of the most recently received duplicate event notification.