摘要:
A closed loop system is described for enhanced adaptive network capabilities in support of workflow missions. Multiple workflow-locked loops with different sampling rates are employed. A faster, lower loop is employed to gather data from the field and deal with network level exceptions such as faults, fades, and changing conditions. A slower, upper loop is employed to handle mission level exceptions. The result is a system capable of integrating management of multiple workflow missions, including reallocation of resources in response to changes in mission goal statements and network resource availability.
摘要:
A method and apparatus for providing network based load balancing of medical image data among two or more image archive systems is disclosed. A network element is employed to interface to a network carrying medical image data that may include tasks to be performed on the data. A network service associated with the network element monitors the current load or the available capacity of each of the image archive systems. When a task is received the network service determines the level of complexity of the task and compares the level of complexity to the current load or available capacity of each of the image archive systems. The network service selects the one of the image archive systems to perform the task that has the lowest current load or highest available capacity relative to the level of complexity of the received task.
摘要:
Application program network service requests are translated into specific actions that are then performed through the management plane and/or control plane. The translations and resulting actions are responsive to previously defined policies for the communication network, and may further reflect processing of previous service requests by the same or another application program. The amount of resources available for use by a given application program may be predefined based on a globally defined network policy. Each service request obtained from an application program may be translated into multiple actions performed using various specific protocols and/or interfaces provided by either the management plane, the control plane, or both the management and control planes. Reports of network activity, status and/or faults for a requesting application program may be tailored to the requesting program's view of the network, and passed directly and exclusively to the requesting program.
摘要:
A method and apparatus has been shown and described which allows Quality of Service to be controlled at a temporal granularity. Time-value curves, generated for each task, ensure that mission resources are utilized in a manner which optimizes mission performance. It should be noted, however, that although the present invention has shown and described the use of time-value curves as applied to mission workflow tasks, the present invention is not limited to this application; rather, it can be readily appreciated by one of skill in the art that time-value curves may be used to optimize the delivery of any resource to any consumer by taking into account the dynamic environment of the consumer and resource
摘要:
A method and apparatus has been shown and described which allows Quality of Service to be controlled at a temporal granularity. Time-value curves, generated for each task, ensure that mission resources are utilized in a manner which optimizes mission performance. It should be noted, however, that although the present invention has shown and described the use of time-value curves as applied to mission workflow tasks, the present invention is not limited to this application; rather, it can be readily appreciated by one of skill in the art that time-value curves may be used to optimize the delivery of any resource to any consumer by taking into account the dynamic environment of the consumer and resource.
摘要:
Application program network service requests are translated into specific actions that are then performed through the management plane and/or control plane. The translations and resulting actions are responsive to previously defined policies for the communication network, and may further reflect processing of previous service requests by the same or another application program. The amount of resources available for use by a given application program may be predefined based on a globally defined network policy. Each service request obtained from an application program may be translated into multiple actions performed using various specific protocols and/or interfaces provided by either the management plane, the control plane, or both the management and control planes. Reports of network activity, status and/or faults for a requesting application program may be tailored to the requesting program's view of the network, and passed directly and exclusively to the requesting program.
摘要:
A method and apparatus for securing an optical communication link includes the step of identifying a profile of the link by measuring, at the transmitter, optical back-reflections from optical pulses forwarded to a receiver. The profile is stored at the transmitter. Periodically during operation, such as during key exchange, more optical pulses are forwarded to the receiver, and the back reflections are collected as periodic profiles. The periodic profiles are compared against the stored profiles. Eavesdroppers, such as those who cut the fiber, tap the fiber, or implement a man in the middle attack, may be easily identified because the losses caused by their interference with the fiber will be evident in the periodic profiles.
摘要:
Application program network service requests are translated into specific actions that are then performed through the management plane and/or control plane. The translations and resulting actions are responsive to previously defined policies for the communication network, and may further reflect processing of previous service requests by the same or another application program. The amount of resources available for use by a given application program may be predefined based on a globally defined network policy. Each service request obtained from an application program may be translated into multiple actions performed using various specific protocols and/or interfaces provided by either the management plane, the control plane, or both the management and control planes. Reports of network activity, status and/or faults for a requesting application program may be tailored to the requesting program's view of the network, and passed directly and exclusively to the requesting program.
摘要:
Application program network service requests are translated into specific actions that are then performed through the management plane and/or control plane. The translations and resulting actions are responsive to previously defined policies for the communication network, and may further reflect processing of previous service requests by the same or another application program. The amount of resources available for use by a given application program may be predefined based on a globally defined network policy. Each service request obtained from an application program may be translated into multiple actions performed using various specific protocols and/or interfaces provided by either the management plane, the control plane, or both the management and control planes. Reports of network activity, status and/or faults for a requesting application program may be tailored to the requesting program's view of the network, and passed directly and exclusively to the requesting program.
摘要:
A method and apparatus for securing an optical communication link includes the step of identifying a profile of the link by measuring, at the transmitter, optical back-reflections from optical pulses forwarded to a receiver. The profile is stored at the transmitter. Periodically during operation, such as during key exchange, more optical pulses are forwarded to the receiver, and the back reflections are collected as periodic profiles. The periodic profiles are compared against the stored profiles. Eavesdroppers, such as those who cut the fiber, tap the fiber, or implement a man in the middle attack, may be easily identified because the losses caused by their interference with the fiber will be evident in the periodic profiles.