Abstract:
Several deterrence mechanisms suitable for content distribution networks (CDN) (120) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechanism, an attacker is required to generate O(n ) amount of traffic to victimize a CDN-hosted site (120) when the site content is served from n CDN caches. Without these modifications, the attacker must generate only 0(n) traffic to bring down the site. The site allocation scheme provides sufficient isolation among CDN-hosted Web sites (120) to prevent an attack on one Web site from making other sites unavailable. Using an allocation strategy based on binary codes, it can be guaranteed that a successful attack on any individual Web site that disables its assigned servers, does not also bring down other Web sites hosted by the CDN (120).
Abstract:
The present invention provides a method, computer program product, and data processing system for efficiently recovering state and performing failover of a network offload engine (904). The present invention distinguishes between the hard state and the soft state of a protocol. Hard state is state information that, when lost, leads to incorrect protocol behavior. Soft state is state information that may be lost or become inconsistent without loss of correctness. The present invention ensures correctness by always being able to recover (1002) the hard state of the protocol. A preferred embodiment of the present invention performs a failover of a network offload engine (904) by temporarily blocking (908) the reception of network packets, recovering (1002) hard state from host information, resuming network operation using a substitute network offload engine (906), and recovering (1008) soft state from the subsequent network activity.
Abstract:
PROBLEM TO BE SOLVED: To provide a method and system for generating an annotated network topology. SOLUTION: A method of generating an annotated network topology of a network is disclosed. The method includes determining available band width "B" of a network, on a network path connecting a pair of endpoints by performing Transfer Control Protocol (TCP) flows between the pair of endpoints, with the network having a plurality of network paths; identifying a bottleneck link in the network path; and annotating all edges in a network path, wherein available bandwidth annotation of the links inside the network is determined using end-to-end network measurements. A system for generating the annotated network topology of a network is also disclosed. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
In one embodiment, the present invention is a method and an apparatus for failure-resilient forwarding of data over a computer network. In one embodiment, a marker is introduced into the data stream, e.g., at the sending node, and allows, in turn, forwarding nodes and/or receivers to efficiently track data stream reception. The marker functions as a checkpoint for the data transport process, and is identified and indexed at each forwarding node and receiver. Each receiver saves the marker prior to delivering data to an application, thereby designating a point in the data stream at which all preceding data is confirmed to have been delivered to the application. Thus, if a forwarding node fails, the receiver may request stream data from an alternate forwarding node by specifying to the alternate forwarding node to provide data starting from the marker.
Abstract:
A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, a mechanism for improving connection establishment in a system utilizing an offload network adapter (730) is provided. The connection establishment mechanism provides the ability to offload connection establishment (1030) and maintenance of connection state information to the offload network adapter (730). As a result of this offloading of connection establishment (1030) and state information maintenance, the number of communications needed between the host system (710) and the offload network adapter (730) may be reduced. In addition, offloading of these functions to the offload network adapter (730) permits bulk notification of established connections and state information to the host system (710) rather than piecemeal notifications as is present in known computing systems.
Abstract:
Ein System, ein Verfahren und ein Programmprodukt für die Standortwahl von Ladestationen. Ein Bewegungserkennungsmodul erfasst Verkehrsdaten von Fahrzeugsensoren, die in einem Bereich verteilt sind. Ein Kartenanpassungsmodul kartiert den erkannten Verkehr in dem Bereich. Ein Fahrzeugstrommodul charakterisiert den kartierten Verkehrsstrom in Abhängigkeit von der Zeit. Eine Auswerteeinrichtung für die Anforderungen (EVR) von Elektrofahrzeugen (EV) ermittelt die optimale Anzahl von Ladestationen und die entsprechenden Standorte für die Standortwahl der Ladestationen.
Abstract:
A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, mechanisms for handling memory management and optimization within a system utilizing an offload network adapter are provided. The memory management mechanism permits both buffered sending and receiving of data as well as zero-copy sending and receiving of data. In addition, the memory management mechanism permits grouping of DMA buffers that can be shared among specified connections based on any number of attributes. The memory management mechanism further permits partial send and receive buffer operation, delaying of DMA requests so that they may be communicated to the host system in bulk, and expedited transfer of data to the host system.
Abstract:
Un método supervisa actividad de máquina de múltiples dispositivos de cómputo virtual que operan a través de al menos un dispositivo de cómputo físico al ejecutar un agente de supervisión. El método mide características de operación simples de solo un dispositivo de cómputo virtual de nivel base y supervisa características de operación complejas al medir las características por cada dispositivo de cómputo virtual, grabar las características de operación de cada dispositivo de cómputo virtual en una página de memoria correspondiente de cada dispositivo de cómputo virtual, y compartir cada página de memoria correspondiente con el dispositivo de cómputo virtual de nivel base, a través de canales de comunicaciones interdominios, para transferir las características de operación complejas al agente de supervisión. El método identifica y envía de salida eventos simples y eventos complejos por cada uno de múltiples dispositivos de cómputo virtual al evaluar las características de operación simples y las características de operación complejas.