Abstract:
A method comprises executing a testing operation on a plurality of redundant components of an edge device. In one example, based, at least in part, on the testing operation, at least one redundant component of the plurality of redundant components is identified as having an operational issue, and the at least one redundant component is deactivated in response to the identifying. One or more remaining redundant components of the plurality of redundant components are utilized in one or more operations following the testing operation.
Abstract:
Examples described herein relate to failover of processes from a first network interface device to a second network interface device. A first programmable network interface device includes a network interface, a direct memory access (DMA) circuitry, a host interface, and at least one processor to execute a first process. A second programmable network interface device includes a network interface, a DMA circuitry, a host interface, and at least one processor. The at least one processor of the second programmable network interface device is to perform failover execution of the first process.
Abstract:
Examples described herein including receiving a first address from a host controller and receiving a second address from the host controller. The first address may be for a first PHY and the second address may be for a second PHY. Based on the first address and the second address, a port mode for a storage drive associated with the first PHY and the second PHY may be determined.
Abstract:
Data integrity is maintained during failed communications between a member node of a primary cluster and a backup cluster by assigning an assisting member node to run an assisting process that transmits data entered into the member node to the backup cluster. In this way, a replicated database is maintained during a partial communication failure between the primary cluster and the backup cluster.
Abstract:
A safety device includes a first computation unit, a second computation unit, an output control unit, and a first central processing device. The first computation unit is configured to perform a first computation on a detected value detected from a subject to be controlled, thus obtaining a first result value. The second computation unit is configured to perform a second computation on the detected value, thus obtaining a second result value which is to be determined if equal to the first result value. The output control unit is configured to output the first result value in a case that the second computation unit determines that the first result value is equal to the second result value, and not to output the first result value in a case that the second computation unit determines that the first result value is not equal to the second result value.
Abstract:
Methods, systems, and computer readable media for managing suspect subscriber bindings. In some examples, a method is performed by a Diameter signaling router (DSR) for a telecommunications network. The method includes binding a subscriber to a first policy and charging rules function (PCRF) server selected from a plurality of PCRF servers for the telecommunications network. The method includes determining that one or more messages destined to the first PCRF server have failed according to one or more user-configurable rules defining failure. The method includes tearing down the binding between the subscriber and the first PCRF server.
Abstract:
According to one aspect of the present invention there is provided a system, method, and computer program product for recovering from a network failure in a communication network using network function virtualization (NFV-based network), the method including: selecting a first network component of the NFV-based network, detecting at least one probable failure of the first network component, identifying at least one virtual network function (VNF) instance using the first network component, selecting a second network component to be used by same VNF for replacing the VNF instance in the first network component when the first network component is faulty, and securing at least one resource of the second network component for the VNF.
Abstract:
Systems and techniques for capturing audio and delivering the audio in digital streaming media formats are disclosed. Several aspects of the systems and techniques operate in a cloud computing environment where computational power is allocated, utilized, and paid for entirely on demand. The systems and techniques enable a call to be made directly from a virtual machine out to a Public Switch Telephone Network (PSTN) via a common Session Interface Protocol (SIP) to PSTN Breakout service, and the audio to be delivered onward to one or more Content Delivery Network (CDN). An audio call capture interface is also provided to initiate and manage the digital streaming media formats.
Abstract:
Systems and techniques are described for a path maximum transmission unit (MTU) discovery method that allows the sender of IP packets to discover the MTU of packets that it is sending over a conduit to a given destination. The MTU is the largest packet that can be sent through the network along a path without requiring fragmentation. The path MTU discovery method actively probes each sending path of each conduit with fragmentation enabled to determine a current MTU and accordingly increase or decrease the conduit MTU. The path MTU discovery process is resilient to errors and supports retransmission if packets are lost in the discovery process. The path MTU discovery process is dynamically adjusted at a periodic rate to adjust to varying network conditions.
Abstract:
A system and method for providing a Computer Telephony Integration Service Oriented Architecture is presented. The system and method may include providing one or more computer telephony integration servers in one or more clusters to deliver telephony events between agents and peripheral devices. The events may be solicited or unsolicited. The clusters may be stateless and scalable. The clusters may include dynamic message routing. The systems and methods may implement one or more recovery algorithms if one or more of the telephony integration servers experiences a failure event.