摘要:
A method of characterizing a capacity region in a multi-channel, multi-radio mesh network of nodes interconnected by links. The method includes: (a) modeling the network by determining one or more link-flow feasibility constraints; (b) obtaining a feasible upper-capacity bound by solving an optimization problem using the one or more link-flow feasibility constraints as necessary conditions; and (c) using an algorithm adapted to provide a feasible lower-capacity bound by (i) receiving the solution to the optimization problem as input, (ii) allocating channels to links to meet a demand vector that satisfies the one or more link-flow feasibility constraints, and (iii) scheduling flows along the allocated channels. The upper- and lower-capacity bounds define the capacity region.
摘要:
A method of routing data from a source node to a destination node in a multi-hop network of nodes interconnected by links comprises: (a) determining that a link-flow vector satisfies one or more necessary scheduling conditions for achievability, wherein the link-flow vector represents a set of flows to be routed on one or more links from the source node to the destination node; (b) generating a scheduling multi-graph for the network, wherein the scheduling multi-graph comprises a graph having at least one pair of nodes with multiple edges therebetween; (c) deriving one or more sufficient scheduling conditions for achievability of the link-flow vector by edge-coloring the scheduling multi-graph; (d) solving a linear optimization problem over the one or more necessary scheduling conditions to obtain an upper bound on the achievability of the link-flow vector; (e) generating, based on the scheduling multi-graph, a solution comprising a set of routes and an associated schedule for achieving the link-flow vector, the solution being a lower bound on the achievability of the link-flow vector; and (f) implementing a routing method using the set of routes and the associated schedule to route the link-flow vector from the source node to the destination node. At least one node v of the network is adapted to receive transmissions from a specified plurality Ω(v) of other nodes, and at least one of the scheduling conditions depends on Ω(v).
摘要:
The SoftRouter architecture separates the implementation of control plane functions from packet forwarding functions. In this architecture, all control plane functions are implemented on general purpose servers called the control elements (CEs) that may be multiple hops away from the forwarding elements (FEs). A network element (NE) or a router is formed using dynamic binding between the CEs and the FEs. There is a protocol failover mechanism for handling failovers initiated by FEs to transfer control from one CE to another CE.
摘要:
The SoftRouter architecture separates the implementation of control plane functions from packet forwarding functions. In this architecture, all control plane functions are implemented on general purpose servers called the control elements (CEs) that may be multiple hops away from the forwarding elements (FEs). A network element (NE) or a router is formed using dynamic binding between the CEs and the FEs. The flexibility of the SoftRouter architecture over conventional routers with collocated and tightly integrated control and forwarding functions results in increased reliability, increased scalability, increased security, ease of adding new functionality, and decreased cost.
摘要:
At least one example embodiment discloses a paging message controller. The paging message controller includes a processor and an associated memory. The processor is configured to obtain an indication of a paging message for a user equipment (UE), the indication indicating that a paging message is to be forwarded to at least one destination cell of a first set of cells for paging the UE, and forward the paging message for paging the UE to at least one destination cell of a second set of cells in response to the indication.
摘要:
Various embodiments provide a method and apparatus of providing a distributed security service that runs light instances in a number of security devices and central instances of the security services in select security devices. A received or transmitted client content segment is directed to a light instance which either applies a security policy corresponding to the client content segment if the client content segment has been previously analyzed and has a valid security policy, or else, the light instance sends the client content segment to a central instance to be analyzed. The central instance may then provide a complete security analysis on the client content segment, determine a security policy corresponding to the client content segment and push the determined security policy to one or more of the light instances. Advantageously, a distributed security service delivery may provide highly secure, network efficient and cost effective security service delivery.
摘要:
An enmeshed hierarchy of policers, different from traditional tree-based hierarchical system of policers is used in accordance with the present invention. A goal of using an enmeshed architecture of policing systems is to allow for a more complex set of policies to be defined across a network. Hierarchical/cascading systems ensure that the higher granularity assignments essentially dictate/constrain the behavior of finer grained assignments at higher levels for sub-flows. There is only one type of metric possible for the largest granular policer, so the only way to implement multiple system-wide metrics is to repeat the hierarchy multiple times over, which adds to the delay of the packet and the complexity of the router. In accordance with the enmeshed architecture of the present invention, multiple system-wide metrics can be implemented simultaneously, which allows for easier management of the various macro-level policies by the manager of an access network.
摘要:
Various embodiments provide a method and apparatus of providing a frugal cloud file system that efficiently uses the blocks of different types of storage devices with different properties for different purposes. The efficient use of the different types of available storage devices reduces the storage and bandwidth overhead. Advantageously, the reduction in storage and bandwidth overhead achieved using the frugal cloud file system reduces the economic costs of running the file system while maintaining high performance.
摘要:
The invention manages an IP address space in a mobility network, including partitioning of the IP address space, assignment of IP addresses from the IP address space, and/or use of hysteresis to control reassignment of IP addresses from the IP address space. The IP address assignment is performed using one or more residual time statistics from a residual time profile maintained for the mobile node requesting assignment of an IP address. A residual time profile of a mobile node includes one or more residual time statistics associated with the mobile node. The residual time statistics for a mobile node are determined using a residual time associated with each IP address assigned to the mobile node. The IP address space partitioning is performed using residual time statistics maintained for mobile nodes of the network. The reassignment of IP addresses from the IP address space is controlled using hysteresis.
摘要:
An exemplary data transfer manager includes a datacenter configured to communicate over at least one link and a scheduler that is configured to schedule a plurality of jobs for communicating data from the datacenter. The scheduler determines a minimum bandwidth requirement of each job and determines a maximum bandwidth limit of each job. The scheduler determines a flex parameter of each job. The flex parameter indicates how much a data transfer rate can vary between adjacent data transfer periods for the job.