摘要:
A method and system of coordination independent rate adaptation is disclosed. The method and system of coordination independent rate adaptation provides for deploying a rate adaptation subdomain into a packet network having no rate adaptation coordination among the network nodes. The method and system is particularly useful for incremental introduction of rate-adaptive devices in existing networks; combining the best properties of sleep-state exploitation and rate scaling techniques by defining a class of state-setting policies for rate adaptation schemes that enforce tight deterministic bounds on the extra delay that the schemes may cause to network traffic at every node where they are deployed.
摘要:
A system and method of rate adaptation is disclosed for energy efficiency. The system and method of rate adaptation for energy efficiency provides for parsing a heterogeneous network into rate-adaptation domains that are fully isolated with respect to the control of their operating states. The system and method is particularly useful for creating the conditions for the incremental introduction of rate-adaptive devices in existing networks; combining the best properties of sleep-state exploitation and rate scaling techniques by defining a class of state-setting policies for rate adaptation schemes that enforce tight deterministic bounds on the extra delay that the schemes may cause to network traffic at every node where they are deployed.
摘要:
A method and system of coordination independent rate adaptation is disclosed. The method and system of coordination independent rate adaptation provides for deploying a rate adaptation subdomain into a packet network having no rate adaptation coordination among the network nodes. The method and system is particularly useful for incremental introduction of rate-adaptive devices in existing networks; combining the best properties of sleep-state exploitation and rate scaling techniques by defining a class of state-setting policies for rate adaptation schemes that enforce tight deterministic bounds on the extra delay that the schemes may cause to network traffic at every node where they are deployed.
摘要:
Expediting the distribution of data files between a server and a set of clients. The present invention relates to client-server systems and, more particularly, to cache nodes in client-server systems. In a client-server arrangement, a source system transfers data files from the source system to a server cache node connected to the source system. The server cache node sends a list of data files cached in the server cache node to a client cache node. The client cache node sends a request to the server cache node for new data files cached in the server cache node, based on the list received from the server cache node. The server cache node sends the requested data files to the client cache node and the client cache node transfers the data files to a destination system.
摘要:
A system and method of rate adaptation is disclosed for energy efficiency. The system and method of rate adaptation for energy efficiency provides for parsing a heterogeneous network into rate-adaptation domains that are fully isolated with respect to the control of their operating states. The system and method is particularly useful for creating the conditions for the incremental introduction of rate-adaptive devices in existing networks; combining the best properties of sleep-state exploitation and rate scaling techniques by defining a class of state-setting policies for rate adaptation schemes that enforce tight deterministic bounds on the extra delay that the schemes may cause to network traffic at every node where they are deployed.
摘要:
Provided is a method and devices for overload control in a cloud computing environment. The method includes receiving a first message from a network element associated with the cloud computing environment. The first message includes information associated with a target virtual machine and a list of sessions from the one or more sessions to move from the serving virtual machine to the target virtual machine. Associating one or more client addresses with an address associated with the target virtual machine based on the list of sessions. And, treating the target virtual machine as the serving virtual machine if processing sessions associated with the list of sessions.
摘要:
The invention includes a method and apparatus for providing secure remote access to enterprise networks. An apparatus includes a network interface module adapted for maintaining a secure network connection with a network device independent of a power state of a host computer associated with the apparatus a storage module for storing information associated with the secure connection, and a processor coupled to the network interface and the memory where the processor is adapted for automatically initiating the secure connection without user interaction.
摘要:
A communications switch or router employs a replication server to perform batch processing of multicast connections. The replication server performs three distinct forms of processing using staging queues: packet arrival processing, packet replication processing, and per-interface transmission processing. Packet arrival processing queues arriving packets in session queues, adds new multicast sessions to a replication set, and assigns a counter equivalent to the fan-out of the multicast session. Packet replication processing assigns a descriptor to packets of each session in the replication set, and copies the descriptor to each per-interface queue. Per-interface transmission processing examines each descriptor in the per-interface queue, copies the corresponding packets for transmission by the interface, adjusts the counter as each packet is copied, and clears the packet in the switch based on the adjusted counter.
摘要:
A switch schedules guaranteed-bandwidth, low-jitter-traffic characterized by a guaranteed rate table (GRT) method. A rate matrix generated from collected provisioning information is decomposed into schedule tables by a low jitter (LJ) decomposition method. The LJ decomposition method imposes a set of constraints for the schedule tables: schedule tables are partial permutation matrices, weighted sum of the partial permutation matrices is greater than or equal to the weighted sum of the rate matrix, and each entry in the rate matrix belongs to one element of the LJ decomposition schedule matrices. An integer LJ decomposition programming problem is employed to generate the schedule tables that are scheduled for each time slot of the period of the switch. Schedule tables are selected in turn based upon selecting eligible tables having the earliest finishing time. If necessary, the rate matrix is updated prior to decomposition for a subsequent period.
摘要:
A method of remotely treating malicious mobile terminals connected to a mobile communications network. In one embodiment, when a malicious mobile terminal is detected by the intrusion-detection services of the network, the network changes the subscriber profile associated with the mobile terminal to operate the latter in a quarantine mode. The packet-switched subsystem of the network then links the quarantined mobile terminal to a remediation manager. The remediation manager remotely treats the mobile terminal, e.g., to repair or reinstall any corrupted software, terminate any active malicious processes, delete or quarantine any malware, and restore the operating system, configuration, and/or memory of the mobile terminal to a clean operational state. After the treatment, the network reverts the subscriber profile back to the initial state and removes the mobile terminal from the quarantine.