Solved

Modifying TCP Parameters

Posted on 2004-08-09
2
239 Views
Last Modified: 2010-03-18
I have a program that constantly transmits data over an unreliable connection. The connection goes up and down frequently. With the current configuration of TCP, once the link is re-established, it can take up to a minute to continue transmission. How can I either change my program (which uses bulk read() & write() commands) or change the networking implementation in the kernel to shorten the re-establishment time?
0
Comment
Question by:streaks619
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 14

Expert Comment

by:pablouruguay
ID: 11761935
mmm i think the correct section for that is linux programing. :)
0
 
LVL 22

Accepted Solution

by:
pjedmond earned 500 total points
ID: 11856992
This will probably help:

http://www.die.net/doc/linux/man/man7/tcp.7.html

You need the sysctl:

tcp_keepalive_intvl

This is normally set at about a minute, hence up to a minute to continue transmission.

tcp_fin_timeout

may help with read()

HTH:)
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
Suggested Courses

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question