Patent classifications
H04L67/1061
Deduplicated data distribution techniques
In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
DEDUPLICATED DATA DISTRIBUTION TECHNIQUES
In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
INTER-DEVICE COMMUNICATION METHOD, RELATED DEVICE, AND SYSTEM
Embodiments of this application describe an inter-device communication method, a related device, and a system. The method includes a first device sending a first message. The first message includes one or more of the following parameters: a first parameter, a second parameter, and a third parameter. The first parameter is used to indicate that the first message is a message for announcing provision of an interactive business service. The second parameter is used to indicate an identifier corresponding to the interactive business service that can be provided by the first device. The third parameter is used to indicate a processing capability that can be provided by the first device for the interactive business service.
DYNAMIC EMERGENCE, SYNCHRONIZATION, AND CONSOLIDATION OF SPECIALIZED AUTHORITIES AMONG NODES OF AN AD HOC PEER NETWORK
A facility for operating a communication device is described. The facility joins a network to which one or more other communication devices are connected, and identifies a type of network service not being provided in the network. In response, the facility determines to provide the identified type of network service in the network, and proceeds to provide the identified type of network service in the network.
Method and system for accessing digital object in human-cyber-physical environment
A method and system for accessing a digital object in a Human-Cyber-Physical environment are provided. A P2P network is established based on a distributed hash table (DHT); a Kademlia algorithm is used to establish a forward routing table corresponding to each node; and an index binary tree is established according to a logical distance between each node in the forward routing table and a target node. In a process of transmitting a message from a node of a storage digital object to a root node, all nodes that the message passes establish backward routing tables for the digital object, so that in a data query stage, target data may be found from any node through the forward routing table and the backward routing table, and a data identifier of a data entity in the DHT-based P2P network from a storage location of the data identifier may be decoupled.
Distributed processing for determining network paths
Provided is a process including: advertising a plurality of values corresponding to computing components to peer nodes of a peer-to-peer network; storing the plurality of values in a tamper-evident, distributed ledger; determining a target data center in the distributed computing environment, wherein the target data center performs computations based on data sent from a mobile computing device, and wherein the target data center executes a peer node of the peer-to-peer network; determining a network path that is linked to the target data center based on a distance to the target data center; and transferring a packet from the target data center, wherein the packet traverses the network path and comprises one or more computation results from the target data center.
DISTRIBUTED PROCESSING FOR DETERMINING NETWORK PATHS
Provided is a process including: advertising a plurality of values corresponding to computing components to peer nodes of a peer-to-peer network; storing the plurality of values in a tamper-evident, distributed ledger; determining a target data center in the distributed computing environment, wherein the target data center performs computations based on data sent from a mobile computing device, and wherein the target data center executes a peer node of the peer-to-peer network; determining a network path that is linked to the target data center based on a distance to the target data center; and transferring a packet from the target data center, wherein the packet traverses the network path and comprises one or more computation results from the target data center.
AUTOMATIC FORMATION OF A VIRTUAL CHASSIS USING ZERO TOUCH PROVISIONING
A network device may obtain information concerning a virtual chassis that indicates that the network device and an additional network device are to be included in the virtual chassis. The network device may determine, based on the information concerning the virtual chassis, that the network device is connected to the additional network device, wherein the network device is connected to the additional network device via a link between a network interface of the network device and a network interface of the additional network device. The network device may cause the network interface of the network device to be converted to a virtual chassis interface and the network interface of the additional network device to be converted to a virtual chassis interface to enable the network device and the additional network device to be included in the virtual chassis to allow bootstrapping of the virtual chassis as a single logical device.
AUTOMATIC FORMATION OF A VIRTUAL CHASSIS USING ZERO TOUCH PROVISIONING
A network device may obtain information concerning a virtual chassis that indicates that the network device and an additional network device are to be included in the virtual chassis. The network device may determine, based on the information concerning the virtual chassis, that the network device is connected to the additional network device, wherein the network device is connected to the additional network device via a link between a network interface of the network device and a network interface of the additional network device. The network device may cause the network interface of the network device to be converted to a virtual chassis interface and the network interface of the additional network device to be converted to a virtual chassis interface to enable the network device and the additional network device to be included in the virtual chassis to allow bootstrapping of the virtual chassis as a single logical device.
Kickstart discovery controller connection command
Multicast Domain Name System (mDNS)-based pull registration systems and methods facilitate discovery in communication networks, such as Storage Area Networks (SANs) that operate in non-volatile memory express over Fabric (NVMe-oF) environments. In various embodiments, this is accomplished by allowing a network entity (e.g., a Centralized Discovery Controller (CDC)) to use a pull registration to exchange discovery information with a storage subsystem (e.g., a storage array), advantageously, without requiring storage subsystem to possess complex functionalities present in existing designs.