Abstract:
A method for supporting service level agreement monitoring in a software defined network, wherein said software defined network comprises forwarding elements and a software defined network controller for controlling the forwarding elements, wherein data flows are transmitted between a first end-path forwarding element and a second end-path forwarding element via at least one intermediate forwarding element, wherein said software defined network controller configures the intermediate forwarding element such that a probe triggering packet is generated based on local information of the intermediate forwarding element, wherein said software defined network controller configures at least one of the end-path forwarding elements such that an end-to-end probing is triggered based on receiving said probe triggering packet, and wherein said end-to-end probing is performed in order to detect a service level agreement violation. Furthermore, a corresponding software defined network and a corresponding forwarding element is disclosed.
Abstract:
Die Erfindung betrifft ein Verfahren zum Erzeugen eines Fehlerberichts über einen elektrischen Stromrichter, der eine Vielzahl von gleichartigen Modulen (1_1, 1_2, 1_3) aufweist, welche jeweils mindestens zwei elektronische Schaltelemente (202, 206) und einen elektrischen Energiespeicher (210) aufweist. Bei dem Verfahren sendet eine Steuereinrichtung (35) eine erste Nachricht (425) an eines der Module (1_1) ab, die erste Nachricht (425) wird über eine dem Modul (1_1) zugeordnete Kommunikationsverbindung (37) zu dem Modul (1_1) übertragen. Weiterhin sendet das Modul (1_1) eine zweite Nachricht (430) an die Steuereinrichtung (35). Die bei dem Modul (1_1) empfangene erste Nachricht (425) wird daraufhin überprüft (502), ob sie sich von der abgesendeten ersten Nachricht unterscheidet, und das Auftreten eines Fehlers wird erkannt, wenn sich die empfangene erste Nachricht (425) von der abgesendeten ersten Nachricht unterscheidet. Bei Erkennen eines Fehlers werden Informationen (435) über diesen Fehler in einer Überwachungseinrichtung (410) gespeichert (508) und ein Fehlerbericht (445) erzeugt.
Abstract:
Technologies for enforcing virtual machine network access control include a network computing device that includes a plurality of virtual machines. The network computing device is configured to receive an access request from a virtual function assigned to a requesting virtual machine of the network computing device. The network computing device is additionally configured to determine a first privilege level assigned to the requesting machine and a second privilege level assigned to the destination virtual machine, and determine whether the requesting virtual machine is authorized to access the destination virtual machine based on a comparison of the first and second privilege levels. Upon determining the requesting virtual machine is authorized to access the destination virtual machine, the network computing device is additionally configured to allow the requesting virtual machine access to the destination virtual machine. Other embodiments are described herein.
Abstract:
The method comprising establishing between a software communication application (102) running and a computer server (110) through a network, a communication protocol that allows the software communication application (102) to estimate quality conditions of said network by computing one or more network quality parameters, wherein said communication protocol being an iterative process in which an exchange of UDP packets is executed between the software communication application (102) and the computer server (110) a plurality of times; and implementing a routing protocol, by the software communication application (102), by comparing the computed network quality parameters with predefined quality thresholds, to select to receive an incoming call or to carry out an outgoing call either through a VoIP or through a circuit switched connection.
Abstract:
A two-wire process variable transmitter (12) for use in an industrial process (10) includes a process variable sensor (14) configured to sense a process variable of a process fluid of the industrial process (10). Output circuitry (36) provides an output on a two-wire process control loop (18) which is related to the sensed process variable. Terminal voltage measurement circuitry measures (92) a voltage at terminals (40) of the process variable transmitter (12). The terminal voltage is a voltage measured across an electrical connection (40) of the two-wire process variable transmitter (12) to the two-wire process control loop (18). A microprocessor (30) performs loop diagnostics on the two-wire process control loop (18) based upon a loop current and the measured terminal voltage. The microprocessor (30) determines coefficients of a polynomial equation which relates loop current and terminal voltage during normal operation of the two-wire process variable transmitter (12) and performs subsequent diagnostics based upon the coefficients of the polynomial.
Abstract:
Embodiments concern indication of extent of out-of-sequencing for multi-connectivity. While receiving control plane or user plane packets from multi-connectivity legs, a specific user-plane packet may be determined to be an out-of-sequence packet if the packet is received too early or too late. The receiver may keep a per-leg counter of number of out-of-sequence packets and a total count of packet received. An indication message may be sent to indicate multi-connectivity legs which are generating early or late packets. The sender then may adjust its data flow partitioning policy across multi-connectivity legs until the percentage or fraction of out-of-sequence packets is below a desired threshold.
Abstract:
A method and a system for sending alert messages are provided. The method includes accessing location information of a plurality of user mobile devices in a mobile network from a database. The method further includes accessing a message handling capacity information of each of a plurality of network elements in the mobile network. Furthermore, the method includes sending, through the plurality of network elements, an alert message to the plurality of user mobile devices based on the location information. Moreover, sending the alert message through a network element of the plurality of network elements includes at least controlling a sending rate of the alert message through to the network element based on a message handling capacity information of the network element and a real-time delivery status information of the alert message that are already sent through the network element.
Abstract:
Methods and apparatus for monitoring errors during idle times in high-speed links including a Physical Coding Sublayer (PCS). A denominator counter is implemented in a receive state machine of a PCS to count control blocks primarily consisting of idle control blocks or to count idle characters. An error counter is also implemented in the receive state machine to count errors while in an idle state. While operating the link in idle states, the counts of the denominator counter and error counter are used as inputs to various Bit Error Rate (BER) functions to estimate a BER of the PCS during idle times. The method and apparatus may be implemented in various high-speed link including Ethernet links.
Abstract:
A controller implemented on computing equipment may control switches in a network. The controller may provide flow tables that implement network policies to the switches to control packet forwarding through the network. The controller may provide debug table entries to the switches for use in a debug table that is separate from the flow table. The debug table entries may match incoming network packets and increment corresponding counters on the switches. The controller may retrieve count information from the counters for performing debugging operations on the network. For example, the controller may identify conflicts between fields of a selected flow table entry, determine whether elephant packet flows are present between switches, determine whether desired load balancing is being performed, determine whether a network path has changed, determine whether packet loss has occurred, and/or determine whether network packets are taking undesired paths based on the retrieved count information.