摘要:
A communication device cognitively monitors interference signals across a communication band so that adaptations for physical and medium access control (MAC) of data packet transmissions are appropriate for a particular interference signal. Characteristics of an interference signal of interest (e.g., bandwidth, power and/or duration relative to an average data packet transmitted over a communication channel of the communication device) are sensed for an appropriate adaptation (e.g., forward error correction, modulation technique, back off, request to send/clear to send protocol, etc.). Patterns for known types of interference sources can be compared so that when recognized an associated adaptation can be used.
摘要:
Novel, Internet-related architectures, methods and devices are proposed that are based on a fundamentally different philosophy: hosts (e.g., source and destination nodes) are given the ability to specify their access control policies to the network they are a part of, and the network enforces these policies. The architecture proposed is mobility friendly to the ever increasing number of mobile hosts and is scalable as well.
摘要:
The amount of TCP/IP packets which can be sent from an Internet network to a wireless network is maximized by modifying a receive window value of an acknowledgment (ACK) before the ACK is sent on to a source of data packets within the Internet network. The receive window value is modified to take into consideration delay and rate variations which occur in the wireless network.
摘要:
A network node computes a fair share data rate for the sharing of a shared communication channel in a local area network. The network node determines the required information for computing the fair share by snooping the network, by receiving the required information from other network nodes, or a combination of the two techniques. Alternatively, instead of computing the fair share data rate, the network node may receive the fair share data rate which was computed by another network node. The fair share data rate is enforced by the network node in a network protocol stack layer above the media access control layer. In one embodiment, the network protocol stack layer above the media access control layer is the link layer.
摘要:
A base station controller (BSC) of a radio or wireless telecommunications network base station includes a director. A BSC includes multiple central processing units (CPUs), with each CPU running a call-processing application for one or more connections. The director is a logical entity that intercepts wireless call-setup signaling and assigns each corresponding connection to a CPU according to a centralized load-balancing algorithm. The centralized load-balancing algorithm distributes connections to less loaded CPUs to i) prevent individual CPUs from overloading, ii) utilize otherwise unused system resources, and iii) increase overall system performance. The director hosts cell components that manage code division multiple access (CDMA) downlink spreading codes for a base station, providing centralized allocation of spreading codes by the base station.
摘要:
The SoftRouter architecture separates the implementation of control plane functions from packet forwarding functions. In this architecture, all control plane functions are implemented on general purpose servers called the control elements (CEs) that may be multiple hops away from the forwarding elements (FEs). A network element (NE) or a router is formed using dynamic binding between the CEs and the FEs. There is a protocol failover mechanism for handling failovers initiated by FEs to transfer control from one CE to another CE.
摘要:
An end host redundancy elimination system and method to provide redundancy elimination as an end system service. Embodiments of the system and method use optimization techniques that reduce server central processing unit (CPU) load and memory footprint as compared to existing approaches. For server storage, embodiments of the system and method use a suite of highly-optimized data structures for managing metadata and cached payloads. An optimized asymmetric max-match technique exploits the inherent structure in data maintained at the server and client and ensures that client processing load is negligible. A load-adaptive fingerprinting technique is used that is much faster than current fingerprinting techniques while still delivering similar compression. Load-adaptive means that embodiments of the fingerprinting technique can adapt CPU usage depending on server load. Embodiments of the system and method operate above the transmission control protocol (TCP) layer, thereby reducing the number of roundtrips needed for data transfer.
摘要:
Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for a wireless network client operating under a power-saving mode, and re-arranging the distribution queue of the access point to be granted priority for a time which coincides with the delivery of a polling beacon to the power-saving wireless client. Other embodiments include a method to create virtual access points for a particular usage, and to leverage access points in a wireless network for particular usages of devices in range.
摘要:
A communication device cognitively monitors interference signals across a communication band so that adaptations for physical and medium access control (MAC) of data packet transmissions are appropriate for a particular interference signal. Characteristics of an interference signal of interest (e.g., bandwidth, power and/or duration relative to an average data packet transmitted over a communication channel of the communication device) are sensed for an appropriate adaptation (e.g., forward error correction, modulation technique, back off, request to send/clear to send protocol, etc.). Patterns for known types of interference sources can be compared so that when recognized an associated adaptation can be used.
摘要:
Energy saving virtualization technique embodiments are presented that save energy by virtualizing a network-connected client computer's computing session (or a part thereof) as a virtual machine (VM) and then migrating it between the client computer and a VM server, depending on whether the computing session is active or idle. The client computer VM is migrated to the VM server when the client computer is deemed to be idle, and the VM is migrated back when the client computer is deemed to have re-entered an active condition. When the VM has been migrated away from the client computer and is residing on the VM server, the client computer is put into a sleep mode, thereby saving energy. However, the user's computing session remains alive on the VM server so that ongoing network connections and other activity are not disturbed.