摘要:
The technology described herein includes receiving a global demand to process a workflow; determining if one or more virtual resources are available to process the workflow; in response to the one or more virtual resources being available to process the workflow, determining if the one or more virtual resources have available timeslots for a class of service of the workflow; and in response to the one or more virtual resources having available timeslots for the class of service of the workflow, selecting a starting timeslot and scheduling the workflow on a selected one or more of the one or more virtual resources, accepting the workflow, and sending one or more local demands corresponding to the workflow to one or more local resource managers managing the selected one or more of the one or more virtual resources.
摘要:
Techniques for improving the performance of flow control mechanisms such as Pause are provided. The techniques provide for maintaining a fair distribution of available bandwidth while also allowing for fewer packet drops, and maximizing link utilization, in a distributed system. For example, in one embodiment, techniques are provided for achieving a fair share allocation of an egress port's bandwidth across a plurality of ingress ports contending for the same egress port.
摘要:
A device includes a multistage filter and an elephant trap. The multistage filter has hash functions and an array. The multistage filter is operable to receive a packet associated with a candidate heavy network user and send the packet to the hash functions. The hash functions generate hash function output values corresponding to indices in the array. The elephant trap is connected to the multistage filter. The elephant trap includes a buffer and probabilistic sampling logic. The probabilistic sampling logic is operable to attempt to add information associated with the packet to the buffer a particular percentage of the time based in part on the result of the multistage filter lookup. The buffer is operable to hold information associated with the packet, counter information, and timestamp information.
摘要:
A method in one embodiment includes detecting an event for a transaction on an on-board unit (OBU) of a vehicle, where the event has a trigger associated with an agent. The method also includes determining whether the transaction is authorized, identifying network credentials in an identity profile that corresponds to the agent, providing network credentials to a transaction application corresponding to the transaction, and accessing a remote network using the network credentials. Certain embodiments include selecting the network credentials from a plurality of available network credentials corresponding to the agent. In more specific embodiments, the network credentials include one or more virtual subscriber identity modules (VSIMs) of a plurality of VSIMs provisioned on the OBU. In specific embodiments, the network credentials are mapped to a combination of two or more of the agent, the transaction application, and a predefined current location of the vehicle.
摘要:
In one embodiment, a device (e.g., a transmitter) determines a level of error protection of each bit position within symbols of a particular constellation map used for modulation-based communication, and also determines priority levels of application data bits to be placed into a communication frame. Application data bits may then be placed into symbols of the communication frame, where higher priority application data bits are placed into bit positions with greater or equal levels of protection than bit positions into which lower priority application data bits are placed. The communication frame may then be transmitted to one or more receivers with an indication of how to decode the placement of the application data bits within the symbols. In another embodiment, the particular constellation map may be dynamically selected from a plurality of available constellation maps, such as based on communication channel conditions and/or applications generating the data.
摘要:
In one embodiment, a device (e.g., a transmitter) determines a level of error protection of each bit position within symbols of a particular constellation map used for modulation-based communication, and also determines priority levels of application data bits to be placed into a communication frame. Application data bits may then be placed into symbols of the communication frame, where higher priority application data bits are placed into bit positions with greater or equal levels of protection than bit positions into which lower priority application data bits are placed. The communication frame may then be transmitted to one or more receivers with an indication of how to decode the placement of the application data bits within the symbols. In another embodiment, the particular constellation map may be dynamically selected from a plurality of available constellation maps, such as based on communication channel conditions and/or applications generating the data.
摘要:
A scalable method and apparatus that detects frequent and dispersed invariants is disclosed. More particularly, the application discloses a system that can simultaneously track frequency rates and dispersion criteria of unknown invariants. In other words, the application discloses an invariant detection system implemented in hardware (and/or software) that allows detection of invariants (e.g., byte sequences) that are highly prevalent (e.g., repeating with a high frequency) and dispersed (e.g., originating from many sources and destined to many destinations).
摘要:
In one embodiment, a router operating in a hierarchically routed computer network may receive collected data from one or more hierarchically lower devices in the network (e.g., hierarchically lower sensors or routers). The collected data may then be converted to aggregated metadata according to a dynamic schema, and the aggregated metadata is stored at the router. The aggregated metadata may also be transmitted to one or more hierarchically higher routers in the network. Queries may then be served by the router based on the aggregated metadata, accordingly.
摘要:
A method is provided in one example and can include receiving a source data stream, generating a base layer sub-stream from the source data stream, and generating an enhancement layer sub-stream from the source data stream. The method further includes communicating the base layer sub-stream to a client device using a first communication protocol, and communicating the enhancement layer sub-stream to the client device using a second communication protocol. In a particular example, the one-to-many communication protocol is a multicast communication protocol and the second communication protocol is a unicast communication protocol. In another example, the base layer sub-stream is sent to the client device via a first network connection and the enhancement layer sub-stream is sent to the client device via a second network connection.
摘要:
A statistical transition map is built based on mobile wireless device user mobility history data. This data is useful to assist various wireless local area network applications. Received signal strength and location trace information associated with movements of mobile wireless devices in a wireless network is collected. The received signal strength and location trace information is converted to a sequence of natural language pseudo-location word labels representing pseudo-locations of each mobile wireless device as each mobile wireless device moves about with respect to a plurality of wireless access point devices in the wireless network. A statistical transition map is generated for each mobile wireless device from the sequence of natural language pseudo-location word labels using a natural language model. A probability of a next pseudo-location for a particular mobile wireless device is computed based on its current location and its statistical transition map.