×

J2EE connector architecture

  • US 7,698,434 B2
  • Filed: 02/13/2003
  • Issued: 04/13/2010
  • Est. Priority Date: 08/29/2002
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method comprising:

  • providing a connection in a pool of connections to enable an application component to connect to an Enterprise Information System (EIS), wherein the application component executes on a web application server that complies with the J2EE Connector Architecture (JCA);

    measuring, with a timer, a last time that the connection was active;

    determining whether the connection has reached a maximum idle time, wherein the maximum idle time is configured in a maximum idle time parameter;

    if a value measured by the timer has reached the maximum idle time, considering the connection an expired connection;

    receiving a connection request from an application component deployed on the web application server for a new connection;

    determining that there are no free connections in the pool of connections and that the pool of connections has reached a maximum capacity;

    subsequent to receiving the request for the new connection and determining that there are no free connections and that the pool has reached the maximum capacity, recycling the expired connection to free the expired connection;

    assigning the connection that was freed to the application component that requested the new connection;

    terminating the application component that was associated with the connection, wherein the connection is de-referenced and a finalize method associated with the connection is called;

    if the application component does not close the connection, determining whether another entity has a reference to the connection;

    if the application server determines that no other entities have references to the connection, closing the connection and designating the connection as a leaked connection; and

    profiling the leaked connection by rendering a call stack, wherein the call stack of the leaked connection provides information for determining which application failed to close the connection, wherein a connection profiling enabled element located in an XML formatted descriptor file indicates whether the pool of connections stores call stacks of where each connection is allocated.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×