摘要:
Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. By way of example, thread priority levels may be overlapped between the foreground and background states. In addition, system resource availability may be restricted based on whether a process is receiving user input. In some instances, an application may be suspended rather than being placed into the background state. Implementation of the disclosed services may be substantially transparent to the executing user applications and, in some cases, may be performed without the user application's explicit cooperation.
摘要:
Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. By way of example, thread priority levels may be overlapped between the foreground and background states. In addition, system resource availability may be restricted based on whether a process is receiving user input. In some instances, an application may be suspended rather than being placed into the background state. Implementation of the disclosed services may be substantially transparent to the executing user applications and, in some cases, may be performed without the user application's explicit cooperation.
摘要:
Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. By way of example, inactive network applications (e.g., VOIP applications) may be placed in a suspended state until a message is received targeting the application (e.g., an incoming phone call or a heartbeat needed message). The user application may be placed into the background state to respond to the message and then returned to the non-active state (e.g., if the message was a heartbeat needed) message or to the foreground state if appropriate (e.g., the user elects to answer the incoming call).
摘要:
Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. By way of example, inactive network applications (e.g., VOIP applications) may be placed in a suspended state until a message is received targeting the application (e.g., an incoming phone call or a heartbeat needed message). The user application may be placed into the background state to respond to the message and then returned to the non-active state (e.g., if the message was a heartbeat needed) message or to the foreground state if appropriate (e.g., the user elects to answer the incoming call).
摘要:
A method is described that involves associating an outbound packet with a first network interface and constructing a search key from an identifier of the first network interface and the outbound packet's destination address. The method further entails submitting the search key to a routing function where the routing function identifies the outbound packet's next hop address. The method also involves transmitting the outbound packet to a node identified by the next hop address from the first network interface.
摘要:
An improved tethering system is described in which a handheld device can be used by a user to reach the same network that the handheld device also provides access to for a tethering machine. Specifically, as described herein, a handheld device provides a tethering machine with access to a remote network (e.g., the Internet) through a wireless network that the handheld device is communicatively coupled to. Not only is the handheld device able to support multiple data flows between the tethering machine and the remote network, but also, the handheld device is capable of being used by a user to “surf” or otherwise access the same remote network that the handheld device provides the tethering machine with access to. For example, if the remote network is the Internet and the handheld device is a “smart phone”, a user who is holding the smart phone can access the Internet concurrently with one or more applications on the tethering machine that are also access the Internet. Moreover, the smart phone is also capable of concurrently supporting other networked services that the smart phone is designed to provide such as voicemail services, messaging services, and telephony (cell phone) services.
摘要:
A method is described that involves associating an outbound packet with a first network interface and constructing a search key from an identifier of the first network interface and the outbound packet's destination address. The method further entails submitting the search key to a routing function where the routing function identifies the outbound packet's next hop address. The method also involves transmitting the outbound packet to a node identified by the next hop address from the first network interface.
摘要:
Embodiments of the present invention are directed to a method and system for processing data to be transmitted in a transmission medium, including storing in memory a segment of data to be transmitted where the segment of data is larger than the largest size data packet allowed for transmission by the transmission medium. A socket layer batch processes the segment to produce an array of linked data blocks where each data block is smaller than the largest transmission size of the TCP layer. A TCP layer batch processes the array to add a first header to each block of the array of linked data blocks. An IP layer batch processes the array to add a second header to each block of the array of linked data blocks. The socket layer then identifies blocks of the array to a communication subsystem for individual packet communication over the transmission medium.
摘要:
A method for receiving network packets on a client device comprising: initially entering into a first mode of operation in which polling from a network layer to a driver layer is disabled, wherein in the first mode of operations data packets received by the driver layer are pushed up to the network layer; monitoring a load factor defining a current network load on the client device; and entering into a second mode of operation in which polling from the network layer to the driver layer is enabled, wherein when in the second mode of operation, the network layer polling the driver layer when it is ready to accept new packets from the driver layer.
摘要:
A method is described that entails assigning a source network address to an outbound packet, associating the outbound packet with a network service and identifying a first network interface associated with the network service. The method further entails inquiring into and confirming that the first network interface is associated with the source network address. The method further entails constructing a search key from an identifier of the first network interface and the outbound packet's destination address. The method further entails submitting the search key to a routing function, the routing function providing the outbound packet's next hop address. The method further entails transmitting the outbound packet to a node identified by the next hop address from the network interface.