Patent classifications
H04L69/40
System and method for URL fetching retry mechanism
A method for overcoming intermittent, temporary, or other fetching failures by using multiple attempts for retrieving a content from a web server to a client device is disclosed. The URL fetching may use direct or non-direct fetching schemes, or a combination thereof. The non-direct fetching method may use intermediate devices, such as proxy server, Data-Center proxy server, tunnel devices, or any combination thereof. Upon sensing a failure of a fetching action, the action is repeated using the same or different parameters or attributes, such as by using different intermediate devices, selected based on different parameters or attributes, such as different countries. The repetitions are limited to a pre-defined maximum number or attempts. The fetching attempts may be performed by the client device, by an intermediate device in a non-direct fetching scheme, or a combination thereof. Various fetching schemes may be used sequentially until the content is retrieved.
Plant system and method
A plant system includes: an access node connected to a network; a plurality of controllers configured to perform distributed control on a plurality of field devices provided in a plant; and a wireless communication unit provided in each group of a plurality of groups into which the plurality of controllers are grouped and connected to each controller in the corresponding group via a wired connection, and configured to connect each controller to the access node via a wireless connection.
Ethod and computer storage node of shared storage system for abnormal behavior detection/analysis
A method utilized in a computer storage node includes: providing user interface device to be operated by an operator; sensing operation parameter of computer storage node to generate a first detection signal; controlling a display panel of user interface device to display data pattern of first detection signal on display panel according to a time scale; using first portion of first detection signal corresponding to a partial pattern of the data pattern to generate reference signal when the operator uses user interface device to mark a region on display panel to select the partial pattern; and comparing characteristics of the reference signal with characteristics of a processed detection signal to perform a behavior prediction operation.
Systems and methods for message queue storage
A message queue storage device includes: a non-volatile flash memory unit including one or more flash memory dies including one or more pages grouped into one or more flash blocks; a volatile memory; a data port; and a storage controller configured to: receive, via the data port, a message write command including a message and a queue identifier; identify a queue from one or more queues based on the queue identifier; determine that the message is a persistent message; select a write physical location in one or more pages of the flash memory dies in which to store the message; and store the message associated with the queue at the write physical location in the one or more pages of the non-volatile flash memory unit.
Techniques to provide streaming data resiliency utilizing a distributed message queue system
Embodiments include techniques to receive and process data from a data service provider, communicate a plurality of messages comprising the data to a streaming data platform and detect a failure of delivery of the plurality of messages to the streaming data platform. Embodiments further include techniques communicate the plurality of messages to a distributed message queue service of a distributed message queue system, publish each of the plurality of messages to the streaming data platform, determine each of the plurality of messages published to the streaming data platform was successful or unsuccessful, and retry publication of each unsuccessfully published message of plurality of messages to the streaming data platform.
Communications Method and Apparatus
A communications method includes determining a session management function entity based on at least one of a data network name, slice information, and an application function service identifier, and sending a first message to the session management function entity, where the first message is used to subscribe to a terminal event, the first message includes service description information, and the service description information is used to indicate a service corresponding to the terminal event.
FAULT DETECTION APPARATUS, FAULT DETECTION METHOD, AND SUBMARINE CABLE SYSTEM
A fault detection apparatus includes: a transmitter that transmits a first optical signal through an optical transmission line; a receiver that receives, in response to the transmission of the first optical signal, a second optical signal from the line, and measures the reception level of the second optical signal; and a control unit that specifies a section where the second optical signal corresponding to the first optical signal was generated, calculates an optical level corresponding to a loss in said section on the basis of the reception level, determines that a first fault has occurred in the section when the optical level in the section has changed from a first reference level by a first threshold or more, sets a second reference level and a second threshold after occurrence of the first fault, and determines occurrence of a second fault.
DATA SAFE
The disclosure facilitates creating and using a data safe for user personal information via creating block chains of personal information in a distributed file system (DFS), based on a determined category of use of each of the block chains, and/or transmitting an authorization to access a set of the block chains based on the determined category of use associated with a request for authorization. The disclosure also facilitates storing machine-executable code associated with an offer, wherein the block chains are based on a determined category of use of personal information in the block chains, determining the determined category of use of personal information, and/or transmitting a request for authorization to access personal information and the determined category of use associated with the request for authorization, receiving a cryptographic hash associated with a last block of a block chain and a link to the block chain stored in DFS.
END-TO-END OVERWATCH OF COMMUNICATION SESSIONS IN A WIRELESS COMMUNICATION NETWORK FOR FAST FAILURE RECOVERY
Techniques are described for end-to-end overwatch of communication sessions in a network for fast failure recovery. At any time, network functions (NFs) can be supporting end-to-end connectivity for large numbers of concurrent active communication sessions. Conventionally, if one or more of the NFs fail, session context information can be irretrievably lost, and session connectivity is lost. Embodiments provide an overwatch system in an overwatch plane of the network to determine critical session context dataset (CSCDs) for NFs participating in active communication sessions, and to continuously take snapshots of the entire end-to-end context of active communication sessions in accordance with the CSCDs and endpoint information for the NFs. In the event of a session failure, embodiments generate recovery data from the recorded end-to-end context data, which can be used to rapidly restore full, end-to-end session connectivity, thereby maintaining the active communication session without a loss of session context.
Analysis of system conditions from endpoint status information
A system includes Session-Initiation-Protocol (SIP) servers that provide services for a respective set of endpoints. A monitor server can receive connectivity status of the respective set of endpoints based on registration status provided by the endpoints to the SIP servers. Based upon the received connectivity status, endpoints having connectivity problems are parsed into one or more subgroups. Potential problem sources are identified for the connectivity problems of the parsed endpoints. For each of the subgroups, the monitor server determines whether the subgroup exceeds a corresponding trigger threshold. In response a corresponding trigger threshold being exceeded, an action profile specifying an entity is accessed. A notification is transmitted to the entity.