摘要:
A method is provided for selecting a replication node from eligible nodes in a network. A multidimensional model is constructed that defines a multidimensional space and includes the eligible nodes, with each of the dimensions of the multidimensional model being a system characteristic. A data availability value is determined for each of the eligible nodes, and a cost of deploying is determined for each of at least two availability strategies to the eligible nodes. At least one of the eligible nodes is selected for replication of data that is stored on a source node in the network. The selecting step includes selecting the eligible node whose: data availability value is determined to be highest among the eligible nodes whose cost of deploying does not exceed a specified maximum, or cost of deploying is determined to be lowest among the eligible nodes whose data availability value does not exceed a specified minimum.
摘要:
One embodiment of the present method and apparatus for time-based communications port protection includes generating a transmission period schedule that is known only by authorized network users including a server and one or more clients of the server. The transmission period schedule dictates pre-defined times at which the server and clients may communicate, e.g., to transfer data. By communicating only at these secret, pre-defined times, the likelihood that an unauthorized party will be able to disrupt service to the clients is greatly reduced.
摘要:
There is provided a method and system for replicating data at another location. The system includes a source node that contains data in a data storage area. The source node is coupled to a network of potential replication nodes. The processor determines at least two eligible nodes in the network of nodes and determines the communication cost associated with a each of the eligible nodes. The processor also determines a probability of a concurrent failure of the source node and each of eligible nodes, and selects at least one of the eligible nodes for replication of the data located on the source node. The selection is based on the determined communication costs and probability of concurrent failure.
摘要:
A method is provided for selecting a replication node from eligible nodes in a network. A multidimensional model is constructed that defines a multidimensional space and includes the eligible nodes, with each of the dimensions of the multidimensional model being a system characteristic. A data availability value is determined for each of the eligible nodes, and a cost of deploying is determined for each of at least two availability strategies to the eligible nodes. At least one of the eligible nodes is selected for replication of data that is stored on a source node in the network. The selecting step includes selecting the eligible node whose: data availability value is determined to be highest among the eligible nodes whose cost of deploying does not exceed a specified maximum, or cost of deploying is determined to be lowest among the eligible nodes whose data availability value does not exceed a specified minimum.
摘要:
One embodiment of the present method and apparatus for time-based communications port protection includes generating a transmission period schedule that is known only by authorized network users including a server and one or more clients of the server. The transmission period schedule dictates pre-defined times at which the server and clients may communicate, e.g., to transfer data. By communicating only at these secret, pre-defined times, the likelihood that an unauthorized party will be able to disrupt service to the clients is greatly reduced.
摘要:
The present invention broadly contemplates addressing QoS concerns in overlay design to account for the last mile problem. In accordance with the present invention, a simple queuing network model for bandwidth usage in the last-mile bottlenecks is used to capture the effects of the asymmetry, the contention for bandwidth on the outgoing link, and to provide characterization of network throughput and latency. Using this characterization computationally inexpensive heuristics are preferably used for organizing end-systems into a multicast overlay which meets specified latency and packet loss bounds, given a specific packet arrival process.
摘要:
Yield management techniques are provided. In one aspect of the invention, a technique for managing one or more computing resources comprises the following steps/operations. Data associated with at least one potential demand for use of the one or more computing resources is obtained. Then, a management model (e.g., a yield management model or a revenue management model) is generated in accordance with at least a portion of the obtained data, wherein the management model is operative to determine an allocation of the one or more computing resources based on combinations of price levels and service levels that may be offered to one or more users of the one or more computing resources so as to attempt to satisfy at least one management goal.
摘要:
The present invention provides a method for providing information to a client or customer about anticipated service center delays comprising maintaining data about the client's call preferences, modeling a best indicator of delays specific to an individual client when answering a call from the client by the service center in order to capture the greatest market share of the clients, and communicating to the client a best indicator of delays suited to the client's call preferences in answering the call from the client to the service center.
摘要:
A method for association of a mobile terminal with an access point (AP) includes determining a set of available APs. The AP from among the available APs that has the coverage area that is likely to encompass the mobile terminal for the greatest period of time or distance is selected. The selected AP is associated with the mobile terminal.
摘要:
Systems and methods are provided to determine an allocation of network resources in a distributed on-demand information technology (IT) systems using existing control mechanisms for other operating system resources in order to achieve a desired operating point within the IT system. This desired operating point is obtained by optimizing a goal-based objective function while taking into account system constraints. The relationship between utilization of all system resources, i.e. network resources and processing resources, and attainment of performance objectives is autonomously obtained for a plurality of actions that could be required by a range of system applications. This relationship is used to allocate network resources to applications while maintaining desired performance objectives. The allocation is enforced using existing control mechanisms.