摘要:
Systems may use explicit ratings from users to construct user to user correlations. This technique may reduce the user-content correlation to a single dimension, i.e., the content that a plurality of users may rate similarly. Embodiments of the present invention may use DHT as an underlying distributed signaling mechanism, but may also make the rating implicit. Furthermore, embodiments of the present invention may construct the user to content correlation based on multi-dimensional metadata related to the content.
摘要:
In system of DHT rings that are not filly meshed with each other, flooding of PUT and GET messages is limited by PUTting a content key indicating an actual storage location of content from a content provider only to root DHTs associated with the content provider, and PUTting a secondary key indicating a subset of DHT rings at which content from the content provider might be stored only to DHT rings for which the content provider desires the content to be available. When a DHT receives a GET it first determines from the content key whether it can provide the content and if not, the DHT obtains the subset of DHT rings from the secondary key and forwards the GET of the content key to the corresponding root DHTs.
摘要:
According to one embodiment, an apparatus that makes improved routing decisions is provided that includes a receiver, a retriever, a proximity engine, and a transmitter. The receiver may be configured to receive a request from a source. The retriever may be configured to retrieve a plurality of providers capable of servicing the request. The proximity engine may be configured to rank the plurality of providers based on weights indicative of a network distance. The weights may correspond to a first Border Gateway Protocol (BGP) community attribute associated with the source and at least a second BGP community attribute associated with at least one of the providers in the plurality of providers. The transmitter may be configured to transmit the request to the provider in the plurality of providers with the highest ranking.
摘要:
In one embodiment, a method includes storing at a node in a distributed network of nodes, an object associated with an object descriptor comprising popularity information for the object, each of the nodes storing a plurality of the objects and object descriptors, the node in communication with a server storing objects that are less popular than the objects stored at the nodes, and transmitting from the node to the server, one of the objects identified as less popular than one of the objects stored at the server. One of the nodes receives and stores the object from the server. An apparatus is also disclosed.
摘要:
In one embodiment, a node in a computer network joins a global ring associated with a distributed hash table (DHT), and maintains a DHT routing table and DHT database for the global ring. In addition, the node may determine a particular service class for which the node is configured, and may join a particular service-based sub-ring according to the particular service class, where all nodes of the particular service-based sub-ring are within the global ring. As such, a service-based DHT routing table and service-based DHT database may be maintained for the particular service-based sub-ring, such that DHT operations identified by the particular service class are routed to the particular service-based sub-ring (e.g., by a portal node).
摘要:
The present invention allows multi-channel communications equipment to detect and eliminate a false interpretation of interference as a valid signal. The solution is based on the observation that the simultaneous arrival of energy on two independent channels is an impossible event. So, when such an event happens, it is a reliable signature of confusing out-of-band energy for a valid signal.
摘要:
Upon a triggering event, a delay chain shifts data out at a higher rate than incoming packets and a processor controls bypassing circuitry to reduce the latency of hardware implementations of, for example, 802.11a OFDM receivers, with long delay chains. The signal processing algorithms used to recover symbol timing need a large number of samples stored in a delay chain, often consisting of pipelined registers. Such a delay chain introduces a large lag between the time samples have been acquired by the data converters and the time they are processed. This delay makes it difficult for higher level network layer implementations to meet the deadlines of 802.11a WLAN protocol. The proposed scheme implements dynamic reduction in the depth of the delay chain once timing recovery has been performed. A multi-step scheme achieves exponential reduction in the number of elements in the delay chain in every step.
摘要:
Using a combination of auto-correlation and cross-correlation techniques provides a symbol timing recovery in a Wireless Local Area Network (WLAN) environment that is extremely robust to wireless channel impairments such as noise, multi-path and carrier frequency offset. An auto-correlator provides an estimate for a symbol boundary, and a cross-correlator is subsequently used to more precisely identify the symbol boundary. Peak processing of the cross-correlation results provides further refinement in symbol boundary detection. In receiving a packet conforming to the IEEE 802.11a standard, the method requires a minimum of only three short symbols of the 802.11a short preamble to determine timing, and guarantees timing lock within the duration of the 802.11a short preamble. This method and system can be easily applied to any other preamble based system such as 802.11g and High Performance Radio LAN/2 (HIPERLAN/2).
摘要:
To support local number portability and service portability in a telephone network, a method and apparatus handle subscription and administrative service requests in a local service management system to maintain records at a service control point. The subscription requests include create, modify, and delete requests of records in the service control point. The administrative service requests include Numbering Plan Area (NPA) code split, mass change, and query and resend requests. The records at the service control point are accessible by switches via respective signal transfer points to determine the network addresses of the switches handling services and calls corresponding to a particular telephone number.
摘要:
In one embodiment, a method comprises identifying prefix groups for searchable character symbols, each prefix group having a corresponding searchable character symbol comprising at least one searchable character; assigning at least one prefix group to each of a plurality of distributed hash table nodes in a network, each distributed hash table node containing at least one of the prefix groups, each distributed hash table node assigned a corresponding prescribed keyspace range of a prescribed keyspace, each distributed hash table node configured for storing data records having respective primary data record keys within the corresponding prescribed keyspace range; and assigning secondary indexes that start with one of the searchable character symbols to the corresponding prefix group in the associated distributed hash table node, enabling any prefix search starting with the one searchable character symbol to be directed to the corresponding prefix group in the associated distributed hash table node.