Patent classifications
H04L29/14
Methods and devices for processing incomplete data packets
A computer implemented method, apparatus, and computer usable program code for processing data packets. A set of data fragments are received at the data processing system to form a set of received data fragments. Assembly of the set of data fragments is initiated into a data packet, and a determination as to whether the data packet is an incomplete data packet. Responsive to a determination that the data packet is an incomplete data packet, the incomplete data packet is filled with at least one character to form a final data packet. The final data packet is forwarded to the target.
Self healing cluster of a content management system
Systems and methods herein provide for a clustered content management comprising at least two computing nodes. A first node comprises an instance of the content repository. The first computing node may perform content management operations on its instance of the content repository. Changes to the instance of the content repository of the first computing node are synchronized with the content repository by way of a second computing node. The second computing node is communicatively coupled to the first computing node through a network and is operable to synchronize the change with the content repository. The second computing node also determines that synchronization of the change is blocked due to an error. The second computing node identifies the error, determines that the error is correctable, and corrects the error to synchronize the change with the content repository.
Method for recoverable message exchange independent of network protocols
A method is described to allow a device to retrieve a message, that is separated into a plurality of fragments, from a data source, wherein the method involves: establishing a first network connection with the data source; receiving a subset of the plurality of fragments; determining the first network connection has ended before completion of said message; establishing one or more subsequent network connections with the data source; and receiving any of the plurality of fragments not within the subset. The characteristics (for example: application protocol, security, speed, reach, bandwidth capability, cost of usage, network type, physical layer type, data-link layer type, or IP address of one or both of the first and second devices) of the first network connection can be potentially different than the subsequent network connections.
Highly available servers
Techniques for maintaining high availability servers are disclosed. For example, a method comprises the following steps. One or more client requests are provided to a first server for execution therein. The one or more client requests are also provided to a second server for storage therein. In response to the first server failing, the second server is configured to execute at least one client request of the one or more client requests provided to the first server and the second server that is not properly executed by the first server.
Coordinating fault recovery in a distributed system
In various embodiments, methods and systems for coordinating, between a host and a tenant, fault recovery of tenant infrastructure in a distributed system is provided. A fault occurrence is determined for a tenant infrastructure in the distributed system. The fault occurrence may be a software failure or hardware failure of the tenant infrastructure supporting a service application of the tenant. A fault recovery plan is communicated to the tenant to notify the tenant of the fault occurrence and actions taken to restore the tenant infrastructure. It is determined whether a fault recovery plan response is received from the tenant; the fault recovery plan response is an acknowledgement from the tenant of the fault recovery plan. Upon receiving the fault recovery plan response or at the expiration of a predefined time limit, the fault recovery plan is executed to restore the tenant infrastructure.
Retry mechanism for data loading from on-premise datasource to cloud
A method and system of retrying to load data from a data source to a cloud target system are disclosed. A server receives a first data packet from a device via a communication network. The first data packet comprises first data. The server stores the first data in one or more databases. The server receives a second data packet from the device. The second data packet comprises second data and is marked with a retry flag. The server determines that the second data packet has been marked with the retry flag, and performs an upsert operation with the second data in the second data packet based on the determining that the second data packet has been marked with the retry flag.
Failure recovery scheme for a cloud system
Technologies are generally described for a failure recovery scheme for a cloud system. In some examples, the cloud system may include one or more computing nodes, and one or more network switches configured to relay one or more packets among the one or more computing nodes. A respective one of the computing nodes may include a first processor configured to process the one or more packets to communicate with at least one of the network switches, and a second processor configured to process the one or more packets to communicate with at least one of the other computing nodes in the cloud system.
Provisioning of application categories at a user equipment during network congestion
Technology for provisioning categories of applications on a mobile device is disclosed. A wireless network element can communicate Application Specific Congestion Control for Data Communications (ACDC)/Application and Service Access Control (ASAC) information to the mobile device. The ACDC/ASAC information can include a preconfigured list of application categories. Each application category can include a set of applications that are allowed to access a wireless network from the mobile device during at least one defined condition level. The wireless network element can activate ACDC/ASAC for one or more condition levels while a capacity threshold of the wireless network is exceeded. The wireless network element can allow a set of applications for a selected application category to communicate with the wireless network when the ACDC/ASAC is activated based on the one or more condition levels for the selected application category.
Non-eligible distance vector protocol paths as backup paths
In one embodiment, non-eligible distance vector protocol paths are used as backup paths. In one embodiment, the distance vector protocol is Enhanced Interior Gateway Protocol (EIGRP) and unless a path is a feasible successor for a destination, the path is not eligible as a backup path. Therefore, if there is no feasible successor, there is no eligible backup path. One embodiment avoids an initial delay in finding a replacement path for traffic by determining and installing a non-eligible backup path (e.g., a path that is not a feasible successor) in one or more forwarding tables. In this manner, the router can immediately forward packets over this non-eligible backup path until, for example, forwarding in the network can converge in light of the primary path being no longer available.
Method and system for processing email during an unplanned outage
The method and system of the present invention provides an improved technique for processing email during an unplanned outage. Email messages are redirected from the primary server to a secondary server during an unplanned outage such as, for example, a natural disaster. A notification message is sent to users alerting them that their email messages are available on the secondary server by, for example, Internet access. After the termination of the unplanned outage, email messages received during the unplanned outage are synchronized into the users standard email application.