摘要:
Techniques are described that can be used to identify a defective communication channel in a communications network. A decoder in a receiver may decode a signal received from a network. The decoded signal may be re-encoded and compared with the signal received from the network. A count of differences between the re-encoded signal and the signal received from a network may be provided. An indication of errors remaining after the decoding may also be provided. Based on the count and the indication, a defect in the communication channel may be identified. A user may be notified and/or actions may take place.
摘要:
A method for preventing counterfeit of a hardware device is disclosed. The method comprises determining whether a first indicator for a hardware device is set, wherein the first indicator when set indicates that the device is not a counterfeit device, and if the first indicator is not set, then activating a counter, setting a second indicator when the counter expires, and operating the hardware device in a counterfeit mode when the second indicator is set, wherein the counterfeit mode identifies the hardware device as a counterfeit device. Other embodiments are also disclosed.
摘要:
A system has a power consuming component, power source circuitry, and power control circuitry. The power source circuitry is to supply power from a number of different sources, including some extracted from a local area network (LAN) cable that is attached to the system. The power control circuitry is to supply the power to operate the component from all of the different sources.
摘要:
Techniques to pace the transmission of packets to multiple connections using one or more queues or storages. When multiple queues are used, each queue may have an associated throughput rate and each of the queues may have a different associated throughput rate.
摘要:
Provided are a method, system, and program for managing congestion in a network controller, which in one embodiment, substantially all packets having an assigned priority value below a selected priority level are culled. In another embodiment, selected flows of packets into a network controller are culled at selected culling rates. In one example, a selected flow may be drastically culled. In another example, all flows may be culled at a certain rate which does not exceed a maximum for each flow. In another example, culling techniques may be combined.
摘要:
Technologies for ensuring data integrity for multi-packet operations include a computing device and a remote computing device communicatively coupled via a network. The computing device is configured to perform a segmentation offload operation on an original network packet, compute a hash value on the payload of each segmented payload of the original network packet, and store the hash value and an indication into the segmented network packet that indicates the hash value is stored in the segmented network packet. The remote computing device is configured to extract the indication and the hash value from a received network packet in response to determining the indication indicates the hash value is stored in the segmented network packet, compute a hash value on the payload of received network packet, and determine an integrity of the payload based on a comparison of the extracted hash value and the computed hash value.
摘要:
Technologies for identifying service functions that may be performed in parallel in a service function chain include a computing device for running one or more virtual machines for each of a plurality of service functions based on a preferred service function chain being selected. To identify which service functions may be performed in parallel, the computing device may determine which service functions are not required to be performed on a critical path of the service function chain and/or which service functions are not required to be performed in real-time. Additionally, selecting the preferred service function chain may be based on selection criteria.
摘要:
Methods, apparatus, and computer platforms and architectures employing many-to-many and many-to-one peripheral switches. The methods and apparatus may be implemented on computer platforms having multiple nodes, such as those employing a Non-uniform Memory Access (NUMA) architecture, wherein each node comprises a plurality of components including a processor having at least one level of memory cache and being operatively coupled to system memory and operatively coupled to a many-to-many peripheral switch that includes a plurality of downstream ports to which NICs and/or peripheral expansion slots are operatively coupled, or a many-to-one switch that enables a peripheral device to be shared by multiple nodes. During operation, packets are received at the NICs and DMA memory writes are initiated using memory write transactions identifying a destination memory address. The many-to-many and many-to-one peripheral switches forwards the transaction packets internally within the switch based on the destination address such that the packets are forwarded to a node via which the memory address can be accessed. The platform architectures may also be configured to support migration operations in response to failure or replacement of a node.
摘要:
In general, in one aspect, the disclosure describes a method includes accessing data of an egress packet belonging to a flow, storing data associating the flow with at least one queue based on a source of the data of the egress packet. The method also includes accessing an ingress packet belonging to the flow, performing a lookup of the at least one queue associated with the flow, and enqueueing data of the ingress packet to the at least one queue associated with the flow.
摘要:
A method and system for providing controlled on-demand distribution of content via a centralized server and a peer-to-peer network have been described. The method may include receiving, at a server, a request from a client for content where the requesting client and the server are part of a peer-to-peer network. The server may then determine whether the requesting client has access rights to the content. If the requesting client has access rights to the content, then the server may determine one or more other clients on the peer-to-peer network that have the content available for download. The server may then select one or more clients from the one or more other clients and allow the requesting client to download the content from the selected one or more clients. Other embodiments have also been described and claimed.