Abstract:
A system and method is provided for sending congestion notification messages through L3 networks and implementation of QCN in L3 switches. For example, according to this system and method, an L3 switch receives one or more data packets, and determines, based on the received one or more data packets, whether the L3 switch is congested. If the L3 switch is congested, it generates a congestion notification message, the congestion notification message including an Internet Protocol (IP) header, the IP header identifying a source of the one or more received data packets as its destination. The L3 switch sends the congestion notification message to the source of the one or more received data packets using information in the IP header.
Abstract:
A computer-implemented method and system of quarantining user location information receives from a user device user location information that includes personally identifiable user data and user position data associated with one or more geographic positions of the user. The user location information is temporarily stored in a quarantine data storage database for a predetermined quarantine time, during such time it can be used for various analysis. After the quarantine time, personally identifiable user data of the user location information is filtered out before the user position data is sent for long-term storage to a filtered data storage system.
Abstract:
A system and method is provided for sending congestion notification messages through L3 networks. For example, a data packet is received at a first switch in a first fabric block of an L3 network, and the first switch performs source MAC tagging of the data packet. The data packet is then forwarded to a second switch in a second fabric block of the L3 network, and the source MAC tag is maintained by the second switch and any intermediate switches. The second switch determines, in response to receiving the data packet, whether it is congested, and generates a notification message if it is congested. The notification message is L2 forwarded to the first fabric block, and further forwarded from the first switch to a source of the data packet using ACL matching.
Abstract:
A system and method is provided for sending congestion notification messages through L3 networks. For example, a data packet is received at a first switch in a first fabric block of an L3 network, and the first switch performs source MAC tagging of the data packet. The data packet is then forwarded to a second switch in a second fabric block of the L3 network, and the source MAC tag is maintained by the second switch and any intermediate switches. The second switch determines, in response to receiving the data packet, whether it is congested, and generates a notification message if it is congested. The notification message is L2 forwarded to the first fabric block, and further forwarded from the first switch to a source of the data packet using ACL matching.
Abstract:
Methods, systems, and apparatus for content item distribution based on user interactions. In one aspect, a method includes identifying a set of conversion events associated with a content item provider, each conversion event having a corresponding device identifier; identifying, for each conversion event, a number of pre-conversion interactions that i) occurred prior to the conversion event, and ii) are associated with a device identifier that corresponds to the conversion event; generating, for the content item provider, a conversion profile specifying a portion of the conversion events that are associated with different pre-conversion interaction values; and generating, based on the conversion profile, a bid profile specifying different bid values for different pre-conversion interaction values, a difference between the different bid values being based on a difference between the portion of the conversion events that are associated with the different pre-conversion interaction values corresponding to the different bid values.
Abstract:
A router residing in a network comprises at least one ingress port, at least one egress port, and a processor programmed to compare at least two label switch paths, determine potential conflicts between the at least two label switch paths based on the ingress ports and egress ports utilized by the label switch paths, and determine a selected identifier to be assigned relative to each label switch path. The processor is configured to assign a common identifier if no conflict exists. A storage medium is operatively coupled to the processor for storing the selected identifiers related to the label switch paths. The processor may be configured to determine that a conflict exists between two label switch paths if they utilize the same ingress port on the router and different egress ports on the router.
Abstract:
Location modeling may be generated for candidate locations based on validated location data. The location models for candidate locations may be based on validated location data associated with wireless access points that is validated using transaction data. Such validation may include comparing an identifier associated with candidate location data received from a client device to an identifier for a transaction account associated with a transaction from transaction data at a candidate location. Matching transaction data and candidate location data may generate validated location data to be used in generating location models for candidate locations.
Abstract:
Methods, systems, and apparatus for content item distribution based on user interactions. In one aspect, a method includes identifying a set of conversion events associated with a content item provider, each conversion event having a corresponding device identifier; identifying, for each conversion event, a number of pre-conversion interactions that i) occurred prior to the conversion event, and ii) are associated with a device identifier that corresponds to the conversion event; generating, for the content item provider, a conversion profile specifying a portion of the conversion events that are associated with different pre-conversion interaction values; and generating, based on the conversion profile, a bid profile specifying different bid values for different pre-conversion interaction values, a difference between the different bid values being based on a difference between the portion of the conversion events that are associated with the different pre-conversion interaction values corresponding to the different bid values.
Abstract:
Overlapping flow rules are included in a ternary content addressable memory (TCAM), while still enabling a hardware counter to increment each of the overlapping rules when a packet matching each of the overlapping rules is transmitted through the TCAM. In a given set of flow specifications, a first flow specification is identified that overlaps with a second flow specification. Rules are determined corresponding to the first flow specification, the second flow specification, and an intersection of the first and second flow specifications. Priorities are assigned to each of the rules, wherein the rule corresponding to the intersection is assigned a higher priority than the rules corresponding to the first and second flow specifications. Such rules are stored in the TCAM.
Abstract:
A computer-implemented method that includes receiving a location from a location aware access device and an IP address of a network device to which the location aware access device is connected, receiving a request that includes the IP address of the network device from a location unaware access device that is connected to the network device, determining a geographic location for the location unaware access device based on the IP address of the network device and the location received from the location aware access device, selecting information responsive to the request from the location unaware access device based at least in part on the geographic location, and providing the selected information to the location unaware access device.