Consider the following scenario: On a computer that is running Windows Server 2008, you are running an application that pings lots of IP addresses (for example, 65,000 IP addresses) every 30 minutes by using Internet Control Message Protocol (ICMP) to check whether the client is alive.
In this scenario, a memory leak occurs when the IP addresses are pinging one after the other. The memory leak may bring down the server, and the end-users cannot connect to the server.
In this scenario, a memory leak occurs when the IP addresses are pinging one after the other. The memory leak may bring down the server, and the end-users cannot connect to the server.