In some examples, a system dynamically assigns, based on one or more factors, tunnels of an underlay and overlay network to a plurality of broadcast groups, where the one or more factors include a factor relating to an operation in the underlay and overlay network, and where the dynamic assignment of the tunnels to the plurality of broadcast groups includes modifying an assignment of a first tunnel from a first broadcast group to a second broadcast group of the plurality of broadcast groups.
Systems and methods are provided for customized grouping of end user devices using a new group identifier tag (GIT) in addition to role-based access (e.g., administrator or guest) and device identifier access (e.g., IP or MAC address). Two components may be implemented at a network access device, including a data plane component and a control plane component. For example, the control plane component may authenticate an end user device, store the MAC and IP addresses for authenticated end user devices, and define access roles for the end user device in the datapath. The data plane component may perform packet processing (e.g., forwarding and policy enforcement) pursuant to previously-defined rules. Whenever a packet arrives at the Network Access Device, the packet is forwarded according to the rules specified by the “role” and GIT present in the entry, allowing for improved processing and scalability of network traffic processing.
A switching fabric uses traffic congestion information to inform its opportunistic use of non-minimal routes. An ingress port of a network switch collects traffic congestion information from the egress ports of the network switch. The traffic congestion information includes minimal and non-minimal route congestion metrics for the egress ports. Candidate egress ports for forwarding a packet to a destination node are identified. One of the candidate egress ports is selected based on the traffic congestion information. The selection process is biased to prefer some candidate egress ports over others. Particularly, the candidate egress ports that provide non-minimal routes to the destination node and have high minimal route congestion metrics are disfavored by the selection process.
In accordance with example implementations, a process includes associating a secondary computer system with a primary computer system. The secondary computer system includes a first virtual machine, which is hosted by a secondary set of physical computer nodes. The primary computer system has a primary role, and the primary role corresponds to a minimum physical resource allocation. The secondary computer system is associated with a secondary role, and the second computer system is provisioned with a second physical resource allocation, which is less than the minimum physical resource allocation. The process includes, responsive to the primary computer system failing and without rebooting the secondary computer system, preparing the secondary computer system to take over the primary role. The preparation includes adding at least one physical computer node to the secondary set of physical computer nodes to cause the second physical resource allocation to meet or exceed the minimum physical resource allocation. The process includes, responsive to the primary computer system failing and without rebooting the secondary computer system, causing the secondary computer system to take over the primary role.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
A network switch includes multiple data crossbars and multiple header planes for controlling the data crossbars. In an example implementation, a device includes: a plurality of header planes, each of the header planes including an input queue, an output queue, a request crossbar connected to the input queue and the output queue, and a grant crossbar connected to the input queue and the output queue; a receiver; and a header plane selector. The header plane selector is configured to: receive a transfer request for a packet from the receiver; select a header plane of the header planes based on a header of the packet; and queue the transfer request at the input queue of the header plane.
One aspect can provide a system and method for emulating the onboarding of networking devices. During operation, a computing device can obtain from a device-activation platform a list of networking devices to be onboarded to a device-management platform method. For a respective networking device on the list of networking devices, the system can collect hardware and firmware information associated with the respective networking device and emulate an onboarding process of the respective networking device using the collected hardware and firmware information, which comprises exchanging one or more handshake messages with the device-activation platform. In response to failing to receive, from the device-management platform, a confirmation message indicating the emulated onboarding process being successful, the system can perform a diagnostic operation to determine one or more potential issues associated with the onboarding process of the respective networking device and display, on a user interface, outcome of the diagnostic operation.
A process includes establishing, by a local activate server agent of a first local branch computer network, a first connection with an activate server of a central computer system. The activate server manages network device validation information corresponding to a plurality of local branch computer networks, including the first branch local computer network. The process includes communicating, by a local activate server agent, with the central activate server over the first connection to receive network device validation information for a given network device associated with an entity that is associated with the first local branch computer network. The process includes, responsive to a given network device connecting to the first branch local computer network, establishing a second connection between the given network device and the local activate server agent. The process includes validating, by the local activate server agent, the given network device based on network device validation information for the given network device. The validation includes the local activate server agent communicating with the given network device over the second connection.
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
Systems and methods are provided for validating an identifier using a dynamic matching scheme, including software-defined-matching or hardware-validated-matching. Software-defined-matching may determine whether two identifiers are logically the same when they are both generated by a software application and match each other, and hardware-validated-matching may determine whether the identifier provided by a message stamping process generated by a hardware component of the device matches a second identifier. The flexible validation process can allow the origin of the device to be trusted when the device is sending communications in the network, while detaching the trust from the user that is operating the trusted device or installing software (e.g., an operating system) on the device for temporary use. By disassociating the trust and independently verifying the device separate from the user operating the device, the communications sent and received by the system can be further trusted or distrusted accordingly.
A network management system for orchestrating a network is provided. During operation, the system generates a graph representing the network. A respective vertex corresponds to an entity in the network, and a respective edge indicates a relationship between a vertex pair. The system can determine a first and a second timestamps for a respective edge. The first timestamp indicates a time instance when a relationship indicated by the edge is established. The second timestamp indicates a time instance when the relationship is terminated. The time range between the first and second timestamps indicates an active period for the edge. The system then receives, from an interface of the system, an instruction for comparing the topology, states, and configuration of the network. The system determines the topology, states, and configurations of the network at a target time instance indicated by the instruction by traversing the active edges of the graph.
A network management system (NMS) for provisioning and managing an overlay network is provided. During operation, the NMS can determine that a loop associated with a media access control (MAC) address is detected in the network. The NMS can probe a first switch in the loop by instructing the first switch to observe the MAC address for a predetermined period. The NMS can receive a first message indicating a first set of ports of the first switch observing the MAC address. The NMS can probe an upstream switch reachable via each of the first set of ports by instructing the upstream switch to observe the MAC address for the predetermined period. Here, observing the MAC address at an upstream port of the upstream switch causes further upstream probing. Based on probing the switches in the loop, the NMS can determine one or more loop origination points (LOPs) for the loop.
A system performs a registration process for monitoring a respective address range, by: receiving, from an application, a first command to monitor a first address range in a kernel; registering, in the kernel, the first address range; creating a monitoring state window in the kernel, the monitoring state window indicating that the first address range is valid; and providing, to the application, read-only access to the monitoring state window. The system detects, in the kernel based on a previous state of a mapping of virtual addresses to physical addresses, a change associated with a memory mapping of a second address range. The system updates the monitoring state window by invalidating address ranges overlapping with the second address range. Responsive to the first address range being valid, the system bypasses the registration process for the first address range.
In some examples, a system executes a monitor separate from an operating system (OS) that uses mapping information in accessing data in a physical memory. The monitor identifies, using the mapping information, invariant information, that comprises program code, of the OS without suspending execution of the OS, the identifying comprising the monitor accessing the physical memory independently of the OS. The monitor determines, based on monitoring the invariant information of the OS, whether a security issue is present.
G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
In certain embodiments, a computer-implemented method includes: receiving, by a caching system plugin, a request to create a persistent volume for a container application instance; configuring, by the caching system plugin, a local cache volume on a host computing device; configuring, by the caching system plugin, a remote storage volume on a remote storage device; selecting, by a policy manager of the caching system plugin, a cache policy for the container application instance; creating, by the caching system plugin and from a cache manager, a virtual block device associated with the local cache volume, the remote storage volume, and the cache policy; and providing the virtual block device for use by the container application instance as the persistent volume.
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
G06F 12/06 - Addressing a physical block of locations, e.g. base addressing, module addressing, address space extension, memory dedication
A network switch has a packet pulling architecture, and also supports packet pushing. In an example implementation, a device includes: an output buffer; a data crossbar connected to the output buffer; an input buffer connected to the data crossbar; an input queue; a request crossbar connected to the input queue; and an output queue. The input queue is configured to transfer a packet from the input buffer to the output buffer over the data crossbar in response to the packet being eligible for packet pushing, and to send a push request in parallel with transferring the packet to the output buffer. The output queue is configured to receive the push request from the input queue over the request crossbar, and to control reading of the packet from the output buffer in response to granting the push request
Systems and methods are provided for defining basic service set (BSS) colors and spatial reuse groups (SRGs) for multiple basic service set identifier (MBSSID) sets. The systems and methods can set a first BSS color for a first MBSSID set and a second BSS color for a second MBSSID set, the MBSSID sets pertaining to a first access point. For a second access point, the system can set a third BSS color for a third MBSSID set and a fourth BSS color for a fourth MBSSID set. A SRG can be defined for the first MBSSID set, wherein the first spatial reuse group advertises the first BSS color and any BSS colors associated with the second access point.
A process includes accessing by a management controller of a computer platform, a platform certificate that is stored in a secure memory. The platform certificate includes data representing a reference inventory for the computer platform. The platform certificate includes data representing information designated to bind the platform certificate to a security processor. The security processor is accessible by the management controller. The security processor is inaccessible by an operating system of the computer platform. The process includes verifying the platform certificate. Verifying the platform certificate includes validating, by the management controller, a signature of the platform certificate; and validating, by the management controller, the information designated to bind the platform certificate to the security processor. Verifying the platform certificate includes comparing, by the management controller, a second inventory of the computer platform to the reference inventory.
G06F 21/33 - User authentication using certificates
G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
In certain embodiments, a computer-implemented method includes: receiving, from a user interface and at a planar file system manager executing on one or more processors, a planar file system configuration request comprising a plurality of planes and a plurality of plane relationships, wherein the plurality of plane relationships comprise a sub-planar relationship between a plane and a sub-plane and an orthogonal relationship between two separate planes of the plurality of planes; configuring, by the planar file system manager, a storage environment to include a planar file system based on the planar file system configuration request; receiving, from the user interface, a plane operation request to perform an operation on a plane of the planar file system, wherein the plane operation request comprises a plane identifier corresponding to the plane; and performing, based on the plane operation request, the operation on the plane.
Hewlett Packard Enterprise Development LP, Hewlett Packard Enterprise Development LP is a Limited partnership organized under the laws of Texas. It is composed of Enterprise DC Holdings LLC, Limited liability company, Delaware ()
36 - Financial, insurance and real estate services
37 - Construction and mining; installation and repair services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
09 - Scientific and electric apparatus and instruments
Goods & Services
Business consulting services; Business data analysis; Data processing services; Database management services; Retail store services featuring computers, computer hardware, and computer software; Provision of an on-line marketplace for buyers and sellers of information technology (IT) goods and services; Arranging and conducting trade shows in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Financing of purchases; Providing lease financing for information technology (IT) goods and services Installation, maintenance and repair of computers, computer hardware, computer networking hardware, and computer storage hardware Telecommunications consultation; electronic data transmission; providing access to databases; providing access to cloud-based computing resources and storage; providing on-line forums for transmission of messages among computer users; providing online chat rooms Arranging and conducting of classes in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of seminars and workshops in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; On-line journals, namely, blogs featuring information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Publishing of electronic publications; Book publishing; Providing on-line non-downloadable articles in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of business conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Rental and leasing of computers, computer hardware, computer networking hardware, computer storage hardware, information technology (IT) infrastructure, cloud computing infrastructure, and artificial intelligence infrastructure; rental of software; infrastructure-as-a-service (IaaS) services, namely, providing computer software and computer hardware to others on a subscription or pay-per-use basis; cloud hosting provider services; providing virtual computer systems and virtual computer environments through cloud computing; electronic data storage; computer system design; computer software design; planning, design, and management of information technology (IT) systems; computer system administration, configuration, and management; computer network configuration, administration, and management; remote and on-site management of the information technology (IT) and cloud computing systems of others; software installation, maintenance, and update services; computer technology consulting; information technology consulting; computer software consulting; consulting in the field of cloud computing; consulting in the field of artificial intelligence; consulting in the field of computer and network security; providing information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security via an on-line website; technical support services, namely, diagnosing computer hardware and software problems; software-as-a-service (SaaS) services; application service provider (ASP) services; platform-as-a-service (PaaS) services; infrastructure-as-a-service (IaaS) services; providing temporary use of online non-downloadable software; research in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; development and maintenance of artificial intelligence models and algorithms Computers; computer hardware; computer networking hardware; computer hardware for telecommunications; computer storage hardware; cooling hardware for microprocessors; computer software; downloadable electronic publications in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security
Hewlett Packard Enterprise Development LP, Hewlett Packard Enterprise Development LP is a Limited partnership organized under the laws of Texas. It is composed of Enterprise DC Holdings LLC, Limited liability company, Delaware ()
36 - Financial, insurance and real estate services
37 - Construction and mining; installation and repair services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
09 - Scientific and electric apparatus and instruments
Goods & Services
Business consulting services; Business data analysis; Data processing services; Database management services; Retail store services featuring computers, computer hardware, and computer software; Provision of an on-line marketplace for buyers and sellers of information technology (IT) goods and services; Arranging and conducting trade shows in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Financing of purchases; Providing lease financing for information technology (IT) goods and services Installation, maintenance and repair of computers, computer hardware, computer networking hardware, and computer storage hardware Telecommunications consultation; electronic data transmission; providing access to databases; providing access to cloud-based computing resources and storage; providing on-line forums for transmission of messages among computer users; providing online chat rooms Arranging and conducting of classes in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of seminars and workshops in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; On-line journals, namely, blogs featuring information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Publishing of electronic publications; Book publishing; Providing on-line non-downloadable articles in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of business conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Rental and leasing of computers, computer hardware, computer networking hardware, computer storage hardware, information technology (IT) infrastructure, cloud computing infrastructure, and artificial intelligence infrastructure; rental of software; infrastructure-as-a-service (IaaS) services, namely, providing computer software and computer hardware to others on a subscription or pay-per-use basis; cloud hosting provider services; providing virtual computer systems and virtual computer environments through cloud computing; electronic data storage; computer system design; computer software design; planning, design, and management of information technology (IT) systems; computer system administration, configuration, and management; computer network configuration, administration, and management; remote and on-site management of the information technology (IT) and cloud computing systems of others; software installation, maintenance, and update services; computer technology consulting; information technology consulting; computer software consulting; consulting in the field of cloud computing; consulting in the field of artificial intelligence; consulting in the field of computer and network security; providing information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security via an on-line website; technical support services, namely, diagnosing computer hardware and software problems; software-as-a-service (SaaS) services; application service provider (ASP) services; platform-as-a-service (PaaS) services; infrastructure-as-a-service (IaaS) services; providing temporary use of online non-downloadable software; research in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; development and maintenance of artificial intelligence models and algorithms Computers; computer hardware; computer networking hardware; computer hardware for telecommunications; computer storage hardware; cooling hardware for microprocessors; computer software; downloadable electronic publications in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security
Hewlett Packard Enterprise Development LP, Hewlett Packard Enterprise Development LP is a Limited partnership organized under the laws of Texas. It is composed of Enterprise DC Holdings LLC, Limited liability company, Delaware ()
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
37 - Construction and mining; installation and repair services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Business consulting services; Business data analysis; Data processing services; Database management services; Retail store services featuring computers, computer hardware, and computer software; Provision of an on-line marketplace for buyers and sellers of information technology (IT) goods and services; Arranging and conducting trade shows in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Telecommunications consultation; electronic data transmission; providing access to databases; providing access to cloud-based computing resources and storage; providing on-line forums for transmission of messages among computer users; providing online chat rooms Computers; computer hardware; computer networking hardware; computer hardware for telecommunications; computer storage hardware; cooling hardware for microprocessors; computer software; downloadable electronic publications in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Financing of purchases; Providing lease financing for information technology (IT) goods and services Installation, maintenance and repair of computers, computer hardware, computer networking hardware, and computer storage hardware Arranging and conducting of classes in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of seminars and workshops in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; On-line journals, namely, blogs featuring information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Publishing of electronic publications; Book publishing; Providing on-line non-downloadable articles in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of business conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Rental and leasing of computers, computer hardware, computer networking hardware, computer storage hardware, information technology (IT) infrastructure, cloud computing infrastructure, and artificial intelligence infrastructure; rental of software; infrastructure-as-a-service (IaaS) services, namely, providing computer software and computer hardware to others on a subscription or pay-per-use basis; cloud hosting provider services; providing virtual computer systems and virtual computer environments through cloud computing; electronic data storage; computer system design; computer software design; planning, design, and management of information technology (IT) systems; computer system administration, configuration, and management; computer network configuration, administration, and management; remote and on-site management of the information technology (IT) and cloud computing systems of others; software installation, maintenance, and update services; computer technology consulting; information technology consulting; computer software consulting; consulting in the field of cloud computing; consulting in the field of artificial intelligence; consulting in the field of computer and network security; providing information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security via an on-line website; technical support services, namely, diagnosing computer hardware and software problems; software-as-a-service (SaaS) services; application service provider (ASP) services; platform-as-a-service (PaaS) services; infrastructure-as-a-service (IaaS) services; providing temporary use of online non-downloadable software; research in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; development and maintenance of artificial intelligence models and algorithms
Systems and methods are provided for an optical transport implementation of an inference engine capable of performing inferences in the optical domain. Examples include an optical device that includes photon directing devices disposed along an optical axis, each photon directing device corresponds to a layer of a trained machine learning model. Lenses are provided for each photon directing device, which are formed based on weights of a layer of the trained machine learning model corresponding to the respective photon directing device. The examples may also include optical sensors that correspond to inferences of the trained machine learning model, and the photon directing devices may be configured to receive light of an input and direct the light to one of the optical sensors according to the trained machine learning model.
Predictive maintenance can be achieved by fetching log data from a monitoring application monitoring one or more hosts of a data center site. Based on the log data, a clique comprising a subset of the one or more hosts exhibiting sufficiently similar behavior is created. The log data may also be used to train a machine learning model configured to predict a need for predictive maintenance/existence of a predictive maintenance state for any of the subset of the one or more hosts of the clique. The machine learning model is trained with the log data, and the machine learning model is operationalized to predict the existence of anomalous data in further log data collected from the monitoring application. The existence of anomalous data reflects a need for predictive maintenance.
G06N 3/0442 - Recurrent networks, e.g. Hopfield networks characterised by memory or gating, e.g. long short-term memory [LSTM] or gated recurrent units [GRU]
In some examples, a system provides multi-chassis link aggregation by the first and second electronic devices that are part of a logical device supporting an MCLAG, where the first electronic device includes a first time clock, and the second electronic device includes a second time clock. The first and second time clocks perform, over a link between the first and second electronic devices of the logical device, a clock source selection process to select one of the first and second time clocks as a clock source and another one of the first and second time clocks as a clock sink as part of a time synchronization process in the system.
Examples described herein relate to fetching network device topologies using a timestamp-callback map. The timestamp-callback map includes timestamps paired with references to unique callback functions that fetch topologies for network devices when executed. Examples include setting an alarm for each timestamp in the timestamp-callback map. When an alarm generates a notification, examples create worker threads of a network profiler service. Each worker thread executes a respective unique callback function to fetch a topology for a network device from a topology service. Examples describe different implementations of the timestamp-callback map that can be optimized in various embodiments.
Hewlett Packard Enterprise Development LP, Hewlett Packard Enterprise Development LP is a Limited partnership organized under the laws of Texas. It is composed of Enterprise DC Holdings LLC, Limited liability company, Delaware ()
36 - Financial, insurance and real estate services
37 - Construction and mining; installation and repair services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
09 - Scientific and electric apparatus and instruments
Goods & Services
Business consulting services; Business data analysis; Data processing services; Database management services; Retail store services featuring computers, computer hardware, and computer software; Provision of an on-line marketplace for buyers and sellers of information technology (IT) goods and services; Arranging and conducting trade shows in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Financing of purchases; Providing lease financing for information technology (IT) goods and services Installation, maintenance and repair of computers, computer hardware, computer networking hardware, and computer storage hardware Telecommunications consultation; electronic data transmission; providing access to databases; providing access to cloud-based computing resources and storage; providing on-line forums for transmission of messages among computer users; providing online chat rooms Arranging and conducting of classes in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of seminars and workshops in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; On-line journals, namely, blogs featuring information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Publishing of electronic publications; Book publishing; Providing on-line non-downloadable articles in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of business conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Rental and leasing of computers, computer hardware, computer networking hardware, computer storage hardware, information technology (IT) infrastructure, cloud computing infrastructure, and artificial intelligence infrastructure; rental of software; infrastructure-as-a-service (IaaS) services, namely, providing computer software and computer hardware to others on a subscription or pay-per-use basis; cloud hosting provider services; providing virtual computer systems and virtual computer environments through cloud computing; electronic data storage; computer system design; computer software design; planning, design, and management of information technology (IT) systems; computer system administration, configuration, and management; computer network configuration, administration, and management; remote and on-site management of the information technology (IT) and cloud computing systems of others; software installation, maintenance, and update services; computer technology consulting; information technology consulting; computer software consulting; consulting in the field of cloud computing; consulting in the field of artificial intelligence; consulting in the field of computer and network security; providing information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security via an on-line website; technical support services, namely, diagnosing computer hardware and software problems; software-as-a-service (SaaS) services; application service provider (ASP) services; platform-as-a-service (PaaS) services; infrastructure-as-a-service (IaaS) services; providing temporary use of online non-downloadable software; research in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; development and maintenance of artificial intelligence models and algorithms Computers; computer hardware; computer networking hardware; computer hardware for telecommunications; computer storage hardware; cooling hardware for microprocessors; computer software; downloadable electronic publications in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security
Hewlett Packard Enterprise Development LP, Hewlett Packard Enterprise Development LP is a Limited partnership organized under the laws of Texas. It is composed of Enterprise DC Holdings LLC, Limited liability company, Delaware ()
36 - Financial, insurance and real estate services
37 - Construction and mining; installation and repair services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
09 - Scientific and electric apparatus and instruments
Goods & Services
Business consulting services; Business data analysis; Data processing services; Database management services; Retail store services featuring computers, computer hardware, and computer software; Provision of an on-line marketplace for buyers and sellers of information technology (IT) goods and services; Arranging and conducting trade shows in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Financing of purchases; Providing lease financing for information technology (IT) goods and services Installation, maintenance and repair of computers, computer hardware, computer networking hardware, and computer storage hardware Telecommunications consultation; electronic data transmission; providing access to databases; providing access to cloud-based computing resources and storage; providing on-line forums for transmission of messages among computer users; providing online chat rooms Arranging and conducting of classes in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of seminars and workshops in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; On-line journals, namely, blogs featuring information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Publishing of electronic publications; Book publishing; Providing on-line non-downloadable articles in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; Arranging and conducting of business conferences in the field of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security Rental and leasing of computers, computer hardware, computer networking hardware, computer storage hardware, information technology (IT) infrastructure, cloud computing infrastructure, and artificial intelligence infrastructure; rental of software; infrastructure-as-a-service (IaaS) services, namely, providing computer software and computer hardware to others on a subscription or pay-per-use basis; cloud hosting provider services; providing virtual computer systems and virtual computer environments through cloud computing; electronic data storage; computer system design; computer software design; planning, design, and management of information technology (IT) systems; computer system administration, configuration, and management; computer network configuration, administration, and management; remote and on-site management of the information technology (IT) and cloud computing systems of others; software installation, maintenance, and update services; computer technology consulting; information technology consulting; computer software consulting; consulting in the field of cloud computing; consulting in the field of artificial intelligence; consulting in the field of computer and network security; providing information in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security via an on-line website; technical support services, namely, diagnosing computer hardware and software problems; software-as-a-service (SaaS) services; application service provider (ASP) services; platform-as-a-service (PaaS) services; infrastructure-as-a-service (IaaS) services; providing temporary use of online non-downloadable software; research in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security; development and maintenance of artificial intelligence models and algorithms Computers; computer hardware; computer networking hardware; computer hardware for telecommunications; computer storage hardware; cooling hardware for microprocessors; computer software; downloadable electronic publications in the fields of computers, computer hardware, computer software, information technology, cloud computing, artificial intelligence, and computer and network security
27.
DECOUPLING CONGESTION MANAGEMENT STATE AND CONNECTION MANAGEMENT STATE IN HIGH PERFORMANCE COMPUTING
A first network endpoint establishes a connection with a second network endpoint by transmitting a control packet including a first identifier associated with the connection and the first network endpoint. The first network endpoint stores, in a first data structure based on the first identifier, a first connection state associated with the connection and stores, in a second data structure based on the first connection state, a first congestion state associated with the connection. The first network endpoint identifies, for a data flow associated with the first identifier, a congestion state corresponding to the data flow, by: obtaining the first connection state by searching the first data structure based on the first identifier; and identifying the first congestion state by searching the second data structure based on the obtained first connection state.
One aspect can provide a system and method for selective data forwarding in a multicast network. During operation, a querier router in the multicast network receives, at a first port of, a query-response packet from a network device in response to an all-host query sent by the querier router and add the first port to a port list comprising a number of ports coupled to non-querier devices in the multicast network. In response to receiving a multicast-join message, the querier router can forward the multicast-join message to the ports on the port list comprising the first port except for a port that receives the multicast-join message. Forwarding the multicast-join message to the first port causes the multicast-join message to be received at a second port of a layer-2 switch, which allows the layer-2 switch to forward unknown multicast data packets to the querier device via the second port.
Examples perform regulatory-compliant traffic checks for a wider bandwidth than a WLAN channel an AP is currently operating over before temporarily increasing the WLAN channel to the wider bandwidth to serve Wi-Fi ranging requests with improved precision. An example AP may: (1) while performing non-ranging Wi-Fi operations over a WLAN channel of a first bandwidth, perform a regulatory-compliant traffic check to determine whether a second bandwidth is clear of priority traffic, wherein the second bandwidth is wider than the first bandwidth; (2) responsive to receiving a Wi-Fi ranging request and determining the second bandwidth is clear of priority traffic, modify the WLAN channel from the first bandwidth to the second bandwidth to serve the Wi-Fi ranging request; and (3) upon completed service of the Wi-Fi ranging request, restore the WLAN channel to the first bandwidth for performing non-ranging Wi-Fi operations.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
A technique for compressing an analog content addressable memory (CAM) array is provided. Random input data is applied to the analog CAM array, and an average measure of similarity is calculated for each output row of the analog CAM array. Rows of the analog CAM array that have measures of similarity that are close to each other can be eliminated, such as by removing similar rows or merging together similar rows. Thus, the analog CAM array size can be reduced without a loss in accuracy of a model stored on the analog CAM array.
G11C 15/04 - Digital stores in which information comprising one or more characteristic parts is written into the store and in which information is read-out by searching for one or more of these characteristic parts, i.e. associative or content-addressed stores using semiconductor elements
31.
PRIORITY-BASED DESIGNATED INTERFACE SELECTION IN A LINK AGGREGATION GROUP
In some examples, a first electronic device includes a plurality of interfaces to network links that are part of a link aggregation group. A first time clock selects, from the plurality of interfaces based on priorities associated with the plurality of interfaces, a designated interface to use for a time synchronization process, where the priorities include a first priority assigned to a first interface, a second priority assigned to a second interface, and a third priority assigned to a third interface. The first time clock sends, using the designated interface, a timing message of the time synchronization process to a second electronic device that includes a second time clock to which the first time clock of the first electronic device is to be synchronized according to the time synchronization process.
An example cooling system for a wireless networking device is presented. The cooling system includes a Peltier cooler disposed in thermal contact with a radio-frequency (RF) filter coupled to a transceiver disposed in the wireless networking device. Further, the cooling system includes a thermal management controller coupled to the Peltier cooler and the transceiver. The thermal management controller is configured to receive a signal indicating whether the transceiver is performing a data communication. In response to determining that the transceiver is performing the data communication, the thermal management controller operates the Peltier cooler to actively cool the RF filter. However, in response to determining that the transceiver is not performing the data communication while the wireless networking device is powered on, the thermal management controller operates the Peltier cooler to stop actively cooling the RF filter.
A system and method can facilitate software-based remote direct memory access (RDMA) communications over transport control protocol (TCP). The system establishes, by an RDMA emulation software layer in a first virtual machine, a TCP connection with a second virtual machine. Responsive to establishing the TCP connection, the system identifies, by the RDMA emulation software layer in the first virtual machine based on socket information received from the second virtual machine, a TCP socket associated with the TCP connection. Responsive to the first virtual machine initiating an RDMA send operation, the system, by the RDMA emulation software layer in the first virtual machine: prepends an RDMA send frame with a protocol header associated with the RDMA emulation software layer; and transmits, via the TCP socket, the prepended RDMA send frame. The system performs the RDMA send operation over the TCP connection.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
34.
CAPACITOR COUPLED IN PARALLEL TO A RECTIFYING ELEMENT OF A RECTIFIER IN POWER-OVER-ETHERNET POWERED DEVICE TO BYPASS NOISE FROM POWER LINE
A power-over-Ethernet (PoE) powered device (PD) comprises a PoE interface to receive a connector of an ethernet cable to connect the PD to a PoE power sourcing equipment (PSE). The PD comprises a first power line connected to the PoE interface to receive PoE power from the PSE in a connected state of the PD to the PSE. The PD also comprises a rectifier comprising a first input connected to the first power line, a first output connected to a first terminal of a PD chip, and a first rectifying element connected between the first input and first output. The PD further comprises a first capacitor connected in parallel to the first rectifying element between the first input and the first output. AC noise appearing on the first power line is bypassed around the first rectifying element via the first capacitor.
G06F 1/26 - Power supply means, e.g. regulation thereof
H02M 1/44 - Circuits or arrangements for compensating for electromagnetic interference in converters or inverters
H02M 7/06 - Conversion of AC power input into DC power output without possibility of reversal by static converters using discharge tubes without control electrode or semiconductor devices without control electrode
A technique includes receiving information relating to wear of computer nodes. Based on the information relating to the wear, the technique includes ranking the computer nodes according to respective expected remaining lifetimes of the computer nodes. The technique includes, responsive to an event that corresponds to at least one of a spare computer node being added to the system or a given computer node being removed from the system, reconfiguring the system based on the ranking.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
A system for running a virtual machine (VM) on a host device is provided. During operation, the system can execute, within the VM, a first operating system (OS) running a client application and a second OS running a network protocol stack. The first OS can receive a transaction command from the client application. The transaction command can be associated with a remote memory access. The first OS can then convert the transaction command to one or more network packets and provide a description of the one or more network packets to the second OS via a shared guest physical memory of the VM. The host device can then send the one or more network packets to a corresponding destination based on the network protocol stack.
In some examples, an electronic device receives a program image including program code files arranged in a file system, and the electronic device mounts, in the electronic device, the file system including the program code files of the program image. The electronic device identifies a first program code file in the mounted file system that is modified with respect to an installed program code file in the electronic device. The electronic device performs an in-service upgrade of the installed program code file in the electronic device with the first program code file from the program image during a live operation of the electronic device.
In some examples, a system includes a nonvolatile memory to store information, and a controller subsystem to perform various tasks. The controller subsystem receives, from an entity, an input to trigger an erase verification operation after an erase of a memory region of the nonvolatile memory containing the information. The controller subsystem generates a pseudorandom pattern in response to the input, and writes the pseudorandom pattern to the memory region as part of the erase verification operation. After the writing, the controller subsystem provides, from the nonvolatile memory to the entity, the pseudorandom pattern retrieved from the memory region for verification that the erasing of the information of the memory region has occurred.
A computing system that includes an attention engine is disclosed. The attention engine is an in-memory computing module that may be used to accelerate attention operations. The attention engine includes a dot product circuit and a multiplier circuit, which together are used to perform matrix generation and matrix multiplication in the analog domain. Performing matrix multiplication in the analog domain may be faster and/or consume less power than performing matrix multiplication in the digital domain.
G06F 7/544 - Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state deviceMethods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using unspecified devices for evaluating functions by calculation
An AP sets up a data tunnel to a remote network and monitors a remote DHCP session between a client device and a remote DHCP server in the remote network. The remote DHCP server assigns a remote IP address to the client device, and communication between the client device and the remote network is based on the remote IP address. In response to determining completion of the remote DHCP session, the AP initializes a local DHCP session with a local DHCP server in a local network to obtain a local IP address for the client device. Communication between the client device and the local network is based on the local IP address. In response to detecting the client device roaming from the AP to a target AP, the AP forwards the remote and local IP addresses and session data of active sessions on the client device to the target AP.
Examples of the presently disclosed technology provide hardware accelerators (referred to herein as treeShap-aCAMs) that compute Shapley values with improved speed/efficiency leveraging the unique parallel search and analog capabilities of aCAMs. The parallel search capability of a treeShap-aCAM enables evaluation of all root-to-leaf paths of a decision tree (programmed into separate rows of the treeShap-aCAM) in a single clock cycle, greatly reducing time required to compute Shapley values. Relatedly, a treeShap-aCAM's ability to store/evaluate analog values (as opposed to merely binary values), can reduce footprint and hardware (e.g., reduce the number of CAM cells) required to perform Shapley value computations. Accordingly, treeShap-aCAMs can compute Shapley values more rapidly/efficiently than other types of hardware accelerators that e.g., implement algorithms that traverse root-to-leaf paths of decision trees node-to-node.
Implementations of the present disclosure relate to an electronic device with a pluggable front end module. The electronic device comprises a housing comprising a plurality of small form-factor pluggable (SFP) ports for receiving a plurality of pluggable modules and the plurality of pluggable modules comprising at least one SFP module and at least one pluggable front end module (FEM). The electronic device further comprises a first circuit unit provided inside the housing and a second circuit unit provided inside the housing. The electronic device further comprises a multiplex unit provided inside the housing, and the multiplex unit is configured to enable communications between the pluggable FEM and the first circuit unit, and enable communications between the SFP module and the second circuit unit. By implementing pluggable FEM and inserting the pluggable FEM into an SFP port, implementations of the present disclosure can be more flexible, replaceable and modular.
H04B 1/00 - Details of transmission systems, not covered by a single one of groups Details of transmission systems not characterised by the medium used for transmission
In certain embodiments, a method includes recursively performing a procedure that includes using an allowed set of object identifiers and a hash function to update a bit array, using a disallowed set of object identifiers and the hash function to further update the bit array where collisions occur, repeating the process with a new allowed set that includes object identifiers from the original allowed set that collided with the disallowed set and a new hash function, until reaching a round where no collisions occurred, generating a data structure that includes the bit arrays created during each recursive round, and compressing the data structure.
A first switch in a network is provided. During operation, the first switch can receive traffic associated with a virtual network address allocated to the first switch and a second switch. The first and second switches can provide high availability to each other. If a layer-3 static multicast route is received at the first switch for a multicast group, the first switch can configure the static multicast route in the control plane. The first switch can determine that a set of conversion conditions are satisfied for the static multicast route. The set of conversion conditions can be applicable to a respective switch associated with the virtual network address. If the set of conversion conditions is satisfied, the first switch can generate a set of layer-2 entries for the multicast group from the static multicast route and program the forwarding hardware to include the set of layer-2 entries.
Example implementations relate to deduplication operations in a storage system. An example includes receiving a stream of data units to be stored in a persistent storage of a deduplication storage system; generating a manifest to record a received order of the data units; indexing the data units in container indexes, where each container index records fingerprints and immutable storage locations of one or more data units; in response to a determination that the manifest has reached a threshold size, determining immutable storage locations that are recorded in the container indexes; and updating the manifest to record the determined immutable storage locations.
In certain embodiments, a method includes receiving, at an interface of a Smart network interface card (SmartNIC) of a computing device, via a network, a network data unit; processing, by a data allocator of a SmartNIC subsystem of the SmartNIC, the network data unit to make a determination that data included in the network data unit is intended for processing by an accelerator of the computing device, wherein the accelerator is configured to execute a machine learning algorithm; storing, by the data allocator and based on the determination, the data in a local buffer of the SmartNIC subsystem; identifying, by the data allocator, a memory resource associated with the accelerator; and transferring the data from the local buffer to the memory resource.
Example implementations relate to deduplication operations in a storage system. An example includes identifying a corrupt data unit included in a first snapshot; identifying a first manifest that references the corrupt data unit; identifying, based on the first manifest, a first container index that indexes the corrupt data unit; determining, based on the first container index, a set of candidate manifests; identifying, in the set of candidate manifests, a second manifest having a highest match score with respect to a first portion of the first manifest; and in response to a determination that the identified second manifest having the highest match score does not reference the corrupt data unit, replacing in the first manifest a reference to a corrupt data unit with a reference to a non-corrupt data unit referenced in the identified second manifest.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
In some examples, different time offsets within a test time interval are computed for tests by respective sensors of a plurality of sensors, where a time offset of the different offsets indicates a point in time within the test time interval with respect to which a corresponding sensor is to initiate a test. A sensor of the plurality of sensors performs tests according to a corresponding time offset of the different time offsets.
In some examples, a deployment server derives an initialization vector based on a protection parameter of a configuration file, and encrypts a vulnerable parameter of the configuration file using the initialization vector and an encryption key. The deployment server produces a protected configuration file including the protection parameter and the encrypted vulnerable parameter. The deployment server sends the protected configuration file to a device as part of an operation configuring the device according to the protected configuration file.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
50.
POLICY-BASED APPLICATION OF A POINT-TO-POINT SECURITY PROTOCOL TO A NETWORK FLOW FROM A SOURCE APPLICATION
Some examples relate to applying a point-to-point security protocol to a network flow from a source application. In an example, in an example implementation, a network device can receive a network flow from a network client on a network. The network device can analyze a network packet of the network flow. Based on the analysis, the network device can identify a source application of the network flow. The network device can then refer to a lookup table in an integrated circuit (IC) on the network device that includes a point-to-point security protocol (PSP)-related policy for the source application. Based on the PSP policy in the lookup table, the network device can abstain from applying PSP-based encryption to the network flow from the source application.
In implementations of the present disclosure, there is provided an approach for reducing unnecessary network down. A method comprises determining a plurality of virtual access points (VAPs) of the AP in a radio frequency (RF) band. Then, the plurality of VAPs are divided into a plurality of VAP zones based on a set of data forwarding entities corresponding to overlay VAPs in the plurality of VAPs, and the plurality of VAP zones includes a bridge zone and one or more overlay zones. A VAP is selected from the bridge zone for allocation to an MBSSID group of a set of MBSSID groups for the plurality of VAPs as a transmitted VAP (TX-VAP). The TX-VAP is used to transmit a beacon frame for the MBSSID group. Implementations of the present disclosure can help the AP to reduce unnecessary network down caused by data tunnel broken and limit the negative network impact.
A method for scanning enhancement is provided. The method comprises receiving a channel scan request, including a scan channel number, a bandwidth, and a total scan time. The method further comprises determining a number of a plurality of scans based on the total scan time and an individual scan time for an AP. The method further comprises determining a plurality of offset values corresponding to the plurality of scans based on the number of the plurality of scans. In addition, the method further comprises performing off-channel scanning based on the scan channel number, the bandwidth, the number of the plurality of scans, and the plurality of offset values. Implementations of the present disclosure can improve the effect and the efficiency of the scanning process, the performance of the features of the upper layer, and the user experience.
In implementations of the present disclosure, a power compensation determination for radio frequency cable mechanism is provided. An access point (AP) determines a time slot for an RF cable loss measurement on an RF cable, and transmits a test signal with a first TX power to an antenna module over the RF cable. The AP further obtains a second TX power transmitted by the antenna module, and determines an RF cable loss based on the first TX power and the second TX power. The AP further determines power compensation for the RF cable based on the determined RF cable loss, the first TX power and an antenna gain of the antenna module. The AP transmits signals on the RF cable to the antenna module based on the determined power compensation. Implementations of the present disclosure can determine the power compensation based on the RF cable loss automatically.
In certain embodiments, a method includes obtaining, by a processing device, a pre-determined number of data points from an online experiment; processing, by the processing device, the data points to determine whether the data points exhibit at least one characteristic; selecting, by the processing device and in response to the data points exhibiting the at least one characteristic, a first stopping rule of a plurality of stopping rules, wherein the first stopping rule corresponds to the at least one characteristic; applying, by the processing device, the first stopping rule to determine whether a first convergence criterion is met; and stopping, when the first convergence criterion is met, the online experiment.
Examples of the presently disclosed technology provide automated firmware recommendation systems that inject the intelligence of machine learning into the firmware recommendation process. To accomplish this, examples train a machine learning model on troves of historical customer firmware update data on a dynamic basis (e.g., examples may train the machine learning model on weekly basis to predict accepted firmware updates made by a vendor's customers across the most recent 6 months). From this dynamic training, the machine learning model can learn to predict/recommend an optimal firmware version for a customer/network device cluster based on firmware-related features, recent customer preferences, and other customer-specific factors. Once trained, examples can deploy the machine learning model to make highly tailored firmware recommendations for individual network device clusters of individual customers taking the above described factors into account.
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
56.
DYNAMIC BANDWIDTH CAPACITY CONTROL FOR ENTERPRISES
Systems and methods provide an affordable private bandwidth reservation and control solution for enterprises that can be implemented using both 5G and 4G core equipment. Namely, an enterprise can purchase/contract for a pre-determined amount of bandwidth (e.g., 1 Gbps) that a Communication Service Provider (CSP) will reserve for connected client devices of the enterprise that meet a set of criteria defined by the enterprise/CSP: i.e., dynamic bandwidth capacity control (DBCC) group criteria. Client devices that meet this DBCC group criteria may be “bound” to a DBCC group session. If a bound client device no longer meets the DBCC group criteria, the client device may be unbound from the DBCC group session. As client devices bind and unbind from a DBCC group session, examples can dynamically modify an aggregation bandwidth capacity control policy that defines bandwidth allocation for client devices bound to the DBCC group session.
H04L 47/762 - Admission controlResource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions triggered by the network
Examples of the presently disclosed technology provide CAM-based circuits specially constructed to implement Boolean satisfiability problems involving k-XOR-SAT clauses. With the strategic addition of auxiliary counting and logic circuits that evaluate match line voltage outputs of a CAM at k discrete times in order to determine whether a counted number of matches returned by a match line satisfies a pre-determine parity condition—where k represents a number of literals of a k-XOR-SAT clause of a Boolean satisfiability problem—a circuit of the present technology can leverage a common CAM (i.e., the same CAM) to implement the k-XOR-SAT clause and k-SAT clauses. Accordingly, this extremely versatile circuit can be used to implement k-XOR-SAT and k-SAT-k-XOR-SAT hybrid problems in less time, and with less hardware and power consumption than existing hardware accelerators.
G11C 15/04 - Digital stores in which information comprising one or more characteristic parts is written into the store and in which information is read-out by searching for one or more of these characteristic parts, i.e. associative or content-addressed stores using semiconductor elements
H03K 19/21 - EXCLUSIVE-OR circuits, i.e. giving output if input signal exists at only one inputCOINCIDENCE circuits, i.e. giving output only if all input signals are identical
In some examples, a forwarding device detects a network loop for a port of the forwarding device. Based on determining that the quantity of network loop detections for the port exceeds a threshold, the forwarding device adds a first information element indicating an identity of the forwarding device to a payload of a loop protect packet, and sends the loop protect packet containing the first information element from the port to the network.
Systems and methods are provided for testing sockets, such as but not limited to CPU and GPU sockets. Systems and methods disclosed herein utilize a test card that has a test component and an adaptor Printed Circuit Board. The adaptor Printed Circuit Board (PCB) is configured to connect with a corresponding socket type on a motherboard and serves as an interface between the test component and a socket of the corresponding socket type. The test component includes logic that simulates a test function to test the socket. By connecting the test card to a socket using the adaptor PCB, the socket can be tested by simulating the test function on the test card.
In some examples, a system combines modified data tracking structures in a plurality of computer nodes into a combined tracking data structure, where a modified data tracking structure includes indicators of modified data portions in a network-attached memory. The system stores the combined tracking data structure at the network-attached memory. As part of an incremental data backup operation, the system uses the combined tracking data structure to provide the modified data portions from the network-attached memory to a backup storage system.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
Cooling module includes a mounting element, a force application member, a lever, and a cold plate movably coupled to the mounting element. The mounting element having engagement members, is coupled to a receptacle of an electronic device that is configured to receive a removable electronic device at the receptacle. The force application member having spring fingers, is disposed between the mounting element and the cold plate, and movable relative to the mounting element. The lever is connected to the mounting element and the force application member and shiftable between actuated and unactuated states. In the actuated state, the lever pushes the force application member along a first direction causing the engagement members to move the force application member along a second direction perpendicular to the first direction and urge the cold plate to compress the spring fingers and establish thermal contact between the cold plate and the removable electronic module.
In certain embodiments, a method includes providing, by an inter-process communication (IPC) manager, an initial prioritized message access list information set; receiving a second request for at least one prioritized message access list; and providing a prioritized message access list within a shared memory pool. The prioritized message access list may include a prioritized message access list identifier, an intra-list priority range, and a prioritized message access list size. The method may also include parsing, by the IPC manager, a message posted to the prioritized message access list to determine a time at which to alert a receiving process about the message; notifying the receiving process at the determined time; and decrementing, in response to the receiving process consuming the message, a message reference count.
Example implementations relate to performance analysis of jobs in computing clusters. In some examples, a processor detects a trigger event in a computing cluster, and identifies a computing job associated with the trigger event. The processor determines a time window associated with trigger event, and determines compute nodes executing the computing job during the time window. The processor determines database attributes associated with the compute nodes, and obtains data values for the determined database attributes in the determined time window. The processor determines whether the data values are correlated to the trigger event base according to a diagnostic rule. In response to a determination that the data values are correlated to the trigger event base according to the diagnostic rule, the processor determines provides an indication of a degraded performance for the computing job.
A base station transmits indications to a wireless device. The indications include: a wake-up indication indicating downlink control channel monitoring, for a plurality of cells, during a discontinuous reception (DRX) on duration of a DRX cycle; and a dormancy indication indicating a switching to a dormant bandwidth part of a cell, from the plurality of cells, to stop downlink control channel monitoring. During the DRX on duration and based on transmitting both the wake-up indication and the dormancy indication, the base station: stops transmitting a downlink control channel on the cell, while maintaining the cell activated; and receives a channel state information report for the dormant bandwidth part.
A method and system for providing web resources through a zero trust network environment are provided. The system comprises receiving a request from a client device to access a web resource through a zero trust network environment, wherein the web resource is external to the zero trust network environment, the request including a first uniform resource locator (URL), and the resource further including a second URL; fetching the web resource based on the first URL; generating an alternate resource, the alternate resource including an alternate URL replacing the second URL; and providing the alternate resource to the client device.
Examples described herein relate to monitoring a carbon efficiency metric associated with a data center and determining a recommendation to improve the carbon efficiency metric. A data processing device may determine a carbon efficiency metric associated with a data center based on determining a power consumption of an infrastructure device of the data center. The data processing device may determine the carbon efficiency metric further based on estimating a performance of the infrastructure device based on the power consumption. The data processing device may also determine a recommendation to change the data center to improve the carbon efficiency metric based on predicting, using a machine learning model and based on a time-series dataset, whether the carbon efficiency metric is associated with a temporary event. The data processing device may provide the recommendation to an output device.
In some examples, a proxy system establishes a client-side secure network tunnel between the proxy system and a client device, and establishes a plurality of server-side secure connections between the proxy system and respective servers of a trust network. The proxy system load balances a plurality of connections of the client device in the client-side secure network tunnel across the servers of the trust network through respective server-side secure connections of the plurality of server-side secure connections.
In some examples, a load balancer establishes respective secure connections between the load balancer and a plurality of destination servers in a trust network, and performs load balancing of encrypted virtual private network (VPN) traffic across the destination servers. The load balancer receives an encrypted data packet from a client device, the encrypted data packet including a VPN message header having a destination identification field relating to identifying a destination server in the trust network. The load balancer determines whether a selected destination server in the trust network is identified based on a value of the destination identification field in the VPN message header, the selected destination server being one of the plurality of destination servers. Based on determining that the selected destination server is identified based on the value of the destination identification field in the VPN header, the load balancer sends the encrypted data packet to the selected destination server.
In some examples, a security processor receives, from a first management device, measurement data of one or more second management devices. The measurement data is computed at the one or more second management devices based on information in the one or more second management devices and sent from the one or more second management devices to the first management device. The security processor stores the measurement data in a secure storage of the security processor, and provides a representation of the measurement data to validate an integrity of the information in the one or more second management devices.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
In certain embodiments, a method includes receiving, in association with a configuration of a proposed cloud solution, a selection of a first cloud solution aspect made by a user of a guidance tool, and generating, using a hybrid recommender system, a recommendation for a subsequent selection of a second cloud solution aspect of the configuration of the proposed cloud solution. The hybrid recommender system may include a collaborative filtering system and a content-based filtering system, and may generate the recommendation according to information that includes user information, prior configuration information, and the selection. The method further includes providing the recommendation to the user via a user interface of the guidance tool; receiving the subsequent selection; and generating, by the guidance tool, a proposed cloud solution output based at least in part on the selection and the subsequent selection.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
71.
HANDLING MULTICAST DEVICE LATENCIES THROUGH SELECTIVE JOIN FORWARDING
A switch receives a first query which requests a response from all hosts in the network, wherein the switch is a next-hop switch of a first set of the hosts in a multicast group, wherein the first query is an Internet Group Management Protocol (IGMP) all-host query message, and wherein the first query is generated by an IGMP querying host and transmitted via one or more intermediate switches. The switch tracks join messages received from the first set of the hosts in response to the first query, wherein a respective join message indicates that a corresponding host is to remain in the multicast group. Responsive to determining that the tracked join messages meet a predetermined threshold, the switch consolidates the tracked join messages by forwarding a reduced number of join messages, thereby reducing a total number of join messages propagated to the IGMP querying host via the intermediate switches.
A system for assembling a riser cage bracket is disclosed. The system includes a riser cage body, a first riser cage window, and a second riser cage window. The first and second riser cage windows are configured to be interchangeably and removably connectable to the riser cage body to assemble the riser cage bracket. The first riser cage window is configured to, when connected to the riser cage body, define a first space between the riser cage body and the first riser cage window to receive a full-height expansion card detachably coupled to the riser cage bracket. The second riser cage window is configured to, when connected to the riser cage body, define a second space between the riser cage body and the second riser cage window to receive a low-profile expansion card detachably coupled to the riser cage bracket.
A process includes creating, by a kernel of a distributed system, entries in a storage replica table, which are associated with a guest physical memory address. The process includes storing, by the kernel, data in the entries associating the entries with respective versions of content for the guest physical memory address; storing, by the kernel, data in the entries associating the entries with respective stable storage block addresses; and storing, by the kernel, data in the entries associating the entries with respective real physical memory addresses. The process includes, responsive to a read request to read content associated with a first version of the versions, accessing, by the kernel, the storage replica table. The process includes, responsive to the accessing the storage replica table, identifying, by the kernel, a first entry of the entries associated with the first version. The first entry contains data associating the first entry with a first real physical memory address. The process includes reading, by the kernel, data from the first real physical memory address.
An example optical system having an optical supply sub-system for supplying light to a photonic integrated circuit is presented. The optical supply sub-system includes a primary light source, an auxiliary light source, a first optical coupler, and a second optical coupler. The first optical coupler includes a first metal-oxide-semiconductor capacitor microring resonator (MOSCAP MRR) and the first optical coupler includes a second MOSCAP MRR. The first optical coupler is coupled to the primary light source and the photonic integrated circuit to control the propagation of the primary light to the photonic integrated circuit. The auxiliary light source may be configured to generate an auxiliary light when the primary light source malfunctions and the first MOSCAP MRR and the second MOSCAP MRR are controlled to control propagation of the auxiliary light from the auxiliary light source to the photonic integrated circuit.
G02B 6/293 - Optical coupling means having data bus means, i.e. plural waveguides interconnected and providing an inherently bidirectional system by mixing and splitting signals with wavelength selective means
G02B 6/35 - Optical coupling means having switching means
G02F 1/025 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulatingNon-linear optics for the control of the intensity, phase, polarisation or colour based on semiconductor elements having potential barriers, e.g. having a PN or PIN junction in an optical waveguide structure
76.
HARDWARE OFFLOAD OF MULTICAST CONTROL PLANE FUNCTIONS
One aspect can provide a system and method for tunnel-based multicasting. During operation, a source-side designated router (DR) coupled to a source device of a multicast group can broadcast a service-advertisement packet and receive a response packet from a client-side DR coupled to one or more client devices within the multicast group. The source-side DR can determine an address of the client-side DR based on the received response packet and establish a hardware-based communication tunnel between the source-side DR and the client-side DR using the address of the client-side DR. Establishing the hardware-based communication tunnel can include using hardware logic units to encapsulate multicast data packets originating from the source device. The source-side DR can further send, over the hardware-based communication tunnel, multicast data packets originating from the source device to the client-side DR, which forwards the multicast data packets to the client devices within the multicast group.
A technique includes registering, with a core of an operating system kernel, a hook that corresponds to a file event and associates the file event with an event-driven module of the operating system kernel. The core is associated with an integrity measurement architecture policy. The technique includes, responsive to an occurrence of the file event, triggering execution of the event-driven module to extend a scope of the integrity measurement architecture policy. Executing the module includes the operating system kernel determining a property of a file that is associated with the file event; and filtering a set of rules of an extended integrity measurement policy based on the property. The filtering includes identifying a given rule of the set of rules having a condition that is contingent on the file event being associated with the property. Executing the module includes the operating system kernel identifying an integrity measurement-affiliated action of the given rule and performing the integrity measurement-affiliated action on the file.
A system and method for configuring a client device to communicate utilizing a secure web gateway. The method includes generating a virtual network interface having a namespace with a plurality of names, wherein a first name of the namespace is assigned to a client device; assigning a second name of the namespace to a resource accessible to the client device through a zero trust network environment, wherein the resource is deployed in a secure network environment; and configuring the client device to communicate only through the virtual network interface.
A system and method for providing file scanning between a client device and a resource through a zero trust network environment (ZTNE) are disclosed. The method includes detecting in network traffic between the client device and the ZTNE a request to receive a first content from a resource deployed in a private network, wherein the resource is accessible to the user device making first request through the ZTNE; detecting in network traffic between the client device and the ZTNE a second request to send a second content from the client device to a public network, wherein the public network is accessible to the user device making the second request through the ZTNE; sending the request to the public network, in response to determining that the second content is allowable; and blocking the request to the public network, in response to determining that the second content is not allowable network traffic.
In certain embodiments, a computer-implemented method includes instructing display of a user interface that includes a multiselect component having open and closed states and providing an ability to select multiple options from an options list that includes plural options, a first portion of which is displayed in the open state. The method includes detecting activation of a control to transition from the closed to the open state and instructing, in response to detecting, in the open state, navigation to a particular option, playback by a screen reader of an announcement indicating a name of the particular option and whether the particular option is selected. The method includes instructing, in response to detecting, in the open state, selection of a first option of the first portion, playback by a screen reader of an announcement indicating a name of the first option and that the first option has been selected.
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
81.
UNIFIED SCALE-UP/SCALE-OUT INFRASTRUCTURE FOR COMPOSABLE SYSTEMS
Systems and methods are provided for implementing an abstraction layer above the hardware devices with a management controller so that these hardware devices can be combined and presented to the user as a single device for deploying the function. The management controller provides a software interface that provides access to the hardware devices, in a combined or separated state, and generate dynamic configurations of the devices without unplugging any of the hardwired connections. The hardware devices remain connected while they are unused until the function is deployed on one or more of them. The management controller combines the computing functionality of the hardware devices to provide seamless “device” for executing the function/service, which increases the processing power available for the requested function/service.
An example method for managing wake schedules of client devices is presented. A wireless networking device determines a value of a data traffic characteristic of a client device based on monitoring of data traffic associated with the client device. If it is determined that the client device is capable of implementing the TWT mechanism, the wireless networking device may set a wake schedule for the client device based on the value of the data traffic characteristic. Once the wake schedule is set, the wireless networking device communicates with the client device as per the wake schedule. In some examples, the wireless networking device may set custom wake schedules for different client devices when the client devices have different behaviors for the same data traffic characteristic. Further, in certain examples, the wireless networking device may even set custom wake schedules for different activity periods for the same client device.
Electronic port includes a receptacle and a locking assembly having a clamping module and a fastener. The receptacle includes first, and second retainer members being configured to releasably hold a connector of an electronic plug. The clamping module includes a first clamp member having first engagement members, and a second clamp member movably coupled to the first clamp member and having second engagement members, the first and second engagement members are aligned with the first and second retainer members. The fastener is movably coupled to the clamping module to transition the clamping module between fastened and unfastened states by moving the first and/or second clamp members relative to the receptacle. In the unfastened state, the first and second retainer members are allowed to release the connector, and in the fastened state, the first and second engagement members engage the first and second retainer members and prevent from releasing the connector.
H01R 43/26 - Apparatus or processes specially adapted for manufacturing, assembling, maintaining, or repairing of line connectors or current collectors or for joining electric conductors for engaging or disengaging the two parts of a coupling device
84.
ANALYZING AND RECOMMENDING ROGUE CLASSIFICATION POLICIES FOR A COMMUNICATION NETWORK
In certain embodiments, a method performed by a processing device includes obtaining, at multiple times, rogue classification information for electronic devices detected within a communication network. The rogue classification information for each time includes: timestamp information identifying the time; corresponding sets of attribute values for the electronic devices detected within the communication network at the time; and respective rogue classifications, as determined according to active rogue classification policies and the corresponding sets of attribute values, for the electronic devices. The method includes analyzing the rogue classification information for the multiple times to determine whether to modify the active rogue classification policies by analyzing, using a statistical machine learning algorithm, the respective rogue classifications and the corresponding sets of attribute values for the electronic devices for the multiple times. The method includes generating, in response to determining to modify the active rogue classification policies, a recommended rogue classification policy.
G06F 18/2415 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
A computing device comprises a primary printed circuit board (PCB), one or more computing components mounted to the primary PCB, a baseboard management controller (BMC) mounted to the primary PCB, a power subsystem, and a logic device coupled to the primary PCB. The power subsystem comprises a power controller with a first logic pin, and the logic device is communicably connected to the first logic pin. The logic device is configured to program the power controller by placing the power controller in a programming mode and inputting programming information into the power controller via the first logic pin.
Systems and methods sanitize computer code. In particular, fragile portions of computer code are identified based on instances of bug/defect-related churn data associated with the computer code. A control flow graph representative of the computer code may be generated, the control flow graph including nodes and edges. Nodes whose source location falls within the reported fragile sections are identified, and may be flagged as being susceptible. Thereafter, a sanitizer is run on the flagged nodes.
A process includes receiving, by a first proxy for a first microservice consumer of a plurality of microservice consumers, a first request from the first microservice consumer associated with a usage of a resource. The resource is shared by the plurality of microservice consumers. The process includes allowing, by the first proxy, the first request responsive to a cumulative usage of the resource by the first microservice consumer complying with a predefined consumption quota for the first microservice consumer; and responsive to allowance of the first request, receiving, by a second proxy for the resource, a second request associated with the usage. The process includes responsive to the second request, controlling, by the second proxy, whether the usage is permitted responsive to a predefined capacity quota for the resource.
In some examples, a system receives a request to recover a program. The system accesses metadata associated with a recovery copy of information for the program, and determines, based on the metadata, a compatibility of a storage arrangement of data in the recovery copy with the program. The system determines whether to fully recover the program using the recovery copy or to partially recover the program based on the determined compatibility.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
89.
REMOTE SERVER ISOLATION UTILIZING ZERO TRUST ARCHITECTURE
A zero trust cloud environment provides access to a secure network, and secure network applications. The zero trust cloud environment performs authentication of a user account, and upon successful completion initiates a secure network application, such as an SSH session to a server in a secure network. The server is instructed to generate an isolated network namespace through which a virtual network interface is bridged to the default network namespace. A firewall of the default network namespace does not permit network traffic from the virtual network interface to pass if it is directed to an address of the secure network.
Systems and methods are provided for performing element-wise multi-vector multiplication. An example includes a waveguide to receive an input optical signal encoded with a first vector and output an output optical signal. One or more optical-to-electrical (O/E) converters are provided to receive one or more optical signals encoded with one or more vectors and generate one or more electrical signals based on the received one or more optical signals. One or more optical modulators are optically coupled to the waveguide and electrically coupled to the one or more O/E converters, the one or more optical modulators modulate an intensity of the input optical signal on the waveguide based on the one or more electrical signals. The output optical signal is encoded with a product of the first vector and the one or more vectors.
G06N 3/067 - Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using optical means
G02F 1/21 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulatingNon-linear optics for the control of the intensity, phase, polarisation or colour by interference
91.
SYSTEM AND METHOD FOR CLIENT-BASED TRAFFIC CONTROL UTILIZING DOMAIN CATALOG
A system and method for directing network traffic in a client device based on a domain catalog. The method includes generating a virtual network interface having a namespace with a plurality of names, wherein a first name of the namespace is assigned to a client device; assigning a second name of the namespace to a resource accessible to the client device through a zero trust network environment; configuring the client device to communicate only through the virtual network interface; and sending network traffic to the resource, in response to determining that the resource is allowed based on a domain catalog.
A system and method for facilitating communication between a user device and a web application through a zero trust network providing a secure web gateway using authentication cookies. The method includes receiving network traffic from a user device including an altered authentication cookie, the network traffic directed at a web application; retrieving an original authentication cookie based on the altered authentication cookie; generating a new network traffic based on: the received network traffic, and the original authentication cookie; and sending the new network traffic from the zero trust network environment to the web application.
A networking device includes communication interfaces, a System-on-Chip (SoC), and pseudo-sleep mode logic. The SoC includes a processor, a memory, an internal PHY module, and other internal SoC modules. The pseudo-sleep mode logic is configured to detect receipt of a sleep command and, in response, cause the networking device to enter a pseudo-sleep mode in which the internal SoC modules are powered off, except for the internal PHY module, the processor, and the memory, which remain powered on. The logic is also configured to detect receipt of a wake command while the networking device is in the pseudo-sleep mode and, in response, cause the networking device to exit the pseudo-sleep mode.
Techniques are provided for discerning energy consumption and carbon footprint data associated with hardware-as-a-service resources, and managing workloads based on carbon cost metrics. A management interface collects energy consumption information associated with a plurality of servers processing workloads in a cloud computing environment. The management interface monitors energy consumption in the plurality of servers. An energy consumption manager calculates carbon cost metrics for the plurality of servers based on the energy consumption information; identifies a subset of the servers as being underutilized based on the carbon cost metrics; and calculates an overall carbon cost of the plurality of servers. A workload manager generates container platform operation labels for the plurality of servers when the overall carbon cost is below a threshold value, such that a workload scheduled on the container platform migrates to one of the servers based on the container platform operation labels.
A network interface controller (NIC) capable of efficient load balancing among the hardware engines is provided. The NIC can be equipped with a plurality of ordering control units (OCUs), a queue, a selection logic block, and an allocation logic block. The selection logic block can determine, from the plurality of OCUs, an OCU for a command from the queue, which can store one or more commands. The allocation logic block can then determine a selection setting for the OCU, select an egress queue for the command based on the selection setting, and send the command to the egress queue.
G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
G06F 12/1036 - Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB] for multiple virtual address spaces, e.g. segmentation
G06F 12/1045 - Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB] associated with a data cache
G06F 13/14 - Handling requests for interconnection or transfer
G06F 13/16 - Handling requests for interconnection or transfer for access to memory bus
G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
H04L 47/24 - Traffic characterised by specific attributes, e.g. priority or QoS
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
H04L 47/2466 - Traffic characterised by specific attributes, e.g. priority or QoS using signalling traffic
H04L 47/2483 - Traffic characterised by specific attributes, e.g. priority or QoS involving identification of individual flows
H04L 47/30 - Flow controlCongestion control in combination with information about buffer occupancy at either end or at transit nodes
H04L 47/32 - Flow controlCongestion control by discarding or delaying data units, e.g. packets or frames
H04L 47/34 - Flow controlCongestion control ensuring sequence integrity, e.g. using sequence numbers
H04L 47/52 - Queue scheduling by attributing bandwidth to queues
H04L 47/62 - Queue scheduling characterised by scheduling criteria
H04L 47/625 - Queue scheduling characterised by scheduling criteria for service slots or service orders
H04L 47/6275 - Queue scheduling characterised by scheduling criteria for service slots or service orders based on priority
H04L 47/629 - Ensuring fair share of resources, e.g. weighted fair queuing [WFQ]
H04L 47/76 - Admission controlResource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
H04L 47/762 - Admission controlResource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions triggered by the network
H04L 49/9005 - Buffering arrangements using dynamic buffer space allocation
H04L 49/9047 - Buffering arrangements including multiple buffers, e.g. buffer pools
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
H04L 69/28 - Timers or timing mechanisms used in protocols
H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
96.
DATATYPE ENGINE TO SUPPORT HIGH PERFORMANCE COMPUTING
A method and apparatus are provided for facilitating a datatype engine (DTE) to support high performance computing. A network interface card (NIC) receives, via a message passing interface, a command to read data from a host memory. The NIC determines that the command indicates a first datatype descriptor stored in the NIC. The NIC forms, based on the command, a packet which indicates a base address and a length associated with the data to be read from the host memory and passes the packet to the DTE. The DTE generates a plurality of read requests comprising offsets from the base address and corresponding lengths based on the first datatype descriptor. The DTE passes the plurality of read requests to a direct memory access module, thereby allowing the NIC to access the host memory while eliminating copies of the data on the host during transfer of the command across a network.
A network interface card (NIC) receives packets corresponding to a read or write request, the packets associated with a datatype descriptor stored in a datatype engine of the NIC, and each packet associated with a precomputed context which indicates a value for each dimension of a multi-dimensional array and a start location of the respective packet within a host memory block. The NIC generates, for a respective packet, a datatype handle corresponding to the datatype descriptor and an offset indicating a position of the respective packet within the packets. The NIC determines, based on the datatype handle and the offset, a cached context for the respective packet and initializes the datatype engine based on the cached context. The datatype engine generates, based on the cached context, read or write requests comprising addresses and lengths, thereby allowing the NIC to process out-of-order packets based on the precomputed and cached context.
G06F 12/0802 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
G06F 5/06 - Methods or arrangements for data conversion without changing the order or content of the data handled for changing the speed of data flow, i.e. speed regularising
G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
98.
TRANSMIT POWER MANAGEMENT FOR RADIOS IN A WIRELESS NETWORKING DEVICE
An example method for adjusting transmit powers of radios in a wireless networking device is presented. For the wireless networking device, a network management device may determine a difference between a first free-space path loss corresponding to a first Wireless-Fidelity (Wi-Fi) band and a second free-space path loss corresponding to a second Wi-Fi band. The network management device may then set transmit powers of a first radio dedicated to the first Wi-Fi band and a second radio dedicated to the second Wi-Fi band respectively to a first transmit power and a second transmit power based on the difference. Accordingly, the wireless networking device communicates via the first radio at the first transmit power and the second radio at the second transmit power.
In some examples, a processor receives a first request to allocate a memory region for a collective operation by process entities in a plurality of computer nodes. In response to the first request, the processor creates a virtual address for the memory region and allocates the memory region in a network-attached memory coupled to the plurality of computer nodes over a network. The processor correlates the virtual address to an address of the memory region in mapping information. The processor identifies the memory region in the network-attached memory by obtaining the address of the memory region from the mapping information using the virtual address in a second request. In response to the second request, the processor performs the collective operation.
Auxiliary module includes attachment elements, cooling component, and auxiliary PCA having a circuit board, an electrical connector, and electronic components. The attachment elements are configured to attach the auxiliary module to supporting arms protruding from the PCA such that the electrical connector is coupled to a complementary electrical connector of the PCA, and the attachment elements extend through apertures in the supporting arms. The cooling component is attached to the auxiliary PCA and includes a first portion thermally coupled to cooling conduit in an installed state of the auxiliary module and a second portion thermally coupled to the electronic components in an attached state of the cooling component to the auxiliary PCA. In an attached state of the auxiliary module to the supporting arms and a coupled state of the electrical connector with the complementary electrical connector, the auxiliary module is movable along multiple directions relative to the supporting arms.