摘要:
A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider.
摘要:
Systems and methods are provided for file searching on mobile devices. A system includes a user interface and a file query system. The user interface is for receiving a user-provided spatio-temporal query for use in searching for a particular file. The user-provided spatio-temporal query is provided by a user of a mobile device. The file query system is for determining information about the particular file responsive to the user-provided spatio-temporal query, and identifying from the information one or more files as a search result for the particular file.
摘要:
A method, system and computer program product for disseminating information to mobile communication devices from a content provider via a core network. In an embodiment, the content provider sends specified information to the core network, and the content provider sends an information dissemination policy and a time release policy to the core network. The core network determines a time distribution plan for disseminating the specified information, and disseminates the specified information to one or more of the mobile communication devices in accordance with the dissemination policy from the content provider and the time distribution plan. The core network enables the one or more of the mobile devices to release the specified information to a user or users of the one or more of the mobile devices in accordance with the time release policy from the content provider.
摘要:
A computer implemented method monitors resource usage of a virtual machine. When a virtual machine is instantiated, resource usage of the virtual machine is monitored to form monitoring data. The monitoring is performed externally from the virtual machine. When the virtual machine is later suspended, the monitoring data is stored as metadata associated with the virtual machine.
摘要:
Middlebox systems that can enter a connection include a monitoring module to monitor information in a connection between a client and a server, a processor to determine that the connection is idle, a table configured to create a first entry for the client and a second entry for the server, where the entries are initialized using information gathered by the monitoring module, and a control module to redirect the connection between the client and server to the middlebox. Middlebox systems that can exit a connection include a processor to determine a mismatch between sequence numbers in a first connection to a client device and in a second connection to a server device. A network control module delays acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch and establishes a direct connection between the client device and the server device when mismatch is zero.
摘要:
A mechanism is provided for establishing a shared secret-key for secure communication between nodes in a wireless network. A first node in the wireless network provides a spreading code to a second node of the wireless network. The second node provides a first input for the key establishment to the first node using communication encoded with the spreading code. Responsive to obtaining the first input from the second node, the first node provides a second input for the key establishment to the second node using communication encoded with the spreading code. Then, the first node and the second node establish the shared secret-key using the first input and the second input.
摘要:
A system and method for instantiation of a virtual machine (VM) in a datacenter includes providing a network appliance in a location for listening to management information traffic. Indices are created for data center images in the network appliance. VM instantiation requests are intercepted in the network appliance. Locations from which blocks for the VM should be fetched based upon network cost are determined. VM image blocks are populated from the locations.
摘要:
A method and system for detecting and correcting invalid network paths in a network having a plurality of routers and a set of global invariant rules imbedded in the network including querying a subset of a routing table data structure defining network paths wherein said subset includes a plurality of routing table entries and comparing a network routing table entry with an earlier network routing table entry for the same node. The method and system also includes detecting inconsistencies between the newer network routing table entry and the earlier network routing table entry, and invalidating the network entries of the older network routing table that are inconsistent with the newer entries. The method and system also includes reconstructing the routing structure by replacing the invalidated network routing table entries with new routing table entries that minimize violation of the invariant protocols.
摘要:
The present invention provides a process to establish or configure a mode of operation for computing devices through the use of affinity groups, policy guidelines, and priority graphs. An affinity group is a group of peer devices identified by a network to which a target device is connected as being similar to the target device. Policy guidelines are parameters describing mode or configuration policies for a group of users and reflecting users' identified needs and requirements. A priority graph is a decision tree, which may or may not be graphically represented, describing hierarchically the organization of policies governing the mode or configuration of device operation and capturing the relative priorities of different policies. A key aspect of the present invention involves the sharing of information within an affinity group.
摘要:
A method of determining the state of network links based on differences in corresponding distance-vectors in a sequence routing table updates, and a network management system performing the method. The network management system comprises least one monitoring apparatus adapted to determine the state of network links. The monitoring apparatus may be a router in the network adapted to determine link status, or a personal computer or server peered with a router and configured to determine the state of network links based on differences in corresponding distance-vectors in a sequence of routing table updates.