Patent application number | Description | Published |
20080222266 | REDIRECTING CLIENT CONNECTION REQUESTS AMONG SOCKETS PROVIDING A SAME SERVICE - A method, system, and program for redirecting client connection requests among sockets providing a same service are provided. An application requests multiple sockets from a kernel. In addition, the application generates a socket call option to bind the sockets to a particular port number and passes a list of the sockets to the kernel, where the list indicates that the sockets will all provide access to server systems providing the same service. In response, the kernel sets up the sockets, bound to the same port, and set to reference one another. Then, when a connection request is received for a first socket in the list with a queue that is full, the kernel redirects the connection request to a second socket in the list with available queue space. Thus, rather than drop the connection request from the first socket when it lacks available queue space, the connection request is redirected to another socket providing access to the same service. | 09-11-2008 |
20080222479 | Method and apparatus for handling reordered data packets - The present invention provides a method and apparatus for handling reordered data packets. A method comprises receiving a data packet and determining if the data packet is received out of order. The method further comprises delaying transmission of an acknowledgement indicating that a data packet is missing in response to determining that the data packet is received out of order. | 09-11-2008 |
20080225847 | ARTICLE FOR IMPROVED NETWORK PERFORMANCE BY AVOIDING IP-ID WRAP-AROUNDS CAUSING DATA CORRUPTION ON FAST NETWORKS - The reassembly timer in a TCP/IP receiver is dynamically set to avoid data corruption on fast networks caused by IP identification wrap-around. A sender generates IP packets with a special option specifying a reassembly time for fragments based on the subnet of the destination or on the calculated round-trip time of the connection. A receiver sets the reassembly timer to the reassembly time specified in the option. A sender can generate IP packets with an alternative option setting a time stamp for the generated packet. A receiver calculates a traversal time based on the difference between the arrival time of the fragment and this time stamp, and sets the reassembly timer based on this traversal time. A receiver can independently set the reassembly timer to a first reassembly time set by the user for fast networks or to a second reassembly timer set by the user for slow networks based on whether the receiver and sender are on the same subnet. | 09-18-2008 |
20080228931 | Method to Reduce the Learning Curve of a Transmission Control Protocol Connection - A method in a data processing system for reducing the learning curve of a transmission control protocol connection. A domain name system is queried for information. The information and a previously used transmission control protocol parameter for a transmission control protocol connection are received from the domain name system. The information and the previously used transmission control protocol parameter are used to configure a current transmission control protocol connection. | 09-18-2008 |
20080244084 | Method for improved network performance using smart maximum segment size - A method, system, and computer program product for negotiating a smart maximum segment size of a network connection for a data transfer. A client request to initiate a network connection, which includes a first maximum segment size, is received at a server. The server calculates a second maximum segment size, wherein at least one of the first maximum segment size or the second maximum segment size is a cache line size aligned Ethernet frame size, or smart maximum segment size. The server determines the smaller of the first and second maximum segment sizes and sends the second maximum segment size to the client. The client then selects the smaller of the first and second maximum segment sizes, and sends an acknowledgement to the server to complete the connection. The smaller of the first and second maximum segment sizes is used for the network connection and subsequent data transfer. | 10-02-2008 |
20080267176 | SELECTIVE PRESERVATION OF NETWORK STATE DURING A CHECKPOINT - A computer implemented method, data processing system, and computer program product for selectively preserving network state during a checkpoint operation. Packets flowing through a network stack are examined to determine whether the packets belong to a WPAR under checkpoint. If one or more packets belong to a WPAR under checkpoint, a filter is used to block the packets from flowing through the network stack. Address information in each blocked packet is checked against an access list of allowed communications to determine if the access list indicates that a packet is an allowed packet. If the access list indicates that one of the packets is an allowed packet, that packet is unblocked and allowed to continue flowing through the network stack during the checkpoint operation. If the access list indicates that another of the packets is not an allowed packet, that packet is discarded during the checkpoint operation. | 10-30-2008 |
20080294795 | Determining Availability Of A Destination For Computer Network Communications - Determining availability of a destination for computer network communications that include providing on a caching device a destination availability cache comprising at least one cache entry representing availability of a destination and providing, from the caching device to a source, through computer network communications, information indicating the availability of the destination. In typical embodiments, the cache entry comprises a network address of a destination device and a time limitation for the cache entry. | 11-27-2008 |
20090049178 | SYSTEM AND METHOD FOR MINIMIZING RETRY DELAYS IN HIGH TRAFFIC COMPUTER NETWORKS - A system, method, and program product is provided that requests, by a first computer system, a new network session with a second computer system. The new network session request occurs after a previous network session between the two systems and the new network session request includes a new sequence number that is different from a previous sequence number that was used during the previous network session. The first computer system receives an acknowledgement from the second computer system that references the previous sequence number instead of the new sequence number. In response to receiving the acknowledgement at the first computer system that references the previous sequence number, the first computer system modifies the new sequence number by setting it to a value that is higher than the previous sequence number, and the first computer system re-requests the new network session using the modified new sequence number. | 02-19-2009 |
20090067325 | Receiving and transmitting devices for providing fragmentation at a transport level along a transmission path - The present invention provides receiving and transmitting devices for providing fragmentation at a transport level along a transmission path. The transmitting device comprises an interface and a control unit coupled to the interface. The control unit is adapted to negotiate a packet size with a remote device. The control unit is also adapted to transmit a data packet of up to the negotiated size. The control unit is further adapted to receive acknowledgments from the remote device associated with one or more fragments, fragmented at the transport-level, of the transmitted data packet. The receiving device comprises an interface and a control unit coupled to the interface. The control unit is adapted to receive two or more fragments of a data packet transmitted by a remote device. The control unit is also adapted to transmit one or more acknowledgments to the remote device based on the received fragments. | 03-12-2009 |
20090070481 | Method and Apparatus for an Improved Bulk Read Socket Call - An apparatus and method for an improved bulk read socket call are provided. With the apparatus and method, a new field, so_rcvlen, is added to the socket structure that identifies the bulk read size requested by the user. The kernel of the prior art recv( ) function is also modified so that it sets the so_rcvlen to the size requested by the user prior to the recv( ) function going to sleep and waiting for the full data size requested by the user. A new flag, SP_MSGWAITALL, is also provided in the socket structure. In the TCP input processing, when data is received for a particular socket, the current setting of the SP_MSGWAITALL is checked. If the SP_MSGWAITALL flag is set, it is determined whether the amount of data stored in the socket receive buffer is less than the value of so_rcvlen. If not, the TCP input processing does not wake up the recv( ) thread. However, for every alternate segment, the TCP input processing sends back an acknowledgment (ACK). In the TCP output processing, when the SP_MSGWAITALL flag is set and the amount of data in the socket receive buffer is less than so_rcvlen, the full window is advertised. Once the TCP input processing determines that there is at least an amount of data in the socket receive buffer equal to the value of so_rcvlen, the TCP input processing will wake up the recv( ) thread and the SP_MSGWAITALL flag is reset. | 03-12-2009 |
20090094238 | TECHNIQUES FOR IDENTIFYING A MATCHING SEARCH TERM IN AN IMAGE OF AN ELECTRONIC DOCUMENT - A technique for facilitating identification of a matching search term in one or more images includes selecting at least a portion of an image and creating search enriched metadata for a document that includes the image. The search enriched metadata includes a text portion that provides one or more search terms that are associated with the selected portion of the image and a location portion that provides a location of the selected portion of the image. | 04-09-2009 |
20090106348 | METHOD AND SYSTEM FOR LIMITING INSTANCES OF A CLIENT-SERVER PROGRAM WITHIN A RESTRICTED DISTRIBUTED NETWORK - The present invention provides a computer implemented method, data processing system and computer program product for limiting instances of a client-server program within a plurality of platforms in a restricted distributed network. The data processing system receives an invocation of the client-server program. The data processing system assigns a write file to the client-server program wherein the write file has a write file name and the write file is on a distributed file system accessible to the plurality of platforms. The data processing system determines whether the write file is available. Responsive to a determination that the write file is available, the data processing system opens the write file for writing wherein the write file is associated with the client-server program. The data processing system, responsive to a determination that the write file is available, forms an addressing file having addressing information of a first instance of the client-server program. The data processing system responsive to a determination that the write file is available, reports the addressing file by writing addressing information to the addressing file, wherein the addressing file is established at a predetermined logical location in the distributed file system. The data processing system responsive to the determination that the write file is available, executes at least one instruction of the client-server program. | 04-23-2009 |
20090106367 | TRIGGERING A COMMUNICATION SYSTEM TO AUTOMATICALLY REPLY TO COMMUNICATIONS - A communication system which facilitates distribution of electronic communications for a user account includes an emergency auto-reply agent that scans each received communication addressed to the user account for a particular communication sent from at least one emergency address specified for the user account separate from the address of the user account. Responsive to the communication system detecting the particular communication sent from one of the emergency addresses, the emergency auto-reply agent parses the content of the particular communication to detect whether the particular communication comprises a required password. Responsive to detecting the required password within the content of the particular communication, the emergency auto-reply agent directs the communication system to compose and send auto-reply communications from the user account in reply to received communications addressed to the user account. | 04-23-2009 |
20090125615 | ADDRESS RESOLUTION PROTOCOL CHANGE ENABLING LOAD-BALANCING FOR TCP-DCR IMPLEMENTATIONS - Data processing systems, computer implemented methods, and computer program products are provided for updating an address resolution protocol table. Updates received for the address resolution protocol table are comprised of an internet protocol address, a media access control address, and a unique identifier. | 05-14-2009 |
20090135840 | METHOD FOR ADJUSTING MSS OR PACKETS SENT TO A BRIDGE DEVICE POSITIONED BETWEEN VIRTUAL AND PHYSICAL LANS - A method and apparatus are provided for use with a SEA or other bridge device, which is positioned between virtual and physical LANS and is adapted to monitor connection setup packets. If the SEA detects such a packet, it determines whether it can accommodate the MSS value listed in the packet. In one embodiment, a method is provided for implementation by a bridge device positioned to transfer data packets between a specified LPAR system arid a specified host. The method comprises the step of detecting a packet that is transmitted to the bridge device, in order to set up a connection between the LPAR system and the host. The method further comprises determining whether the detected packet indicates an initial MSS value for the connection that is greater than a prespecified MSS value. Upon determining that the detected packet indicates an initial MSS value that exceeds the prespecified MSS value, the packet is altered to establish the prespecified MSS value as the MSS value for the connection. | 05-28-2009 |
20090158082 | FAILOVER IN A HOST CONCURRENTLY SUPPORTING MULTIPLE VIRTUAL IP ADDRESSES ACROSS MULTIPLE ADAPTERS - A host enables any adapter of multiple adapters of the host to concurrently support any VIPA of the multiple VIPAs assigned to the host. Responsive to a failure of at least one particular adapter from among the multiple adapters, the host triggers the remaining, functioning adapters to broadcast a separate hardware address update for each VIPA over the network, such that for a failover in the host supporting the multiple VIPAs the host directs at least one other host accessible via the network to address any new packets for the multiple VIPAs to one of the separate hardware addresses of one of the remaining adapters. | 06-18-2009 |
20090175167 | Method of Reducing Network Congestion - In a method of reducing network congestion between a source computer and a destination computer, a receiving router receives a source quench message and determines whether originator of the source quench message is the destination computer or an intermediate router. If the receiving router determines the originator to be the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines the originator to be an intermediate router, the receiving computer determines if there is an alternative route from the receiving router to the destination computer. If the receiving router determines there is no alternative route from the receiving router to the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines there is an alternative route to the destination computer, the receiving router does not forward the source quench message to the source computer, and, going forward, routes packets to the destination computer by the alternative route. | 07-09-2009 |
20100005059 | Cascaded Address Books on Mobile Phones Within a Social Network - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for locating contact information in a mobile phone network within a social network. In one embodiment, the computer implemented method permits reciprocal access between a first user's contact information and a second user's contact information by a first user device and a second user device, and permitting reciprocal access between the second user's contact information and a third user's contact information by the second user device and a third user device. The computer implemented method receives a request from the third user device to contact the first user device, wherein the first user contact information is unknown to the third user and issues a search on the mobile phone network, from the third user device, for the first user contact information. The first user contact information is located at the second user device in the social network, and the first user contact information is returned to the third user device. | 01-07-2010 |
20100011312 | RFID READER INTEGRATION TO VIRTUAL WORLD MONITORING - Disclosed is a virtual world server receives an update signal corresponding to an RFID tag. The virtual world server determines an RFID tag identifier, an RFID reader identifier, and an associated asset name from the update. The virtual world server looks up a virtual area associated with the RFID reader identifier. The virtual world server teleports a virtual asset associated with the RFID tag identifier to a virtual area in the virtual world. The virtual world server renders a model of the asset in a virtual world based on an avatar perspective. | 01-14-2010 |
20100011413 | METHOD FOR AND APPARATUS FOR RETRIEVING USERNAME AND PASSWORD IN AN AUTHENTICATION PROTOCOL - Disclosed is a computer implemented method and apparatus to retrieve authentication records required for user validation and creation of authentication credentials from an authentication sever to be passed to the user. The method is comprised of the authentication server storing a first authentication record, then generating a first authentication credential based on the first authentication record. The authentication server associates the first authentication record with a first credential expiration time. The authentication server stores a second authentication record. The authentication server generates a second authentication credential based on the second authentication record, wherein the second authentication credential is associated with a second credential expiration time. Next, the authentication server associates the second authentication credential with a second credential expiration time. The authentication server determines that the first credential expiration time is earlier than the second credential expiration time and caches the first authentication record to cache. | 01-14-2010 |
20100017404 | Method and Apparatus to Elegantly and Automatically Track Emails and its Attachments for Enhanced User Convenience - An automated, embedded & intelligent E-mail Attachment Document manager automatically tracks email and their associated attachments and assists users in locating an email message (email-chain/thread) that is the original source from where the email attachment document. The present invention can perform the tracking action using the given name of the saved attachment file. | 01-21-2010 |
20100174817 | SPLICING PROXIED WEB REQUESTS WITH CALLBACK FOR SUBSEQUENT REQUESTS - The present invention provides a method, system, and computer program product for splicing proxied web requests with callback for subsequent requests. The method comprises: initiating by a proxy a Transmission Control Protocol (TCP) splice between first and second socket connections in order to service a request; and returning control of the first and second socket connections to the proxy in response to a completion event associated with the TCP splice. | 07-08-2010 |
20110066851 | Secure Route Discovery Node and Policing Mechanism - A computer implemented method and computer program product for obtaining a secure route. A trusted host sets a node security association for a trusted host. The trusted host receives, at the trusted host, a client communication request directed to a destination host. The trusted host builds a secure route query comprising a trusted host address, a destination host address, and at least one security level, to form at least one secure route. The trusted host sends packets from the trusted host to the destination host based on the at least one secure route. The packets are responsive to the client communication request, and the packets each have a security label that matches the security level. | 03-17-2011 |
20110149978 | NETWORK SYSTEM USING PATH HEALTH INFORMATION FOR PATH SELECTION - A network system employs path health information to select an acceptable path between a source node and destination node within an information handling system (IHS) and/or between a source node within one IHS and a destination node within another IHS. One or more switches may connect these two IHSs together. The network system accesses the path health information to determine the availability of paths for communicating between nodes. | 06-23-2011 |
20120079595 | Snoop Echo Response Extractor - A mechanism is provided for identifying a snooping device in a network environment. A snoop echo response extractor generates an echo request packet with a bogus MAC address that will only be received by a snooping device. The snoop echo response extractor also uses an IP address that will cause the snooping device to respond to the echo request. | 03-29-2012 |
20120144036 | NETWORK LOCATION BASED PROCESSING OF DATA COMMUNICATION CONNECTION REQUESTS - Responsive to receiving a request for a data communications connection, a data communications module of a receiver determines whether a sender of the request is local or remote with respect to the receiver. The data communications module also determines whether a location response flag indicates local or remote. If the relative location of the sender with respect to the receiver corresponds with the location response flag, then the data communications connection is allowed. Otherwise, the connection is not allowed. | 06-07-2012 |
20130232548 | Secure Route Discovery Node and Policing Mechanism - A computer implemented method and computer program product for obtaining a secure route. A trusted host sets a node security association for a trusted host. The trusted host receives, at the trusted host, a client communication request directed to a destination host. The trusted host builds a secure route query comprising a trusted host address, a destination host address, and at least one security level, to form at least one secure route. The trusted host sends packets from the trusted host to the destination host based on the at least one secure route. The packets are responsive to the client communication request, and the packets each have a security label that matches the security level. | 09-05-2013 |
20130232559 | Secure Route Discovery Node and Policing Mechanism - A computer implemented method for obtaining a secure route. A trusted host sets a node security association for a trusted host. The trusted host receives, at the trusted host, a client communication request directed to a destination host. The trusted host builds a secure route query comprising a trusted host address, a destination host address, and at least one security level, to form at least one secure route. The trusted host sends packets from the trusted host to the destination host based on the at least one secure route. The packets are responsive to the client communication request, and the packets each have a security label that matches the security level. | 09-05-2013 |