-
公开(公告)号:GB2494756B
公开(公告)日:2014-05-14
申请号:GB201214285
申请日:2012-08-10
Applicant: IBM
Inventor: VERMA DINESH C , PAPPAS VASILEIOS
IPC: H04L47/6275 , H04W72/12
Abstract: A method for scheduling a sequential transmission of a plurality of packets includes estimating a time when each of the plurality of packets waiting to be transmitted will be used by a device targeted to receive the plurality of packets, and mapping the time of each of the plurality of packets to a prioritization among the plurality of packets.
-
公开(公告)号:GB2494245A
公开(公告)日:2013-03-06
申请号:GB201214283
申请日:2012-08-10
Applicant: IBM
Inventor: VERMA DINESH C , PAPPAS VASILEIOS , HE TING
Abstract: A method for reducing bandwidth used in multiple transmissions on a cellular network includes mapping at least one request of at least one end-device 106, 107, 108 to a unicast channel between a server 103 and an intermediary 101 in the network, creating a correlated multicast communication channel between the intermediary and the at least one end-device, and transferring (or converting) data from the unicast channel 102 to a multicast channel 105b at the intermediary. The intermediary may be an edge device such as a base station, enodeB or Radio Network Controller or the like. The decision to switch from delivery of content by unicast to multicast instead to combine requests to content may be made for efficient use of the available network bandwidth. Consideration could be given to comparing the number of connection requests to a threshold, comparing the number of devices connected to the server to a threshold, determining the level of traffic between the server and the devices or determining the likelihood of content being requested (popularity) and comparing it to a threshold. The intermediary may identify the plural unicast streams using deep packet inspection or session tracking. Opportunistic transfer to push content for storage at the end-device before it is requested to avoid staggered unicast streams for the same content occurring later is also disclosed. The arrangement is particularly suitable for video content (stream) delivery or conferencing.
-
公开(公告)号:GB2464125A
公开(公告)日:2010-04-07
申请号:GB0818191
申请日:2008-10-04
Applicant: IBM
Inventor: MARTIN DANIEL JOSEPH , VERMA DINESH C
Abstract: A method, system and computer-usable medium are disclosed for discovering the topology of a network by using multiple discovery agents operating in parallel. A NodeList containing information about known nodes in a target network is received. The number (IC) of discovery agents to be used is determined and the nodes are partitioned into node groups, each of which has a group identifier respectively assigning it to a discovery agent. A GraphList is created to hold information about known and discovered nodes. Each entry in the NodeList list is processed by its assigned discovery agent, which sends probe messages to the target node to determine the node identifiers of discovered neighboring nodes. If the discovered nodes are not listed in the NodeList, then they are assigned to a node group for processing. If the connections between the target and the discovered neighboring node nodes are not listed in the GraphList, then they are added. Once all node and connection information is collected by the node discovery agents and listed in the GraphList, a network topology is generated.
-
公开(公告)号:DE112022001955T5
公开(公告)日:2024-02-22
申请号:DE112022001955
申请日:2022-04-07
Applicant: IBM
Inventor: SRIVATSA MUDHAKAR , VERMA DINESH C , SADAGOPAN SATISH , THOMAS MATHEWS , MANGLA UTPAL
Abstract: Ein auf einem Computer implementiertes Verfahren ermittelt eine Platzierung einer Anwendung, die zu einem Netzwerk hinzugefügt wird. Das Verfahren enthält ein Ermitteln einer logisch-physischen Zuordnung für die Anwendung. Untergraphen in der logisch-physischen Zuordnung werden erkannt. Eine gespeicherte Anwendung in einem Katalog von in dem Netzwerk zuvor verwendeten Anwendungen wird gesucht. Die gespeicherte Anwendung enthält einen der Untergraphen in der logisch-physischen Zuordnung. Mithilfe der Untergraphen wird ein Experiment erzeugt, das durch eine Datenverarbeitungseinheit durchgeführt wird, die ein Modell eines neuronalen Netzes ausführt. Das Experiment enthält ein Erzeugen einer Zuordnung von physischen Knoten für den Untergraphen. Eine einer Platzierung der Anwendung, die zu dem Netzwerk hinzugefügt wird, zugehörige Kostenfunktion bei einem oder mehreren physischen Knoten in der erzeugten Zuordnung von physischen Knoten wird ermittelt.
-
公开(公告)号:AU2021415837A1
公开(公告)日:2023-05-25
申请号:AU2021415837
申请日:2021-10-26
Applicant: IBM
Inventor: VERMA DINESH C , RILEY WAYNE B
IPC: G06Q10/08
Abstract: An apparatus for automating inventory procedures for items stored on shelves in a closed environment includes a mobile mechanical device having a movable appendage including a camera and additional sensory modalities. The camera and additional sensory modalities are used to position the movable appendage to take camera images of the items on the shelves from many different perspectives. Camera vision and the additional sensory modalities can be used to rotate, lower and raise movable appendage to position the appendage over and along the sides of the items on the shelf. The context of the mobile mechanical device is determined and edge AI computing retrieves AI context specific models based on the context. The AI context specific models may be downloaded from a cloud service. The edge AI computing uses the AI context specific models to identify and count the items on the shelf.
-
公开(公告)号:DE102014114010A1
公开(公告)日:2015-04-23
申请号:DE102014114010
申请日:2014-09-26
Applicant: IBM
Inventor: AGRAWAL DAKSHI , ANTHONY JUN , BISDIKIAN CHATSCHIK , SRIVATSA MUDHAKAR , VERMA DINESH C
Abstract: Zum sicheren Virtualisieren einer Mobilfunkeinheit wird ein Mobilfunk-Datenübertragungsnetzwerk verwendet, das Randknoten-Server als Basis-Übertragungsstationen aufweist. Eine virtualisierte Instanz des Host-Servers enthält eine virtualisierte Instanz einer Unternehmensumgebung. Basisstation-Controller tauschen Daten mit den Basis-Übertragungsstationen aus und steuern diese. Eine Mobilfunk-Vermittlungszentrale, die Daten mit den Basisstation-Controllern austauscht, enthält die virtualisierte Instanz des Host-Servers. Eine Mobilfunk-Datenübertragungseinheit tauscht Daten mit einem Randknoten-Server aus, und eine zusätzliche Datenanzeige- und Dateneingabeeinheit tauscht Daten mit der Mobilfunk-Datenübertragungseinheit aus, sodass sich die virtualisierte Instanz der Unternehmensumgebung auf dem Randknoten-Server befindet. Die Datenübertragungen zwischen der zusätzlichen Datenanzeige- und Dateneingabeeinheit sind verschlüsselt. Außerdem wird die Bewegung der Mobilfunk-Datenübertragungseinheit innerhalb des Mobilfunk-Datenübertragungsnetzwerks vorhergesehen, sodass die zusätzlichen fernen virtualisierten Instanzen der Unternehmensumgebung auf potenziellen künftigen Edge-Servern bereitgestellt werden.
-
公开(公告)号:GB2494245B
公开(公告)日:2013-08-07
申请号:GB201214283
申请日:2012-08-10
Applicant: IBM
Inventor: VERMA DINESH C , PAPPAS VASILEIOS , HE TING
Abstract: A method for reducing bandwidth used in multiple transmissions on a cellular network includes mapping at least one request of at least one end-device to a unicast channel between server and an intermediary in the network, creating a correlated multicast communication channel between the intermediary and the at least one end-device, and transferring data from the unicast channel to a multicast channel at the intermediary.
-
公开(公告)号:GB2498192A
公开(公告)日:2013-07-10
申请号:GB201200071
申请日:2012-01-04
Applicant: IBM
Inventor: NICHOLSON ROBERT , CILLIS CANIO , VERMA DINESH C , NAHUM ERICH , BILLAU RONALD , MOORE VICTOR , ANTHONY BRUCE JR , THORNE COLIN , BISDIKIAN CHATSCHIK
Abstract: A method for moving OSI layer 4 connections (such as Transport Control Protocol TCP) seamlessly between wireless User Equipments (UE) connected to a series of cell towers in applications where the connection is extracted out of the underlying cellular protocols at the towers. On detecting that a UE with a broken-out layer 4 connection has moved from a first to a second cell tower, traffic for an existing connection from the UE is tunneled between the first cell-tower and the second cell-tower. On identifying a predetermined trigger event, which may be natural or forced quiescence at the terminal, an ongoing bidirectional flow of packets is migrated to the second cell-tower.
-
-
-
-
-
-
-