Patent application number | Description | Published |
20080225700 | Protocol Definition for Software Bridge Failover - A method, data processing system, and computer usable code are provided for protocol definition for software bridge failover. In a first aspect of the present invention, a first software bridge determines the proper working operation of a physical adapter. Limbo packets are sent to a second software bridge alerting the second software bridge that the first software bridge is no longer bridging traffic responsive to the physical adapter failure in the first software bridge. The second software bridge receives the limbo packets, and, in response to receiving the limbo packets, asserts primary control and initiates bridging of traffic. In an alternative aspect of the present invention a first software bridge sends keep-alive packets. A second software bridge monitors the keep-alive packets from the first software bridge and, in response to a failure to detect the keep-alive packets from the first software bridge, the second software bridge initiates bridging of traffic. | 09-18-2008 |
20080259951 | METHOD AND APPARATUS FOR UNPLANNED AND UNINTERRUPTED NETWORK ADAPTER REPLACEMENT - A computer implemented method, data processing system, and computer program product for dynamically replacing a network adapter with minimal or no communications downtime. When a notification to replace a first network adapter is received, the process in the illustrative embodiments detects a replacement network adapter and a network interface corresponding to the replacement network adapter. The process configures a replacement network adapter, and pauses all communications to the first network adapter by dropping all incoming data packets to the first network adapter. The network interface corresponding to the first network adapter is redirected to point to the replacement network adapter. The first network adapter and the network interface corresponding to the replacement network adapter are then removed. Communication flow to the replacement network adapter is restored. | 10-23-2008 |
20080273456 | Port Trunking Between Switches - A computer implemented method, data processing system, and a computer program product are provided for processing packets in switches. A first switch receives a packet from a network that is to be directed to a host. A determination is made as to whether all of the ports connected from the first switch to the host have failed. If all of the ports from the first switch to the host have failed, the packet is sent through a backup port connected to a second switch, which sends the packet to the host. | 11-06-2008 |
20090135840 | METHOD FOR ADJUSTING MSS OR PACKETS SENT TO A BRIDGE DEVICE POSITIONED BETWEEN VIRTUAL AND PHYSICAL LANS - A method and apparatus are provided for use with a SEA or other bridge device, which is positioned between virtual and physical LANS and is adapted to monitor connection setup packets. If the SEA detects such a packet, it determines whether it can accommodate the MSS value listed in the packet. In one embodiment, a method is provided for implementation by a bridge device positioned to transfer data packets between a specified LPAR system arid a specified host. The method comprises the step of detecting a packet that is transmitted to the bridge device, in order to set up a connection between the LPAR system and the host. The method further comprises determining whether the detected packet indicates an initial MSS value for the connection that is greater than a prespecified MSS value. Upon determining that the detected packet indicates an initial MSS value that exceeds the prespecified MSS value, the packet is altered to establish the prespecified MSS value as the MSS value for the connection. | 05-28-2009 |
20090217066 | CONTROLLING CONNECTION STATUS OF NETWORK ADAPTERS - A method, medium and implementing processing system are provided for controlling the number of Ethernet adapters connected in an EtherChannel depending upon the current bandwidth requirements of the system. This system reduces power consumption, inter alia, wherever possible while not sacrificing performance or flexibility of an EthernetChannel. An exemplary embodiment EtherChannel's total bandwidth utilization is monitored and controlled. When the bandwidth utilization is a predetermined amount less than or more than a predetermined threshold level, power supplied to one or more of the physical Ethernet adapters that are part of the EtherChannel is adjusted, i.e. reduced or increased, accordingly. In another embodiment, in systems where ethernet devices support different levels of power, the power supplied to one or more adapters can be systematically incrementally reduced or increased in response to reduced or increased bandwidth utilization. | 08-27-2009 |
20090307458 | VIRTUAL REAL MEMORY EXPORTATION FOR LOGICAL PARTITIONS - A computer implemented method, apparatus, and program product for extending virtual memory associated with logical partitions. A hosting partition receives a paging request from a logical partition on a logically partitioned data processing. The hosting partition identifies a location of the physical memory space on a remote computing device assigned to the logical partition and sends an extended virtual memory paging request to an extended virtual memory manager located on the remote computing device using a network connection. The extended virtual memory paging request comprises the instructions for the memory page-in or the memory page-out and the location of the physical memory space on the remote computing device that is being paged-in or paged-out. The extended virtual memory manager performs a page-in operation or a page-out operation in accordance with the instructions for the memory page-in or memory page-out. | 12-10-2009 |
20110051734 | ENERGY EFFICIENT CONTROL OF DATA LINK GROUPS - Where parallel links between network devices are aggregated into link groups to support the transport of associated data streams, the link groups can be managed in an energy efficient manner by defining each link group as consisting of a primary link and one or more secondary links. The primary link in a link group remains enabled at all times but the secondary links are enabled only when needed and are disabled when no longer needed, minimizing power consumption for the secondary links (and the link group). | 03-03-2011 |
20120198270 | FAILBACK TO A PRIMARY COMMUNICATIONS ADAPTER - In some example embodiments, there is a method for failback to a primary communications adapter. The method includes receiving, in a driver for the primary communications adapter and a backup communications adapter, a link up event for the primary communications adapter, wherein the link up event is sent from the primary communications adapter to the driver, and wherein the link up event is triggered by establishing electrical connectivity to the primary communications adapter. The method includes inferring that the primary communications adapter is configured for receiving packets. The method includes setting the backup communications adapter to idle, wherein the backup communications adapter receives packets and drops the packets while idle. The method includes activating the primary communications adapter, wherein the primary communications adapter receives packets and passes the packets up a protocol stack while activated. | 08-02-2012 |
20130252594 | Mobile Location Identifier for Social Check-In Applications - An approach is provided that receives a geographic beacon location that corresponds to a mobile entity with the mobile entity being an established entity at a social network website. A geographic user location is received with the geographic user location corresponding to a mobile user device that is associated with a user of the social networking website. A determination is made as to whether the geographic beacon location is proximate to the geographic user location. A check-in of the user at the entity is logged at the social media website in response to the geographic beacon location being proximate to the geographic user location. | 09-26-2013 |