摘要:
Techniques are disclosed for automatically testing for incorrect or incomplete implementation of documented behavior of a device. By way of example, an automated method for checking that one or more devices comply with one or more documented behaviors comprises a computer system performing the following steps. A set of compliance rules is defined for a behavior of at least one of the one or more devices. A set of monitored data is retrieved from the at least one device. The set of monitored data is compared with the set of compliance rules. A result of the comparison is reported.
摘要:
Virtual machine images are distributed to, and retrieved from an image distribution network. A virtual machine image is received on the image distribution network and divided into chunks with a unique resource identifier created for each of the chunks. A virtual machine image reassembly file is created. Each of the chunks is assigned a unique resource locator address. An image distribution network server maintains a mapping between unique resource identifier for each of the chunks and the unique resource locator address. When a request to download a virtual machine image is received, chunks of the virtual machine image that are locally present are identified. Chunks of the virtual machine image that are not locally present are mapped to unique resource locator addresses in the image distribution network. When a sufficient number of chunks has been retrieved to instantiate the virtual machine image, the virtual machine image is instantiated.
摘要:
A method for reducing bandwidth used in multiple transmissions on a cellular network includes mapping at least one request of at least one end-device to a unicast channel between server and an intermediary in the network, creating a correlated multicast communication channel between the intermediary and the at least one end-device, and transferring data from the unicast channel to a multicast channel at the intermediary.
摘要:
A method for scheduling a sequential transmission of a plurality of packets includes estimating a time when each of the plurality of packets waiting to be transmitted will be used by a device targeted to receive the plurality of packets, and mapping the time of each of the plurality of packets to a prioritization among the plurality of packets.
摘要:
A communication technique includes routing communications over an internet topology using coordinates, which correspond to estimated round trip times, of an origination, a destination and at least one intermediary host or node. A disclosed example includes identifying candidate intermediary nodes based upon selected criteria such as proximity to at least one of the origination or destination for the communication. A disclosed example includes identifying a plurality of intermediary nodes for some applications.
摘要:
Network resources are provisioned within an application broker according to aggregated requests in an optical network. Resource requests are sorted to form sorted resource requests. The sorted resource requests are sorted according to destinations of the resource requests. The sorted resource requests are aggregated to form aggregated resource requests. Resource allocation is requested for each of the aggregated resource requests from a network border controller based on requirements of the set of set of aggregated resource requests. A set of allocated resources is received from the network border controller. The set of allocated resources is based on requirements of the aggregated resource requests. For each of the aggregated resource requests, network transmissions network receptions are executed utilizing associated allocated resources.
摘要:
Network resources are provisioned within an application broker according to aggregated requests in an optical network. Resource requests are sorted to form sorted resource requests. The sorted resource requests are sorted according to destinations of the resource requests. The sorted resource requests are aggregated to form aggregated resource requests. Resource allocation is requested for each of the aggregated resource requests from a network border controller based on requirements of the set of set of aggregated resource requests. A set of allocated resources is received from the network border controller. The set of allocated resources is based on requirements of the aggregated resource requests. For each of the aggregated resource requests, network transmissions network receptions are executed utilizing associated allocated resources.
摘要:
The present disclosure relates generally to the field of routing with path labeling (in named data networks). In various examples, routing with path labeling may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
摘要:
A method for reducing bandwidth used in multiple transmissions on a cellular network includes mapping at least one request of at least one end-device to a unicast channel between server and an intermediary in the network, creating a correlated multicast communication channel between the intermediary and the at least one end-device, and transferring data from the unicast channel to a multicast channel at the intermediary.
摘要:
A system, method and computer program product for determining at least one association between at least one business process and at least one network entity. The system maps at least one user to the business process. The system maps the user to at least one network end-point. The system maps the network end-point to at least one application. The system maps the network entity to the application. The system identifies the association among the business process, the user, the network end-point, the application and the network entity based on one or more of the mappings.