?
Solved

What is the advantage of the " KeepAliveTime " ?

Posted on 2008-10-05
6
Medium Priority
?
1,226 Views
Last Modified: 2012-05-05
What is the advantage of the "KeepAliveTime ?
Do I need to modify this value in windows xp registry ?
On my network scenario, I use windows xp and windows server 2003 active directory.
Please advice and thank you in advance

0
Comment
Question by:UD805
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
6 Comments
 
LVL 45

Accepted Solution

by:
sunnycoder earned 2000 total points
ID: 22643993
Hello UD805,

KeepAlive time is the duration after which TCP would send packets on an idle connection to verify if the connection is still alive.
You do not have to modify this value in your registry until you have a specific need to do so. Is there a reason why you want to add this?

Regards,
sunnycoder
0
 

Author Comment

by:UD805
ID: 22644512
Hi sunnycoder,
My scenario, There are 50 windows xp workstaions and 10 server( based on windows server 2003) ,one of all servers act as the active directory.
Because sometime windows xp workstaion in my domain cannot log on to active directory as normal,
and request time out while ping to gateway. In additional some terminal client confront a problem with
session time out every 5 minutes.
Could you please guide the way how to solve this problem ?
Thaks in advance
0
 
LVL 45

Expert Comment

by:sunnycoder
ID: 22644561
I am not a networking expert so cant really help you with diagnosing and correcting the problem. However, TCPKeepAlive is a very unlikely problem. It is used for idle connections and not active connections.

I can add this question to networking related TAs if you desire.
0
 

Author Comment

by:UD805
ID: 22644603
Thank you
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question