Network planning and optimization of equipment deployment
    8.
    发明授权
    Network planning and optimization of equipment deployment 有权
    网络规划和设备部署优化

    公开(公告)号:US09246704B2

    公开(公告)日:2016-01-26

    申请号:US13251625

    申请日:2011-10-03

    摘要: Embodiments of the present invention provide systems, devices and methods for improving the efficient deployment and configuration of networking equipment within a network build-out. In certain embodiments of the invention, an iterative analysis of inter-node equipment placement and connectivity, and inter- and intra-node traffic flow is performed to identify a preferred deployment solution. This analysis of deployment optimization takes into account both configurations from a network node perspective as well as from a network system perspective. Deployment solutions are iteratively progressed and analyzed to determine a preferred solution based on both the cost of deployment and satisfaction of the network demands. In various embodiments of the invention, a baseline marker is generated from which the accuracy of the solution may be approximated that suggests to an engineer whether the deployment is approaching an optimal solution.

    摘要翻译: 本发明的实施例提供用于改进网络建立中的网络设备的有效部署和配置的系统,设备和方法。 在本发明的某些实施例中,执行节点间设备布置和连接性以及节点间和业务流内流的迭代分析以识别优选的部署解决方案。 这种对部署优化的分析从网络节点的角度以及从网络系统的角度考虑了这两种配置。 部署解决方案被迭代地进行和分析,以基于部署的成本和网络需求的满足来确定优选的解决方案。 在本发明的各种实施例中,生成基线标记,从该基线标记可以近似解决方案的准确性,这向工程师建议部署是否接近最佳解决方案。

    NETWORK PLANNING AND OPTIMIZATION OF EQUIPMENT DEPLOYMENT
    9.
    发明申请
    NETWORK PLANNING AND OPTIMIZATION OF EQUIPMENT DEPLOYMENT 审中-公开
    网络规划与设备部署优化

    公开(公告)号:US20120020246A1

    公开(公告)日:2012-01-26

    申请号:US13251625

    申请日:2011-10-03

    IPC分类号: H04L12/28

    摘要: Embodiments of the present invention provide systems, devices and methods for improving the efficient deployment and configuration of networking equipment within a network build-out. In certain embodiments of the invention, an iterative analysis of inter-node equipment placement and connectivity, and inter- and intra-node traffic flow is performed to identify a preferred deployment solution. This analysis of deployment optimization takes into account both configurations from a network node perspective as well as from a network system perspective. Deployment solutions are iteratively progressed and analyzed to determine a preferred solution based on both the cost of deployment and satisfaction of the network demands. In various embodiments of the invention, a baseline marker is generated from which the accuracy of the solution may be approximated that suggests to an engineer whether the deployment is approaching an optimal solution.

    摘要翻译: 本发明的实施例提供用于改进网络建立中的网络设备的有效部署和配置的系统,设备和方法。 在本发明的某些实施例中,执行节点间设备布置和连接性以及节点间和业务流内流的迭代分析以识别优选的部署解决方案。 这种对部署优化的分析从网络节点的角度以及从网络系统的角度考虑了这两种配置。 部署解决方案被迭代地进行和分析,以基于部署的成本和网络需求的满足来确定优选的解决方案。 在本发明的各种实施例中,生成基线标记,从该基线标记可以近似解决方案的准确性,这向工程师建议部署是否接近最佳解决方案。

    CONTEXT AWARE DATA PROTECTION
    10.
    发明申请
    CONTEXT AWARE DATA PROTECTION 审中-公开
    背景知识数据保护

    公开(公告)号:US20120185952A1

    公开(公告)日:2012-07-19

    申请号:US13413636

    申请日:2012-03-06

    IPC分类号: G06F21/24

    CPC分类号: G06F21/6218

    摘要: A method, for context aware data protection is provided. Information about an access context is received in a data processing system. A resource affected by the access context is identified. The identification of the resource may include deriving knowledge about resource by making an inference from a portion of contents of the resource that the access context affects the resource, making an inference that the access context affects a second resource thereby inferring that the resource has to be modified, determining that the access context is relevant to the resource, or a combination thereof. The resource is received. A policy that is applicable to the access context is identified. A part of the resource to modify according to the policy is determined. The part is modified according to the policy and the access context to form a modified resource. The modified resource is transmitted.

    摘要翻译: 提供了一种用于上下文感知数据保护的方法。 在数据处理系统中接收关于访问上下文的信息。 识别受访问环境影响的资源。 资源的识别可以包括通过从访问上下文影响资源的资源的内容的一部分进行推断来导出关于资源的知识,从而推断访问上下文影响第二资源,从而推断资源必须是 修改,确定访问上下文与资源相关或其组合。 资源被收到。 确定适用于访问环境的策略。 确定根据策略修改的资源的一部分。 该部分根据策略和访问上下文进行修改,形成修改后的资源。 传输修改后的资源。