Patent classifications
H04L12/26
Method and system for controlling traffic in a wireless LAN
Embodiments provide a traffic control system for WLAN access points. The traffic control system works in dependence on a first input-user priority (supplied by an authentication server). This allows different service levels to be provided to different classes of customer. In addition, the traffic control system polices and/or shapes traffic based on a second input—a modulation rate detector, which measures the modulation rate at which each connected client is sending its traffic, and uses it to indirectly cause fairer use of the available air interface capacity (e.g. by causing TCP streams to back off when they detect packet loss). Finally, for some embodiments where public Wi-Fi is being delivered through private Wi-Fi access points, the traffic control system is to manage the air interface utilization split between public and private WiFi users, to ensure that private users do not have their Wi-Fi air interface network capacity unduly impaired by public users.
Diagnostic heartbeating in a distributed data processing environment
A first component receives from a second component a set of diagnostic parameters to include in a diagnostic heartbeat packet, and information identifying a data communication protocol to be used for transmitting the diagnostic heartbeat packet. The diagnostic heartbeat packet is a packet comprising a header, a set of heartbeat parameters, and the set of diagnostic parameters. The first component sets a first diagnostic parameter in the set of diagnostic parameters to a first value, the first value being selected to detect a first soft network error condition. A soft network error condition is a network error condition that adversely affects transmission of packets having certain properties in the data communication network. The first component configures the diagnostic heartbeat packet for transmission using the specified data communication protocol and including the set of diagnostic parameters, and sends the diagnostic heartbeat packet to the second component.
Repair method and device for missing detection of control channel
Embodiments provide a repair method for missing detection of a control channel and relate to the field of communications. The method includes detecting whether a user equipment misses detecting a physical downlink control channel. After it is detected that the user equipment misses detecting the physical downlink control channel, a repair is performed using a repair policy.
Identifying workload and sizing of buffers for the purpose of volume replication
A controller is operable to: identify virtual machines to be protected in a first storage system; identify logical volumes used by the virtual machines based on first relationship information; calculate workload, based on information of workload monitored for the identified logical volumes; and calculate size of a buffer area in the first storage system to be used for temporarily storing copy data to be sent to a second storage system in remote copy procedure of one or more remote copy pairs, based on the calculated workload, each copy pair being formed by a logical volume of the identified logical volumes in the first storage system as primary logical volume and another logical volume in the second storage system as secondary logical volume, so that the buffer area having a size equal to or greater than the calculated size can be used to manage protection of the identified virtual machines.
Method and device for protecting service reliability and network virtualization system
Disclosed is a method and a device for protecting service reliability, and the service reliability in the network virtualization system provided by the present disclosure may be ensured. In an embodiment of the present disclosure, a master node having a control function obtains the current service type information and notifies a slave node of the current service type information, for enabling the slave node to determine a main virtual link and a backup virtual link according to the service type information and to perform the failure detection, and when detecting that the main virtual link has failure and the backup virtual link has no failure, a service data message is switched to be transmitted on the backup virtual link, to ensure non-interrupted transmission of a service data message in a brand-new system architecture provided by the present disclosure, so as to ensure the service reliability.
Methods, systems, and media for detecting the presence of a digital media device on a network
Methods, systems, and media for detecting the presence of a digital media device on a network are provided. In some embodiments, methods for detecting a presence of a particular type of digital media device is provided, the methods comprising: identifying cached device details for devices previously associated with the network; performing a simple device discovery protocol (SSDP) on the network, and substantially concurrently sending a unicast message to an address associated with the identified cached digital media device using hypertext transfer protocol (HTTP); and indicating the presence of a digital media device on the network in response to either (i) receiving a response to the unicast message, or (ii) determining that a type of a device discovered using SSDP is the same as the particular device type.
Automatic transformation of messages between service versions
A method and system are provided for automatic transformation of messages between service versions. The method includes collecting message data of messages sent to two or more versions of a service. Message data is identified as relating to a version of a service. Relationships are inferred between structure and content of messages sent to different versions of a service, and message transformation rules are created based on the inferred relationships.
Method and device for reporting channel state information in wireless communication system
One embodiment of the present invention relates to a method by which a terminal reports channel state information (CSI) in a wireless communication system, the channel state information reporting method comprising the steps of: deriving an interference measurement on the basis of a zero power CSI-reference signal (RS) related to a CSI-interference measurement (IM) resource configuration: calculating a channel quality information (CQI) value on the basis of the interference measurement; and transmitting CSI including the CQI value to a base station, wherein at least one RE according to the CSI-IM resource configuration is included in different ECCEs included in a PRB pair.
Computer system and method of identifying a failure
A computer system for realizing increased speed of identifying extent of a failure in a messaging system, provided with: a first computer including a message receiving part, a first log output part, and a first memory part configured to store receiving log data; a second computer including a data store management part configured to manage a data store, a first search part configured to search a message that meets a given condition from among messages stored in the data store, a second log output part, and a second memory part configured to store data store log data; a third computer including a message sending part, a third log output part, and a third memory part configured to store sending log data; and a fourth computer including a monitoring part, a log collecting part, and a second search part configured to search for lost message.
Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service is integrated within a network security appliance by automatically configuring access settings for the logging service and creating an account for the security appliance with the logging service. A log is created within the logging service by making use of the automatically configured access settings and the account. A request is received by the security appliance to access data associated with the log. Responsive thereto and without requiring separate registration of a network administrator with the cloud-based logging service, the data is retrieved by the security appliance from the logging service and is presented via a graphical user interface of the security appliance.