摘要:
A method for controlling congestion of traffic, by one of one or more User Terminals (UTs), traversing an intermediate node, the method comprising: associating one or more traffic flows of a priority to one of the one or more UTs; detecting a traffic congestion for the priority; performing Random Early Detection (RED) congestion control for the priority to relieve the traffic congestion; selecting, for the priority, a User Terminal (UT) with a perceived delay greater than a high threshold; and controlling, by priority, the traffic flows associated with the selected UT.
摘要:
A method for controlling congestion of traffic, by one of one or more User Terminals (UTs), traversing an intermediate node, the method comprising: associating one or more traffic flows of a priority to one of the one or more UTs; detecting a traffic congestion for the priority; performing Random Early Detection (RED) congestion control for the priority to relieve the traffic congestion; selecting, for the priority, a User Terminal (UT) with a perceived delay greater than a high threshold; and controlling, by priority, the traffic flows associated with the selected UT.
摘要:
Embodiments of a mobile device and method for secure on-line sign-up and provisioning of credentials for Wi-Fi hotspots are generally described herein. In some embodiments, the mobile device may be configured to establish a transport-layer security (TLS) session with a sign-up server through a Wi-Fi Hotspot to receive a certificate of the sign-up server. When the certificate is validated, the mobile device may be configured to exchange device management messages with the sign-up server to sign-up for a Wi-Fi subscription and provisioning of credentials, and retrieve a subscription management object (MO) that includes a reference to the provisioned credentials for storage in a device management tree. The credentials are transferred/provisioned securely to the mobile device. In some embodiments, an OMA-DM protocol may be used. The provisioned credentials may include certificates in the case of certificate-based credentials, machine-generated credentials such as username/password credentials, or SIM-type credentials.
摘要:
A method for reducing file-system fragmentation when restoring block-level backups may include (1) identifying a block-level backup stored on a backup storage device, (2) determining, by analyzing metadata contained within the block-level backup, that data contained within the block-level backup was physically arranged in a non-optimized manner on the volume from which the block-level backup was originally created due to file-system fragmentation, (3) identifying a request to restore the block-level backup to a target storage device in a block-by-block manner, (4) determining an optimized physical layout within a file system on the target storage device for the data contained within the block-level backup, and then (5) restoring the block-level backup to the target storage device block-by-block in accordance with the determined optimized physical layout in order to reduce the file-system fragmentation identified in the block-level backup. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
Methods and apparatus, including computer program products, implementing and using techniques for finding application latency degradation causes in an application on a distributed computing system. Variables associated with the application and the computing system are identified, including variables that are candidates for being responsible for latency degradation. A total latency is divided into latency components, that each corresponds to an aspect of the total application latency. Each latency component is divided into study classes, that each includes a subset of the candidate variables. For each study class, combinations are generated for the subset of the variables; a latency distribution is determined for each variable combination; the determined latency distributions for the combinations are compared with corresponding latency benchmark values for the same combinations to determine whether a degradation in latency distributions has occurred for particular combinations among the one or more combinations, and a result is provided to a user.
摘要:
Techniques for wireless network discovery and selection support are described. In one embodiment, for example, an evolved packet core (EPC) node may comprise a processor circuit to implement an access network discovery and selection function (ANDSF) according to a management object that includes a branch comprising one or more policies to select a wireless local area network (WLAN), the processing circuitry to receive capabilities information and location information for a user equipment (UE) and determine access network information for the UE based on the capabilities information and the location information. Other embodiments are described and claimed.
摘要:
A hardware and/or software facility to enable emulated storage devices to share data stored on physical storage resources of a storage system. The facility may be implemented on a virtual tape library (VTL) system configured to back up data sets that have a high level of redundancy on multiple virtual tapes. The facility organizes all or a portion of the physical storage resources according to a common store data layout. By enabling emulated storage devices to share data stored on physical storage resources, the facility enables deduplication across the emulated storage devices irrespective of the emulated storage device to which the data is or was originally written, thereby eliminating duplicate data on the physical storage resources and improving the storage consumption of the emulated storage devices on the physical storage resources.
摘要:
An apparatus includes a memory to store one or more identifiers for respective one or more home service providers, circuitry coupled to the memory, and a network access component for execution on the circuitry to automatically identify a set of access points that can provide wireless service to a device based upon the one or more identifiers, and select an access point from the identified set of access points to establish a wireless connection. Other embodiments are disclosed and claimed.
摘要:
Embodiments of a mobile device and methods automatically connecting to a Wi-Fi Hotspot 2.0 are generally described herein. In some embodiments, subscription information for one or more service providers (SP) that operate Wi-Fi networks is stored in a subscription data object of the mobile device. The subscription information includes home service provider information, policy information and pre-provisioned credentials. The mobile device may be configured to determine, without user interaction, if the subscription information is applicable to an available Wi-Fi network and perform without user interaction, an extensible authentication protocol (EAP) based authentication using the pre-provisioned credentials with the available Wi-Fi network to establish a Wi-Fi connection with the available Wi-Fi network. This automatic connectivity may allow a mobile device to roam across Wi-Fi hotspots of Wi-Fi networks and offload traffic to Wi-Fi networks.
摘要:
A device and method for forming a packet data network (PDN) connection at a dual access priority mode configured user equipment (UE) is disclosed. The method comprises sending, from the UE to a mobility management entity (MME), a PDN connectivity request message that includes a NAS signaling priority override indicator to indicate that the PDN connection has a different NAS signaling priority mode than an existing PDN connection. The existing PDN connection is operating in a first signaling priority mode. The existing PDN connection is deactivated at the UE. A new PDN connection, operating in a second NAS signaling priority mode, is established at the UE.