Patent classifications
H04L69/40
CONNECTION METHOD AND APPARATUS, ELECTRONIC DEVICE, STORAGE MEDIUM AND PROGRAM PRODUCT
The present disclosure provides a connection method, an electronic device, and a storage medium, which relate to the technical field of artificial intelligence and, in particular, to the technical fields of internet of vehicles and intelligent transportation. The method includes: when it is determined that a connection between a terminal and a vehicle fails, obtaining identification information of the vehicle and log information of the terminal; sending the identification information and the log information to a server, and receiving at least one connection solution that is issued by the server and matches the identification information and the log information; and controlling, according to the at least one connection solution, the terminal to connect with the vehicle.
PROXY CONFIGURED TO DYNAMICALLY FAILOVER AUTHENTICATION TRAFFIC TO A BACKUP AUTHENTICATION SYSTEM
Techniques are described herein that are capable of dynamically failing over authentication traffic to a backup authentication system by a proxy system. An authentication request, which requests authentication of a principal, is received at the proxy system. The authentication request is directed to a primary authentication system. A determination is made, by the proxy system, that the primary authentication system is incapable of providing a valid response to the authentication request. The backup authentication system is caused, by the proxy system, to authenticate the principal using an authentication package received from the primary authentication system by dynamically routing the authentication request to the backup authentication system as a result of the primary authentication system being incapable of providing a valid response to the authentication request.
Automatic recovery from duplicate network addresses
A network device in a network may determine a tentative network address for a network interface of the network device and may determine whether the tentative network address is duplicative of any one of the network addresses in the network. If the tentative network address is duplicative of a network address assigned to another network interface in the network, the network device may store an indication of the other network interface. In response to receiving an indication that a new network address is assigned to the other network interface, the network device may re-determine whether the tentative network address is duplicative of any one of the network addresses in the network. If the network device determines that the tentative network address is not duplicative of any one of the plurality of network addresses in the network, the network device may assign the tentative network address to the network interface.
Hybrid cluster recovery techniques
At a recovery manager associated with a cluster, a determination is made as to whether a replacement for a first node of the cluster can be elected by the other nodes of the cluster using a first election protocol. The recovery manager selects a second node of the cluster as a replacement for the first node, based on data item replication progress made at the node, and transmits an indication that the second node has been selected to one or more nodes of the cluster.
READ ACCESS FOR COMPUTATIONAL RESULTS OF A DISTRIBUTED NETWORK
According to an embodiment of a first aspect of the invention, there is provided a distributed network comprising a plurality of nodes. Each of the plurality of nodes is configured to run one or more computational units comprising its own unit state. The network is configured to individually execute, by an execution subset of the plurality of nodes, s set of execution messages in a deterministic manner, thereby mutating the unit states of one or more of the computational units of the execution subset. The network is further configured to regularly make, by the nodes of the execution subset, a read snapshot of the unit states of the one or more computational units of the execution subset and to provide, by one or more nodes of the execution subset, user access to the read snapshot.
Further aspects of the invention relate to a corresponding computer-implemented method, a node, a computer program product and a software architecture.
METHOD AND APPARATUS FOR PROVIDING EDGE COMPUTING SERVICE IN WIRELESS COMMUNICATION SYSTEM
The disclosure relates to a communication scheme for converging a 5.sup.th generation (5G) system for supporting a higher data rate after a 4.sup.th generation (4G) system with Internet of things (IoT) technology, and a system thereof. A wireless communication system, and more particularly, an application layer network structure for providing an edge computing device in a cellular wireless communication system (a 5G system), and a method thereof are provided. An edge enabler server (EES) receives a first message including information about one or more edge application servers (EASs) from an EAS management system, and transmits a second message for requesting instantiation for at least one EAS among the one or more EASs to the EAS management system, based on the information about the one or more EASs included in the first message. The information about the one or more EASs includes at least one of information about an identifier (ID) of each of the one or more EASs, information indicating whether each of the one or more EASs supports instantiation, or instantiation type information for each of the one or more EASs.
APPARATUS AND METHODS FOR DYNAMIC SCALING AND ORCHESTRATION
Apparatus and methods to dynamically scale and orchestrate services over a network are provided. The apparatus and methods may include two or more computers forming a network cluster. Each computer may have an agent and user service. One or more computers may include a gateway service, authorization service, a pool of network services, and a director service. A user may request access to a network service, and the gateway and director services may grant access to the network service or create a new instance of the network service on any computer in the cluster and then grant access to the network service to the user.
Method and apparatus for failover in a video surveillance system
Implementations of the present disclosure provide a method and apparatus for failover in a video surveillance system. The video surveillance system includes a plurality of cameras hosted by a plurality of machines. At a first machine, a message indicating that a second machine has failure is received, the first machine and the second machine hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; available resources of the first machine and loads of the first and second machines are determined; based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras are configured, to enable the second set of cameras to be taken over by the first machine.
Method and apparatus for failover in a video surveillance system
Implementations of the present disclosure provide a method and apparatus for failover in a video surveillance system. The video surveillance system includes a plurality of cameras hosted by a plurality of machines. At a first machine, a message indicating that a second machine has failure is received, the first machine and the second machine hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; available resources of the first machine and loads of the first and second machines are determined; based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras are configured, to enable the second set of cameras to be taken over by the first machine.
System and method for URL fetching retry mechanism
A method for overcoming intermittent, temporary, or other fetching failures by using multiple attempts for retrieving a content from a web server to a client device is disclosed. The URL fetching may use direct or non-direct fetching schemes, or a combination thereof. The non-direct fetching method may use intermediate devices, such as proxy server, Data-Center proxy server, tunnel devices, or any combination thereof. Upon sensing a failure of a fetching action, the action is repeated using the same or different parameters or attributes, such as by using different intermediate devices, selected based on different parameters or attributes, such as different countries. The repetitions are limited to a pre-defined maximum number or attempts. The fetching attempts may be performed by the client device, by an intermediate device in a non-direct fetching scheme, or a combination thereof. Various fetching schemes may be used sequentially until the content is retrieved.