摘要:
An electronic device has a plurality of environments including respective communication stacks. The environments correspond to respective different user personas. Data associated with the different user personas are communicated in corresponding separate transport flows over the network.
摘要:
An electronic device has a plurality of environments including respective communication stacks. The environments correspond to respective different user personas. Data associated with the different user personas are communicated in corresponding separate transport flows over the network.
摘要:
A system, method, and non-transitory computer readable medium for virtualizing battery in a personal mobile device or across a group of personal mobile devices controlled by a user are provided. The user specifies a set of power management policies for applications running in the personal mobile device(s). Battery usage per application is monitored and resources for the applications are scheduled based on the monitored battery usage and the power management policies.
摘要:
A system, method, and non-transitory computer readable medium for virtualizing battery in a personal mobile device or across a group of personal mobile devices controlled by a user are provided. The user specifies a set of power management policies for applications running in the personal mobile device(s). Battery usage per application is monitored and resources for the applications are scheduled based on the monitored battery usage and the power management policies.
摘要:
According to an example, a method for bandwidth guarantee and work conservation includes determining virtual machine (VM) bandwidth guarantees assigned to VMs in a network including a source VM that communicates with destination VMs. The method further includes assigning minimum bandwidth guarantees to communications between the source VM with the destination VMs by dividing a VM bandwidth guarantee assigned to the source VM between the destination VMs based on active VM-to-VM communications between the source VM and the destination VMs. The method also includes allocating, by a processor, spare bandwidth capacity in the network to a communication between the source VM and a destination VM based on the assigned minimum bandwidth guarantees.
摘要:
Services are provided via a multicast tree. A request to receive a service is received at a node. Stored information at the node is searched to identify a service path or a service node operable to provide the requested service.
摘要:
As an example, a system and method is provided for allocating network bandwidth. The method includes identifying congested and uncongested links using a tenant demand for each link and a tenant bandwidth cap. A portion of the tenant bandwidth cap may be allocated to each uncongested link based on the tenant demand on the uncongested link and the tenant bandwidth cap. Additionally, the remainder of the tenant bandwidth cap may be allocated to the tenants congested links based on a link capacity.
摘要:
Systems, methods, and computer-readable executable instructions are provided for implementing an energy proportional network architecture. Implementing an energy proportional network architecture can include determining a number of desired network criteria and a desired number of access ports. A number of switches for the energy proportional network architecture can be calculated from the desired number of access ports and the number of desired network criteria. Implementing an energy proportional network architecture can also include using the number of calculated switches to form the energy proportional network.
摘要:
The present teachings provide for a method and system for facilitating content download to one or more remote devices via an insecure communication channel. The method comprises the steps of receiving at least one shared secret from a device via an insecure communications channel, each shared secret encoded and functioning as an identifier for the device, transmitting an encrypted file, from a file server, to the device associated with the encoded shared secret, receiving the shared secret in a plaintext forma via a secure communications channel, receiving a confirmation authorizing the release of a decryption key, and sending a decryption key corresponding to the transmitted file, for which the authorization for the release of the decryption key has been received. The decryption key is encrypted using the shared secret if transmission is via the insecure channel.
摘要:
A heterogeneous network switch system includes heterogeneous network switches having a first network switch having a first functionality and a second network switch having a second functionality, where the first functionality differs from the second functionality. In addition, the first network switch and the second network switch are configured to forward data to at least one common server. The system also includes a controller configured to receive data from at least one client and to select one of the first network switch and the second network switch to employ in forwarding the data from the at least one client to the at least one common network equipment.