摘要:
Energy saving virtualization technique embodiments are presented that save energy by virtualizing a network-connected client computer's computing session (or a part thereof) as a virtual machine (VM) and then migrating it between the client computer and a VM server, depending on whether the computing session is active or idle. The client computer VM is migrated to the VM server when the client computer is deemed to be idle, and the VM is migrated back when the client computer is deemed to have re-entered an active condition. When the VM has been migrated away from the client computer and is residing on the VM server, the client computer is put into a sleep mode, thereby saving energy. However, the user's computing session remains alive on the VM server so that ongoing network connections and other activity are not disturbed.
摘要:
The method collects configuration data about the network, compares it to known good configurations to see if a corrective configuration is available. In addition, the method will review known bad configurations and determine if any of the successful corrective configurations for the bad configuration would be appropriate for the bad configuration under consideration.
摘要:
A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
摘要:
A new system and method of available bandwidth estimation applies even where the narrow link and tight link in a network path are in different locations. In embodiments of the invention, a unique packet probe series structure and processing is employed to estimate available bandwidth. In an embodiment of the invention, the spacing between probe packets is adjusted at the source to account for dilation caused by links leading to the tight link, so that the spacing is appropriate when the probes arrive at the tight link. Moreover, the multi-packet probe comprises a large packet followed by two much smaller packets. The large packet is then dropped once it has traversed the tight link. The two small packets, which are impacted little by subsequent narrow links, preserve the spacing set by the tight link, encoding the delay induced by the tight link, all the way to the destination.
摘要:
A system is disclosed for collaborative downloading that uses both the WLAN and the WWAN in combination, in an attempt to bridge the range-speed dichotomy. Devices in close vicinity band together their WWAN links, with the high-speed WLAN serving as the glue, to boost the effective wide-area bandwidth available to the active nodes.
摘要:
A local network coding framework and method including techniques to improve efficiency in a wireless network by reducing overhead. The local network coding method includes exchanging data availability between nodes on the wireless network by sending Bloom filters of lists of packets to neighboring nodes. Based on data availability, optimized mixing of pure packets is performed to form mixture packets for output. A separate acknowledgement buffer keeps track of the pure packets transmitted but not acknowledged. If an acknowledgement does not arrive after a certain time period, the packet is assumed to be lost and is retransmitted. An optimized packet mixing process generates mixture packets and decides which nodes to send the mixture packets. The local network coding framework and method also includes methods for representing the composition of a mixture packet and using mixing at a wireless access point to improve the performance of the wireless local area network.
摘要:
A data sequence may be encoded in a plurality of layers of multiple description coding. The layers of multiple description coding may include a first and a second layer of multiple description coding. The first layer of multiple description coding may include an initial part of a data sequence as well as forward error correction code for the initial part. The second layer of multiple description coding may include a next part of the data sequence as well as forward error correction code for the next part. A first set of data sequence breakpoints may be determined for the first layer of multiple description coding. A second set of data sequence breakpoints may be determined for the second layer. The data sequence may be encoded in the plurality of layers of multiple description coding as a function of the first and second sets of data sequence breakpoints.
摘要:
A method for locating a user in a wireless network is disclosed. A mobile computer seeking to determine its location within a building detects the signal strength of one or more wireless base stations placed at known locations throughout the building. The mobile computer uses this measured signal strength to determine its location via a signal-strength-to-location table look-up. A table of known locations within the building and the base station signal strength at those locations is searched to find the most similar stored signal strength to the signal strength detected. The location corresponding to the most similar stored signal strength is determined to be the current location of the mobile computer. Alternatively, a number of signal strengths from the table can be used and the corresponding locations can be spatially averaged to determine the location of the mobile computer. The table can be derived empirically, by placing a mobile computer at the known locations and detecting the signal strength of the wireless base stations at those locations, or the table can be derived mathematically by taking into account a reference signal strength, the distance between the reference point and the known location, and the number of walls between the reference point and the known location. As an alternative, the base stations can detect the signal strength of the mobile computer. In such a case, the table would relate a known position of the mobile computer to the signal strength of the mobile computer at that location as detected by the one or more base stations.
摘要:
A method for locating a user in a wireless network is disclosed. A mobile computer which seeks to determine its location within a building detects the signal strength of one or more wireless base stations placed at known locations throughout the building. An environmentally profiled table of known locations within the building and the base station signal strength at those locations is searched to find the stored signal strength most similar to the signal strength detected. The location corresponding to the most similar stored signal strength is determined to be the current location of the mobile computer. The table can be derived empirically, by placing a mobile computer at the known locations and measuring the signal strength of the wireless base stations at those locations, or it can be derived mathematically by taking into account a reference signal strength, the distance between the reference point and the known location, and the number of intervening walls between the reference point and the known location. As an alternative, the base stations can measure the signal strength of the mobile computer. In such a case, the table would relate a known position of the mobile computer to the signal strength of the mobile computer as measured by the one or more base stations. Environmental profiling is achieved by comparing several different tables, corresponding to several different environments, and using the table that minimizes the error. Environmental profiling can be applied to tables determined empirically or mathematically.