Patent classifications
H04L69/40
Base station, communication system, communication method, and non-transitory storing medium
A base station includes: a communication circuit configured to communicate with a mobile station; a prediction circuit configured to predict a period during which communication with the mobile station is blocked; and a controller configured to control the communication circuit in such a way that communication data to be transmitted to the mobile station in the period during which communication is blocked are transmitted in a period before the period during which communication is blocked.
System and method for highly available database service
A highly available database system includes a first instance of a database server on a first cluster of a virtual computing system, a second instance of the database server on a second cluster of the virtual computing system, a first instance of an administration database on the first cluster, and a second instance of the administration database on the second cluster. The first instance of the database server and the second instance of the database server form a highly available database server, the first instance of the administration database and the second instance of the administration database form a highly available administration database, and the first instance of the database server, the second instance of the database server, the first instance of the administration database, and the second instance of the administration database are configured to manage at least one customer database.
SYSTEM AND METHOD FOR REDUCING CONGESTION IN A NETWORK
Systems and methods of communicating in a network use rate limiting. Rate limiting units (either receive side or transmit side) can perform rate limiting in response to a) a maximum number of bytes that can be solicited over a first period of time is exceeded, b) a maximum number of bytes that are outstanding over a second period of time is exceeded; or c) a maximum number of commands that are outstanding over a period of time is exceeded as part of CMD_RXRL. The CMD_RXRL, can have three components (a) max bytes, b) outstanding bytes, c) outstanding commands. TXRL, contains the component of max bytes or maximum number of bytes that can be transmitted over a third period of time to match the speed of a receive link, or any node or link through the network/fabric.
FAILURE MODES IN MULTI-HOP NETWORKS
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Disclosed is a method of fault recovery in a multi-hop network having a plurality of nodes, defining a route, comprising the steps of: determining that a fault exists between two of the plurality of nodes (B, C); performing a hierarchical fault recovery process.
FAILURE MODES IN MULTI-HOP NETWORKS
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Disclosed is a method of fault recovery in a multi-hop network having a plurality of nodes, defining a route, comprising the steps of: determining that a fault exists between two of the plurality of nodes (B, C); performing a hierarchical fault recovery process.
INDICATION OF THE COUPLE PAIR OF REMOTE CONTROLS WITH REMOTE DEVICES FUNCTIONS
A method of assessing inter-device communication pairing in a surgical setting, may include transmitting, by a first intelligent medical device, wireless communication data within the surgical setting, receiving, by a second intelligent medical device, the wireless communication data from the first intelligent medical device, determining, by the second intelligent medical device, communication pairing data indicative of an inter-device communication pairing of the second intelligent medical device with the first intelligent medical device, transmitting, by the second intelligent medical device, the communication pairing data to a modular control tower, and displaying, by the modular control tower on a display device, an augmented reality display comprising one or more virtual objects indicative of the inter-device communication pairing. An interactive surgical system may include multiple intelligent medical devices and displays which can form communication pairs in this manner.
METHOD AND APPARATUS FOR REGISTRATION DATA RETRIEVAL
A method and apparatus for registration data retrieval. The method performed by a network function service consumer entity comprises sending a request for retrieving at least two registration data set related to a user equipment to a data management entity. The request includes two or more corresponding registration data set names. The method further comprises receiving a response from the data management entity. The response comprises at least two requested registration data sets related to the user equipment.
In-memory database-managed container volume replication
In an example embodiment, a solution is used to provide container volume replication via a container storage replication log and volume buffer synchronization, which is built on top of a container cloud platform whose container metadata and replication runtime configuration are all managed by a storage manager (a service orchestrated by its job scheduler and service orchestrator). This container volume replication ensures the data security for a long-running service in the container. In the case of any disaster, the in-memory database and application data inside of the container can be recovered via volume replication. This provides container volume replication for long-running containerized applications whose states keep changing.
In-memory database-managed container volume replication
In an example embodiment, a solution is used to provide container volume replication via a container storage replication log and volume buffer synchronization, which is built on top of a container cloud platform whose container metadata and replication runtime configuration are all managed by a storage manager (a service orchestrated by its job scheduler and service orchestrator). This container volume replication ensures the data security for a long-running service in the container. In the case of any disaster, the in-memory database and application data inside of the container can be recovered via volume replication. This provides container volume replication for long-running containerized applications whose states keep changing.
Management of a security system at a premises
A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.