摘要:
Aspects of a method and system for packetizing data for servicing traffic end-to-end are provided. In this regard, a networking subsystem may receive, from an application, one or more values of one or more parameters associated with data generated by the application. The networking subsystem may packetize the data into one or more packets. The networking subsystem may translate the received one or more values into one or more corresponding OSI layer 2 tags. The networking subsystem may tag the one or more packets with the corresponding OSI layer 2 tags and transmit the tagged packet(s) to one or more link partners. The link partners may thus process and forward the tagged packet(s) by inspecting only OSI layer 2 information of the tagged packet(s). The one or more corresponding OSI layer 2 tags may indicate, for example, quality of service required by, and/or protocols associated with, the data.
摘要:
Aspects of a method and system for predictive leasing of network services and applications based on a usage pattern may comprise a management entity that coordinates operation of one or more endpoint devices. A user profile associated with the one or more endpoint devices may be received by the management entity, wherein the management entity may utilize the user profile associated with the one or more endpoint devices and a usage pattern associated with the one or more endpoint devices to determine leasing information for the one or more endpoint devices. The management entity may be operable to communicate the determined leasing information to the one or more endpoint devices. The leasing information may comprise leasing services and/or applications to the one or more endpoint devices.
摘要:
Aspects of a method and system for predictive leasing of network services and applications based on a usage pattern may comprise a management entity that coordinates operation of one or more endpoint devices. A user profile associated with the one or more endpoint devices may be received by the management entity, wherein the management entity may utilize the user profile associated with the one or more endpoint devices and a usage pattern associated with the one or more endpoint devices to determine leasing information for the one or more endpoint devices. The management entity may be operable to communicate the determined leasing information to the one or more endpoint devices. The leasing information may comprise leasing services and/or applications to the one or more endpoint devices.
摘要:
Aspects of a method and system for predictive leasing of network services and applications based on a usage pattern may comprise a management entity that coordinates operation of one or more endpoint devices. A user profile associated with the one or more endpoint devices may be received by the management entity, wherein the management entity may utilize the user profile associated with the one or more endpoint devices and a usage pattern associated with the one or more endpoint devices to determine leasing information for the one or more endpoint devices. The management entity may be operable to communicate the determined leasing information to the one or more endpoint devices. The leasing information may comprise leasing services and/or applications to the one or more endpoint devices.
摘要:
Aspects of a method and system for traffic management via virtual machine migration include detecting an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources. Responsive to the detection of the abnormal pattern, a second virtual machine that utilizes a second set of network resources may be initialized. The second virtual machine may take over functions performed by the first virtual machine and initialization of the second virtual machine is based on an analysis of the traffic. The second virtual machine may be initialized utilizing stored virtual machine state information in instances that the abnormal traffic is a result of a malicious attack. The second virtual machine may be initialized utilizing current virtual machine state information in instances that the abnormal traffic is not a result of a malicious attack.
摘要:
Aspects of a method and system for determining and controlling user experience in a network may comprise a management entity that coordinates operation of one or more endpoint devices. One or more parameters associated with a content type may be received from the one or more endpoint devices by the management entity. The management entity may utilize the received one or more parameters associated with the content type to determine configuration information for the one or more endpoint devices. The content type may specify a type of media content that is handled by the one or more endpoint devices.
摘要:
In various embodiments of a method and system for utilizing native Ethernet as a virtual memory interconnect, a first networking device may be operable to transcode a memory read command and/or a memory write command to memory access information and encapsulate the memory access information within in one or more fields of an Ethernet frame. The memory access information may be communicated over an Ethernet link to a second networking device where it may be utilized to access memory that is associated with the memory read command and/or the memory write command. For example, the memory access information may indicate an address of the memory to be accessed, whether a read operation and/or a write operation is to be performed, whether the frame comprises data to be written to the memory, and/or whether a locally administered address space is utilized.
摘要:
Network Interface Controller (NIC) logic may receive a packet comprising a routing parameter indicating a service or cost to be utilized in processing the packet. The NIC logic may determine a selected virtual machine (VM) running on a network device to process the packet according to the routing parameter. The NIC logic may communicate the packet across a network after the packet has been processed by the selected virtual VM. Or, the NIC logic may initialize a VM in the network device to process the packet according to the routing parameter. The NIC logic may receive multiple packets and determine a second selected VM or initialize a second VM to process the multiple packets according to the respective routing parameters of the multiple packets. The routing parameters may indicate device capabilities, service class, quality measurements, latency, power usage or any combination thereof.
摘要:
Communication devices may determine routes and/or may select a route for communicating data between a first communication device and a second communication device. The selected route may require the least power consumption. The determined routes may be ranked based on an amount of power required for routing the data. The data may be routed among devices based on the ranking. Power consumption of a device may be determined based on a bandwidth associated with the device. Route selection may be based on availability of power for power sources of the communication devices. The selection of routes may be based on a current power consumption and/or a history of prior power consumption of the communication devices. The selection of a route which may require least power consumption may be optimized based on the availability of bandwidth.
摘要:
Aspects of a method and system for network resource allocation based on a usage pattern may comprise a management entity that coordinates operation of one or more endpoint devices. The management entity may be operable to receive a usage pattern associated with each of the one or more endpoint devices. The management entity may be operable to determine resource allocation information for each of the one or more endpoint devices based on the received usage pattern associated with each of the one or more endpoint devices.