Abstract:
A method for parallel processing implemented by a first core in a network unit, comprising locking an ingress queue if the ingress queue is not locked by another core, searching for an unlocked task queue from a first default subset of a plurality of task queues when the ingress queue is locked by another core, wherein the first subset is different from a second default subset of the plurality of task queues from which a second core begins a search for an unlocked task queue, and searching a remainder of the plurality of task queues for an unlocked task queue when all of the first default subset of task queues are locked and the ingress queue is locked.
Abstract:
A method for parallel processing implemented by a first core in a network unit, comprising locking an ingress queue if the ingress queue is not locked by another core, searching for an unlocked task queue from a first default subset of a plurality of task queues when the ingress queue is locked by another core, wherein the first subset is different from a second default subset of the plurality of task queues from which a second core begins a search for an unlocked task queue, and searching a remainder of the plurality of task queues for an unlocked task queue when all of the first default subset of task queues are locked and the ingress queue is locked.
Abstract:
The disclosure relates to technology for predicting file access patterns by identifying one or more files stored in a first cache and one or more pages associated with each of the one or more files in a second cache. The one or more files in the first cache are evicted based on a first eviction policy and, for each of the one or more files, the one or more pages in the second cache are evicted based on a second eviction policy. Access patterns of the one or more files based on the first and second eviction policies may then be predicted.
Abstract:
A wireless interface system includes a wireless network interface, with a virtual Ethernet interface, that is configured to transmit and receive signals over a wireless channel using a predetermined wireless technology protocol. A method for abstracting a wireless interface protocol to an Ethernet protocol includes detecting, with a wireless network interface, access by a wireless device using the wireless interface protocol. A virtual Ethernet interface is created having an associated Ethernet interface ID. The wireless device ID is associated with the Ethernet interface ID in a table in memory. A payload from the wireless device is transmitted over the wireless technology protocol. The payload is transmitted to the virtual Ethernet interface using the Ethernet protocol.
Abstract:
A computer-implemented method for application data switching comprises receiving, by one or more processors of a computer, an application data packet received from an application running on the computer; determining, by the one or more processors and from the application data packet, an Ethernet destination of the application data packet; based on the determined Ethernet destination, identifying, by the one or more processors, a destination on a wireless personal area network (WPAN); accessing, by the one or more processors, a payload of the application data packet; creating, by the one or more processors, a WPAN data packet that includes the identified destination on the WPAN and at least a portion of the payload from the application data packet; and transmitting, by the one or more processors, the WPAN data packet to the identified destination on the WPAN via a WPAN interface.
Abstract:
A method comprising receiving, by a processing thread executing on a host server, a container request to create a container on the host server by employing a container engine, wherein the container request indicates a first resource constraint and a second resource constraint for executing an application within the container, directing, by the processing thread, the container engine to create an operating environment for the container according to the first resource constraint and to execute the container on the host server, reserving, by the processing thread, a first resource from an operating system (OS) of the host server according to the second resource constraint of the container request, and updating dynamically, by the processing thread, the operating environment of the container to enable the container to directly utilize the reserved first resource for execution of the application to meet the second resource constraint of the container request.
Abstract:
An apparatus comprising a plurality of physical IO ports configured to couple to a plurality of remote LCs that provide IO resources, and a processor coupled to the plurality of physical IO ports and configured to map the remote LCs to a plurality of vNICs by allocating at least some of the IO resources to the local vNICs, receive an OS kernel IO call comprising a request to access a first of the vNICs, determine a first of the remote LCs that corresponds to the first vNIC, and direct the request to access the first remote LC.
Abstract:
A method of bootstrapping from a remote image file comprising loading, by a processor, an initial bootloader, employing the initial bootloader to download a final bootloader from the remote image file via a network, employing the final bootloader to mount the remote image file as a block device, downloading a kernel and root file system mounting data from the remote image, and executing the kernel to bootstrap the processor based on the root file system mounting data.
Abstract:
A method implemented in a network component for an in-service software upgrade (ISSU), the method comprising selecting a forwarding core (FC) for upgrade from a plurality of FCs that run at a data plane on a printed circuit board of the network component to process and forward a plurality of packets, and resetting the selected FC with a software upgrade, wherein at least one of the other FCs continues processing and forwarding packets when the selected FC is upgraded.