Abstract:
In one embodiment, the present invention is a method and an apparatus for failure-resilient forwarding of data over a computer network. In one embodiment, a marker is introduced into the data stream, e.g., at the sending node, and allows, in turn, forwarding nodes and/or receivers to efficiently track data stream reception. The marker functions as a checkpoint for the data transport process, and is identified and indexed at each forwarding node and receiver. Each receiver saves the marker prior to delivering data to an application, thereby designating a point in the data stream at which all preceding data is confirmed to have been delivered to the application. Thus, if a forwarding node fails, the receiver may request stream data from an alternate forwarding node by specifying to the alternate forwarding node to provide data starting from the marker.
Abstract:
Identifying traffic patterns to web sites based on templates that characterize the arrival of traffic to the web sites is provided. Based on these templates, determinations are made as to which web sites should be co-located so as to optimize resource allocation. Web sites whose templates are complimentary, i.e. a first web site having a peak in arrival traffic at time t1 and a second web site that has a trough in arrival traffic at time t1, are designated as being candidates for co-location. In addition, the templates identified for the traffic patterns of web sites are used to determine thresholds for offloading traffic to other servers. These thresholds include a first threshold at which offloading should be performed, a second threshold that takes into consideration the lead time needed to begin offloading, and a third threshold that takes into consideration a lag time needed to stop offloading of traffic.
Abstract:
Es wird ein Verfahren bereitgestellt, um festzustellen, dass ein Datenspeicher für ein Programm nicht ausreicht. Ein Prozessor kann einen Satz von markierten Daten empfangen, die einem Satz von Quellcode zugehörig sind. Der Prozessor kann einen Bereich des Codes ermitteln, dem die markierten Daten zugehörig sind. Der Prozessor kann einen ersten Satz von Anweisungen erzeugen, um eine erste Momentaufnahme eines variablen Speicherplatzes beim Eintreten in den Bereich und eine zweite Momentaufnahme des variablen Speicherplatzes beim Verlassen des Bereichs zu erstellen. Der Prozessor kann einen zweiten Satz von Anweisungen zum Vergleichen der ersten und der zweiten Momentaufnahme erzeugen, um eine Nutzungsmenge des variablen Speicherplatzes zu ermitteln. Der Prozessor kann einen dritten Satz von Anweisungen erzeugen, um als Reaktion darauf, dass die Nutzungsmenge des variablen Speicherplatzes einen Schwellenwert überschreitet, eine Aktion auszuführen. Der Prozessor kann den Code in eine ausführbare Datei kompilieren.
Abstract:
Quellcode einer goldenen Version und einer nächsten Version eines Programms, in dem Prozeduraufrufe so modifiziert werden, dass sie aus einer Eingangspunkttabelle (EPT) mit Indexnummern aufrufen, die Prozedurspeicheradressen entsprechen, wird empfangen. Ein ausführbares defektfreies Programm der goldenen Version und ein Programm der nächsten Version mit einem Defekt werden empfangen. Eine erste Eingangspunkttabelle (erste EPT) für das Programm der neuen Version und eine zweite EPT für das Programm der goldenen Version werden erzeugt. Eine Reihe von Ersetzungen von Prozeduren aus der zweiten EPT in der ersten EPT wird durchgeführt, und eine Ersetzungsreihenfolge umfasst: einen Modulsatz, ein Modul des Modulsatzes, einen Prozedursatz des Moduls und eine Prozedur des Prozedursatzes. Die Prozedur zum Erzeugen eines Defekts wird durch Ersetzen der Reihenfolge nach identifiziert, bis der Defekt nicht mehr vorhanden ist, und anschließend wird in der Reihenfolge mit dem nächsten Ersetzen fortgefahren.
Abstract:
Routing techniques are provided that meet performance objectives associated with an ad-hoc network environment and the like. The techniques of invention serve to substantially maximize the lifetime of the network. In one aspect o f the invention, a packet routing technique for use in a node of a distributed network comprises the following steps/operations. Queues for storing packets are maintained, wherein at least one queue is associated with a link existin g between the node and a neighboring node, and a queue has a height associated therewith. A route is then determined for one or more packets stored in the queues based on heights of queues at neighboring nodes, such that energy constraints associated with the node and the neighboring nodes are substantially maximized. As mentioned, the distributed network is preferably a mobile ad-hoc network wherein the node and the at least one neighboring node communicate over a wireless link.
Abstract:
Routing techniques are provided that meet performance objectives associated with an ad-hoc network environment and the like. The techniques of invention serve to substantially maximize the lifetime of the network. In one aspect o f the invention, a packet routing technique for use in a node of a distributed network comprises the following steps/operations. Queues for storing packets are maintained, wherein at least one queue is associated with a link existin g between the node and a neighboring node, and a queue has a height associated therewith. A route is then determined for one or more packets stored in the queues based on heights of queues at neighboring nodes, such that energy constraints associated with the node and the neighboring nodes are substantially maximized. As mentioned, the distributed network is preferably a mobile ad-hoc network wherein the node and the at least one neighboring node communicate over a wireless link.
Abstract:
A system and method for packet traceback in a network includes maintaining an identity number (ID) for each node in a network and generating a signature (e.g., a message authentication code (MAC)) using a secret key shared between each node on a forwarding path and a sink. Each forwarding node leaves a mark by appending its ID and a signature in the packet, either in a deterministic manner or with a probability. Upon receiving a packet at the sink, correctness of the signatures included in each packet is verified in the reverse order by which these signatures were appended. A last valid MAC is determined in the forwarding path to determine the locations of compromised nodes that collude in false data injection attacks.
Abstract:
A system and method for packet traceback in a network includes maintaining an identity number (ID) for each node in a network and generating a signature (e.g., a message authentication code (MAC)) using a secret key shared between each node on a forwarding path and a sink. Each forwarding node leaves a mark by appending its ID and a signature in the packet, either in a deterministic manner or with a probability. Upon receiving a packet at the sink, correctness of the signatures included in each packet is verified in the reverse order by which these signatures were appended. A last valid MAC is determined in the forwarding path to determine the locations of compromised nodes that collude in false data injection attacks.