摘要:
In embodiments of extensions for USB driver interface functions, a set of USB driver interfaces are exposed by a USB core driver stack, and the USB driver interfaces include USB driver interface functions to interface with USB client function drivers that correspond to client USB devices. A composite device driver registers itself and requests a function handle for each function of a client USB device. The USB client function drivers are enumerated and the function handles generated for each function of the client USB device. A check first protocol is enforced that directs a USB client function driver to check for availability of a USB driver interface function before interfacing with the USB core driver stack via the USB driver interfaces. A contract version identifier is received that indicates a set of operation rules by which a USB client function driver interfaces with the USB core driver stack.
摘要:
In embodiments of extensions for USB driver interface functions, a set of USB driver interfaces are exposed by a USB core driver stack, and the USB driver interfaces include USB driver interface functions to interface with USB client function drivers that correspond to client USB devices. A composite device driver registers itself and requests a function handle for each function of a client USB device. The USB client function drivers are enumerated and the function handles generated for each function of the client USB device. A check first protocol is enforced that directs a USB client function driver to check for availability of a USB driver interface function before interfacing with the USB core driver stack via the USB driver interfaces. A contract version identifier is received that indicates a set of operation rules by which a USB client function driver interfaces with the USB core driver stack.
摘要:
Extensions for USB driver interface functions are described. In embodiments, input/output of computer instructions and data exchange is managed in a USB core driver stack. A set of USB driver interfaces are exposed by the USB core driver stack, and the USB driver interfaces include USB driver interface functions that interface with USB client function drivers that correspond to client USB devices. Extensions for the USB driver interface functions are also exposed by the USB core driver stack to interface with the USB client function drivers.
摘要:
Extensions for USB driver interface functions are described. In embodiments, input/output of computer instructions and data exchange is managed in a USB core driver stack. A set of USB driver interfaces are exposed by the USB core driver stack, and the USB driver interfaces include USB driver interface functions that interface with USB client function drivers that correspond to client USB devices. Extensions for the USB driver interface functions are also exposed by the USB core driver stack to interface with the USB client function drivers.
摘要:
Techniques for detecting presence of a remote device at Layer 2 in response to an indication of an attempt to use the device and without maintaining a Layer 3 connection to the device. The techniques allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection to the remote device to provide services to a user. The Layer 3 connection and underlying Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated when the Layer 3 connection is not actively used. Once use of the remote device is desired, its presence may be detected using a Layer 2 device discovery mechanism and the Layer 2 and Layer 3 connections to the device may be reestablished. Services provided at Layer 3, such as steaming data, may then be performed over the reestablished Layer 3 connection.
摘要翻译:响应于尝试使用设备的指示并且不维持到设备的第3层连接的用于在第2层检测远程设备的存在的技术。 这些技术可以降低功耗,而不会影响设备的可用性。 与远程无线设备配对的设备可以建立到远程设备的第3层连接以向用户提供服务。 当层3连接未被主动使用时,可以终止第3层连接和底层的第2层连接(例如,WI-FI,WI-FI DIRECT TM或BLUETOOTH)。 一旦需要远程设备的使用,可以使用第2层设备发现机制检测其存在,并且可以重新建立到设备的第2层和第3层连接。 然后可以通过重新建立的第3层连接来执行第3层提供的服务,例如蒸汽数据。
摘要:
Wireless devices that support bootstrapping of a peer-to-peer connection. The wireless devices may use an infrastructure mode connection to exchange security information, such as a PIN, used in establishing the peer-to-peer connection. This security information may be encrypted in accordance with a security protocol used by the access point and then may be applied in a security protocol used to establish a peer-to-peer connection. Such a bootstrapping capability supports operating scenarios in which devices that are communicating over an infrastructure network encounter an operation that requires transfer of large amounts of data and automatically transition to a peer-to-peer connection that provides better performance. With these techniques, a computing device may automatically connect to a display device and stream audio/video data to the display.
摘要:
Resource management architectures implemented in computer systems to manage resources are described. In one embodiment, a general architecture includes a resource manager and multiple resource providers that support one or more resource consumers such as a system component or application. Each provider is associated with a resource and acts as the manager for the resource when interfacing with the resource manager. The resource manager arbitrates access to the resources provided by the resource providers on behalf of the consumers. A policy manager sets various policies that are used by the resource manager to allocate resources. One policy is a priority-based policy that distinguishes among which applications and/or users have priority over others to use the resources. A resource consumer creates an “activity” at the resource manager and builds one or more “configurations” that describe various sets of preferred resources required to perform the activity. Each resource consumer can specify one or more configurations for each activity. If multiple configurations are specified, the resource consumer can rank them according to preference. This allows the resource consumers to be dynamically changed from one configuration to another as operating conditions change.
摘要:
Resource management architectures implemented in computer systems to manage resources are described. In one embodiment, a general architecture includes a resource manager and multiple resource providers that support one or s more resource consumers such as a system component or application. Each provider is associated with a resource and acts as the manager for the resource when interfacing with the resource manager. The resource manager arbitrates s access to the resources provided by the resource providers on behalf of the consumers. A policy manager sets various policies that are used by the resource manager to allocate resources. A resource consumer creates an “activity” at the resource manager and builds one or more “configurations” that describe various sets of preferred resources required to perform the activity. Each resource consumer can specify one or more configurations for each activity.
摘要:
A host process for use in a user-mode device driver architecture is provided by the subject invention. The architecture includes a reflector, a driver manager and the host process which hosts and isolates one or more user-mode device driver(s). The user-mode device driver runs in the user-mode (UM) environment and has access to various UM services. The reflector resides in “kernel memory” (e.g., memory/resource(s) available to operating system) while the driver manager, host process and user mode device driver(s) are located in user space (e.g., memory/resource(s) available to user application(s)). The host process can include a host runtime component and a framework component. The host runtime component is responsible for building a driver stack object, and, locating/loading object(s) of a framework component. The host runtime component further includes a message handler that facilitates communication with the reflector and routes information to components of the host process.
摘要:
Techniques for detecting presence of a remote device at Layer 2 in response to an indication of an attempt to use the device and without maintaining a Layer 3 connection to the device. The techniques allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection to the remote device to provide services to a user. The Layer 3 connection and underlying Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated when the Layer 3 connection is not actively used. Once use of the remote device is desired, its presence may be detected using a Layer 2 device discovery mechanism and the Layer 2 and Layer 3 connections to the device may be reestablished. Services provided at Layer 3, such as steaming data, may then be performed over the reestablished Layer 3 connection.
摘要翻译:响应于尝试使用设备的指示并且不维持到设备的第3层连接的用于在第2层检测远程设备的存在的技术。 这些技术可以降低功耗,而不会影响设备的可用性。 与远程无线设备配对的设备可以建立到远程设备的第3层连接以向用户提供服务。 当层3连接未被主动使用时,可以终止第3层连接和底层的第2层连接(例如,WI-FI,WI-FI DIRECT TM或BLUETOOTH)。 一旦需要远程设备的使用,可以使用第2层设备发现机制检测其存在,并且可以重新建立到设备的第2层和第3层连接。 然后可以通过重新建立的第3层连接来执行第3层提供的服务,例如蒸汽数据。