摘要:
Provided are techniques for static load balancing. For each data path in a network adapter team, a load balancing value is computed. A maximum value of the computed load balancing values is determined. A data path with the maximum value is selected for use in routing data. Also provided are techniques for dynamic load balancing in which, when a load balancing share of a data path is less than an actual load balancing share, the load balancing share of the data path is adjusted. Furthermore, provided are techniques for failover processing in which a command is routed through a second network adapter in response to determining that the command may not be routed through a first network adaptor.
摘要:
Provided are techniques for static load balancing. For each data path in a network adapter team, a load balancing value is computed. A maximum value of the computed load balancing values is determined. A data path with the maximum value is selected for use in routing data. Also provided are techniques for dynamic load balancing. An actual load balancing share is computed for each data path in a network adapter team. For each data path, it is determined whether a load balancing share for the data path is less than the actual load balancing share for the data path and when the load balancing share is less than the actual load balancing share, the load balancing share of the data path is adjusted. Furthermore, provided are techniques for failover processing. It is determined whether a command may be routed through a first network adapter. The command is routed through the first network adapter in response to determining that the command may be routed through the first network adapter. The command is routed through a second network adapter in response to determining that the command may not be routed through the first network adapter.
摘要:
A command is received, at a network storage driver, from an operating system storage stack, wherein the command is for communication with a target storage device over a connection across a network. The command is selectively executed, a plurality of times over the connection, for communicating with the target storage device, in response to a determination that the command failed to successfully communicate with the target storage device within a threshold period of time.
摘要:
A network storage driver requests a connection from an offload application, wherein the offload application interfaces with a first network stack implemented in an operating system and a second network stack implemented in a hardware device. The connection is received from the offload application, wherein the received connection is an offloaded connection and is reserved for the network storage driver. Data is communicated over the offloaded connection through the hardware device.
摘要:
A command is received, at a network storage driver, from an operating system storage stack, wherein the command is for communication with a target storage device over a connection across a network. The command is selectively executed, a plurality of times over the connection, for communicating with the target storage device, in response to a determination that the command failed to successfully communicate with the target storage device within a threshold period of time.
摘要:
Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client. A capability proxy of the client intercepts an authentication challenge response and retrieves one or more security assertions from a secure environment of the client computing device. The capability proxy may be an embedded web server providing an HTTP interface to platform features of the client. The client sends a resource access token based on the security assertions to the identity provider. The identity provider verifies the resource access token and authenticates the client computing device based on the resource access token in addition to user authentication factors such as username and password. The identity provider sends an authentication response to the client, which forwards the authentication response to the application server. Other embodiments are described and claimed.
摘要:
One aspect of the invention relates to a method and embodiment for decoding a sequence of frames in a communication system having a predetermined decoding time constraint per frame. The first frame of a sequence of frames is decoded for a time period longer than the predetermined time constraint, and at least one other frame of the sequence of frames is decoded in a time period less than the predetermined time constraint. Thus, an average decoding time of all decoded frames is less than or equal to the predetermined time constraint.
摘要:
The inventive subject matter provides systems, methods, data structures, and software to compress and decompress a memory image such as an expansion read-only memory (ROM). Some embodiments include attaching a compressed memory image to a decompression shell to create a data structure that includes decompression instructions. Other embodiments include loading a memory image from a data structure by decompressing the memory image according to decompression instructions included in the data structure.