摘要:
This invention provides methods and apparatus for web switching without connection termination while providing content routing functionality. Content-aware web switches terminate incoming TCP connections and inspect the HTTP header to recognize the URL (content) being requested from a web server farm. This invention maps application layer information (URLs) to MPLS labels. This allows a standard MPLS switch to provide web switching functionality without terminating TCP connections. In addition to content routing, this method is applied for client session affinity, server load balancing and service differentiation. This invention also relates to using TCP port numbers instead of MPLS labels to achieve web-switching functionality through the use of a TCP router that translates IP address and port numbers.
摘要:
In one embodiment, the present invention is a method and apparatus for dynamic domain-independent system parameter configuration. One embodiment of an inventive method for modifying a current system configuration to achieve a given system objective includes receiving a new system objective. The current system configuration is then modified to achieve the new system objective by applying at least one case history representing past system behavior.
摘要:
Methods, systems, and computer program products for programmatically determining whether components of a program are suitable for deployment in particular locations such as at the edge of a network. In preferred embodiments, program characteristics and operating environment characteristics, along with information about their interactions, are programmatically combined at deployment time to determine whether application components are edgeable. The disclosed approach enables people such as programmers (who are familiar with the program characteristics) and systems administrators (who are familiar with the operating environment characteristics) to each provide some control over the edgeability determination, along with other systems experts (who know how these features interact). Alternatively, this information or portions thereof may be supplied programmatically. Preferably, techniques of matrix algebra are used for the programmatic combination, yielding a value which is compared to a predetermined edgeability threshold to determine a particular component's edgeability.
摘要:
An integrated product data environment for system design and optimization, e.g., a Collaborative Engineering Environment (CEE). The CEE provides a multi-disciplinary engineering team with immediate access to all relevant product information. It is an enterprise system at the program as well as the company levels, managing product information as a program and corporate asset. Product-centric collaborative capabilities for the CEE are provided by extending the functionality of a commercial Product Data Management (PDM) System. Emerging web-centric commercial-off-tho-shelf (COTS) PDM capabilities, object-oriented technologies, associated rapid application development environments, sophisticated engineering toolsets, and COTS computing and communications technologies have been leveraged to establish the CEE for the complex electronic systems integration domain. The CEE offers substantial improvements in productivity, cost savings, cycle time reductions, product integrity and lifetime support of a system.
摘要:
This invention provides methods and apparatus for executing applications in a distributed manner employing one or more proxy servers and one origin server. The invention allows the applications to be executed primarily at the proxy servers rather than at the origin servers, thereby gaining in scalability and improved user response time. A redirection mechanism is used to direct requests to one of the proxy servers. The proxy server uses caching techniques to bring information records needed for application execution to the proxy servers. The code required for application execution is also obtained from the origin server. The invention discusses applying this technique to three Web-based applications, namely Web-based auctions, generating personalized content for Web-users, and creating advertisements for users accessing a Web page.
摘要:
A method, and a system applying the method, for an exact and computationally efficient solution for defuzzification uses linear and non-linear weighted wedge approaches. Fuzzy numbers are used to represent parameters in a number of applications, including design dependent parameters (DDPs) for a project in particular. A defuzzification technique is used within the domain of fuzzy logic, fuzzy set theory, and multi-valued logic to overcome the problem of the lack of absolute ordering of a fuzzy number representation. The requirement profile for the DDP (the fuzzy representation of customer requirements) is compared to the anticipation profile for the DDP (the fuzzy representation of expected performance) in three dimensions. In two dimensions, the area of overlap between the DDP requirement profile and the DDP anticipation profile represents how well the customer requirements have been met. In three dimensions, the area of overlap is projected onto a wedge to obtain a volume of overlap, in order to give higher preference to higher DDP values than lower DDP values in the area of overlap, for a more accurate analysis. The wedge can also be made non-linear in shape, to provide added sensitivity analysis to desired results.
摘要:
Protection among threads executing in the same address space of a computer system is provided without using virtual memory techniques. This is achieved by grouping the threads into protection domains, each of the threads in a protection domain having the same rights to access memory as the other threads in that protection domain, so that each thread in a protection domain can access all the information available to the others. At least one protection domain, referred to herein as the "system" domain, which typically is the protection domain of the operating system and has unrestricted access to the entire memory, is predefined prior to execution of any threads. Prior to execution, the single address space is divided into non-overlapping pages. Each page has at least one access permission set for it. Only threads that belong to a protection domain having permission to access a page may do so. During operation, when a request to access memory is issued by an executing thread, it is determined whether or not the protection domain of the executing thread has permission to perform the requested type of access. If the protection domain of the executing thread is permitted to perform the type of access requested, access is granted and the executing thread's execution proceeds normally. However, if the protection domain of the executing thread does not have permission to perform the requested type of access, a protection fault is generated.
摘要:
A computer-implemented system and computer program product for routing at least one interest packet in a named data network including a plurality of nodes. The system comprises a mapping unit configured for mapping each of a plurality of names of a respective plurality of the data objects to one of a plurality of path labels, wherein each path label uniquely identifies a path between a source node and a destination node; and a node in operative communication with the mapping unit configured for providing an interest packet having both the name of a requested data object and one of the path labels, wherein the path label provided with the interest packet points to the requested data object at the destination node of the path label provided with the interest packet.
摘要:
A method for generating network traffic includes receiving packet header information and an optional packet payload. The received packet header information is arranged in accordance with a predetermined format. A packet of data including the packet payload and a packet header is formatted in accordance with the arranged header information. The predetermined format specifies a particular order in which packet headers are to be arranged.
摘要:
The present disclosure relates generally to the field of routing with path labeling (in named data networks). In various examples, routing with path labeling may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.