摘要:
A method and a system discover a wireless LAN network for a multi-mode handset in a power-efficient way. The method extends stand-by time for the cellular and wireless LAN multi-mode handset, taking advantage of that fact that the cellular interface demands less energy from the battery than the wireless LAN (WLAN)-based interface in such a handset. The method therefore uses the cellular interface as an always-on proxy for the wireless LAN interface to receive the initial packets of a communication session, and uses the initial packet or packets to activate the handset's interface with the wireless LAN.
摘要:
A method and a system discover a wireless LAN network for a multi-mode handset in a power-efficient way. The method extends stand-by time for the cellular and wireless LAN multi-mode handset, taking advantage of that fact that the cellular interface demands less energy from the battery than the wireless LAN (WLAN)-based interface in such a handset. The method therefore uses the cellular interface as an always-on proxy for the wireless LAN interface to receive the initial packets of a communication session, and uses the initial packet or packets to activate the handset's interface with the wireless LAN.
摘要:
A method and system for providing an adaptive IP handoff triggering system for a wireless communication system that consists of either the same or heterogeneous wireless access technologies. A mobile node is notified of at least one pre-trigger timing parameter by a current access network. At least one variable handoff threshold is constructed with the mobile node based on the at least one pre-trigger timing parameter. An IP handoff is then initiated to a candidate access network when pilot beacon signal strength of the mobile node reaches the variable handoff threshold.
摘要:
A system and method for memory failure recovery is disclosed. The method discloses the steps of maintaining a predetermined number of duplicate and primary processes; keeping the processes in synchronization; managing the processes so that a single process image is presented to an external environment; detecting a computer system exception which affects one of the processes; and terminating the affected process. The system discloses, a primary process memory space which hosts a primary process; a duplicate process memory space which hosts a duplicate process corresponding to the primary process; a synchronization buffer which keeps the duplicate process in synchronization with the primary process; a processor which generates an exception signal in response to detection of a memory failure condition which affects the primary process; and an operating system which receives the exception signal, terminates the affected primary process, and maintains a predetermined number of primary and duplicate processes.
摘要:
Method and apparatus for managing memory of a data processing system. In one embodiment, memory objects are allocated in response to memory allocation requests. Each object has an associated plurality of addresses. Type-identifier codes are respectively stored in association with the memory objects. Upon detection of a transient memory error at a memory address a recovery action is selected and performed based on the type-identifier code of the object that is associated with the erring memory address.
摘要:
A method for offloading execution load from a resource-constrained device to allow the device to run a resource intensive software program. A program is accessed using a first device and determines whether execution of the program will exceed resources of the first device. If the execution will exceed the resources of the first device, a load split is determined to split the program into a first portion and a second portion. The second portion of the program is offloaded to a second device, while the first portion of the program is retained on the first device. The first portion and second portion communicate via a network connection. Full program functionality is provided using the first device, wherein the functionality is provided by the first portion and second portion executing respectively on the first device and the second device.
摘要:
The present invention provides a tunnel-based IP handoff process that can minimize the handoff latency associated with the standard Mobile IP registration. In the present invention, when neighboring nodes are detected, these detected nodes are identified as candidate nodes. Detection of just the existence of neighboring nodes should be possible even in situations where these neighboring nodes use different access technologies. For instance, pilot beacon signals may be taken as indication of the existence of candidate nodes although it may be impossible to compare them quantitatively if the beacon signals emanate from different access technologies. As soon as candidate nodes are identified, tunnels are established between the source node and the candidate nodes. The tunnels are used to forward data to the mobile node after a communication link between the mobile node and the source node goes down. As soon as the mobile node enters one of the neighboring networks and identifies a target node, the tunnels are torn down except the tunnel for the target node.
摘要:
A network system includes a network edge point configured to provide a terminal with access to a network. The network edge point includes a security policy associated with the terminal, and controls communications between the network and the terminal according to the security policy. The security policy may include a personal filter downloaded from the terminal, a service filter downloaded from a service policy server, and/or a domain filter downloaded from a domain policy server. The terminal may access the network through a second network edge point. The second network edge point may download one or more of the filters from the first network edge point, and control communications between the network and the terminal according to the security policy.
摘要:
Method and apparatus for extending functionality of a first set of classes and methods in an application hosted by a computing arrangement. A mapping is established that maps original class names in the first set to corresponding substitute class names of classes in a second set. The classes in the second set change the functionality of the classes in the first set. In response to loading a class file of a class in the first set, the original class names are replaced with corresponding substitute class names in the class file. Classes referenced by the substitute class names are then instantiated in lieu of classes referenced by the original class names.