Patent classifications
H04L67/5651
Stream-based data deduplication with cache synchronization
Stream-based data deduplication is provided in a multi-tenant shared infrastructure but without requiring “paired” endpoints having synchronized data dictionaries. Data objects processed by the dedupe functionality are treated as objects that can be fetched as needed. As such, a decoding peer does not need to maintain a symmetric library for the origin. Rather, if the peer does not have the chunks in cache that it needs, it follows a conventional content delivery network procedure to retrieve them. In this way, if dictionaries between pairs of sending and receiving peers are out-of-sync, relevant sections are then re-synchronized on-demand. The approach does not require that libraries maintained at a particular pair of sender and receiving peers are the same. Rather, the technique enables a peer, in effect, to “backfill” its dictionary on-the-fly. On-the-wire compression techniques are provided to reduce the amount of data transmitted between the peers.
Stream-based data deduplication with cache synchronization
Stream-based data deduplication is provided in a multi-tenant shared infrastructure but without requiring “paired” endpoints having synchronized data dictionaries. Data objects processed by the dedupe functionality are treated as objects that can be fetched as needed. As such, a decoding peer does not need to maintain a symmetric library for the origin. Rather, if the peer does not have the chunks in cache that it needs, it follows a conventional content delivery network procedure to retrieve them. In this way, if dictionaries between pairs of sending and receiving peers are out-of-sync, relevant sections are then re-synchronized on-demand. The approach does not require that libraries maintained at a particular pair of sender and receiving peers are the same. Rather, the technique enables a peer, in effect, to “backfill” its dictionary on-the-fly. On-the-wire compression techniques are provided to reduce the amount of data transmitted between the peers.
Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
Systems and methods of operation modes for mobile traffic optimization and management of concurrent optimized and non-optimized traffic are disclosed. One embodiment includes classifying and handling traffic sent to and from mobile device applications running on a mobile device, the method includes, analyzing, on the mobile device, requests from the mobile device applications for recurrent patterns; traffic having a recurrent pattern is optimizable traffic and traffic with an unidentifiable pattern is non optimizable traffic, managing the optimizable traffic to reduce an amount of wireless data and signaling traffic sent to and from the mobile device and/or routing the non optimizable traffic from the mobile device applications to a service provider. In one embodiment, upon determining a problem communicating with the server, request are routed from the one or more mobile device applications directly to a service provider, the routed traffic bypassing a client-side proxy.
SENSOR KITS AND ASSOCIATED METHODS FOR MONITORING INDUSTRIAL SETTINGS UTILIZING A DISTRIBUTED LEDGER
A sensor kit and associated method configured for monitoring an industrial setting is disclosed. The sensor kit can include an edge device and a plurality of sensors that capture sensor data and transmit the sensor data via a self-configuring sensor kit network. At least one sensor can capture sensor measurements and output instances of sensor data, generate and output reporting packets, and transmit the reporting packets to the edge device via the self-configuring sensor kit network in accordance with a first communication protocol. The edge device receives reporting packets from the plurality of sensors via the self-configuring sensor kit network, generates a data block based on the sensor data, and transmits the data block to one or more node computing devices that collectively store a distributed ledger that is comprised of a plurality of data blocks.
Implementation method of low power consumption internet of things based on proxy apparatus
A method for implementing a low power consumption IoT network based on a Wi-Fi proxy device. The network is used for low power consumption data exchange between a Wi-Fi IoT device having a long data period in a Wi-Fi IoT network and an internet server, via a Wi-Fi proxy IoT device and a Wi-Fi access point. A low power consumption Wi-Fi MAC layer link is provided between the proxy device and at least one Wi-Fi IoT device. The Wi-Fi IoT device only establishes a low power consumption Wi-Fi MAC layer link with the proxy device. The proxy device connects to the internet server via a Wi-Fi access point, and acts as a data receiving end to buffer data, from the internet server, that is sent to the Wi-Fi IoT device via the Wi-Fi MAC layer link.
Implementation method of low power consumption internet of things based on proxy apparatus
A method for implementing a low power consumption IoT network based on a Wi-Fi proxy device. The network is used for low power consumption data exchange between a Wi-Fi IoT device having a long data period in a Wi-Fi IoT network and an internet server, via a Wi-Fi proxy IoT device and a Wi-Fi access point. A low power consumption Wi-Fi MAC layer link is provided between the proxy device and at least one Wi-Fi IoT device. The Wi-Fi IoT device only establishes a low power consumption Wi-Fi MAC layer link with the proxy device. The proxy device connects to the internet server via a Wi-Fi access point, and acts as a data receiving end to buffer data, from the internet server, that is sent to the Wi-Fi IoT device via the Wi-Fi MAC layer link.
Network proxy for energy efficient video streaming on mobile devices
Examples of systems and methods for network proxy server for energy efficient video streaming on mobile devices are generally described herein. A proxy server to deliver video content may include a communication module to intercept a request for video content from a mobile device, the request for video content intended for a content server and forward a modified request for the video content to the content server. The communication module may receive the video content from the content server and transfer a portion of the video content to the mobile device using a multipath transport protocol.
Management of Update Queues for Network Controller
Some embodiments provide a method for a network controller that manages multiple managed forwarding elements (MFEs) that implement multiple logical networks. The method stores (i) a first data structure including an entry for each logical entity in a desired state of the multiple logical networks and (ii) a second data structure including an entry for each logical entity referred to by an update for at least one MFE. Upon receiving updates specifying modifications to the logical entities, the method adds separate updates to separate queues for the MFEs that require the update. The separate updates reference the logical entity entries in the second data structure. When the second data structure reaches a threshold size in comparison to the first data structure, the method compacts the updates in at least one of the queues so that each queue has no more than one update referencing a particular logical entity entry.
SYSTEMS AND METHODS FOR PROVIDING A VISUAL CONTENT GALLERY WITHIN A CONTROLLED ENVIRONMENT
Methods and systems for providing a visual content gallery within a controlled environment are disclosed herein. A content gallery server receives a content submission from an inmate device within the controlled environment. Further, the content gallery server determines that the content submission does not include prohibited content based on comparing the content submission to a blacklist of prohibited information. When the content submission does not include prohibited content, the content gallery server adds the content submission to a network accessible content gallery corresponding to an inmate associated with the inmate device. Further, authorized friends and family of the inmate may view the content submission and provide comments on the content submission.
Data transfer device and data transfer system using adaptive compression algorithm
A data transfer device compresses and transfers data according to a priority given to a CPU-constraint process imposing a constraint to a compression processing speed over a NW bandwidth-constraint process imposing a constraint to a transfer processing speed. It is necessary to select a compression algorithm, applied to the CPU-constraint process or the NW bandwidth-constraint process, based on a NW bandwidth, compressibility, and compression processing speed maximizing an effective throughput. When the amount of compressed data held in a temporary hold part is smaller than the predetermined value, the compressed data of the NW bandwidth-constraint process is stored in a temporary hold part. When the amount of compressed data held by the temporary hold part is larger than the predetermined value, the compressed data of the CPU-constraint process is stored in the temporary hold part. Thus, it is possible to improve an effective throughput by effectively using NW bandwidths.