Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for discovering a favorable remote Bluetooth device by a local Bluetooth device and connecting to it. SOLUTION: An inquiry scan cache is updated through a regular inquiry. A page scan cache is refreshed through a trial to connect to the favorable remote device. Regularly, more frequently than a regular inquiry scan, a list of available remote devices is formed by entries in an inquiry scan cache connected to each entry in the page scan cache which have succeeded in page scan. In one implementation configuration, a page scan cache holds a limited number of entries, and a policy of the term of validity is applied to respective added entries. In another configuration, an inquiry scan cache is also updated when a remote device tries to connect to a local device. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method for selecting a network and an interface which span a plurality of media. SOLUTION: This disclosed system facilitates automated network interface configuration decision-making, that spans a set of networks supporting communications via differing media. A set of media specific modules associated with differing communications media acquire network interface status/capabilities information. A rules engine thereafter applies a designated network selection rules to the acquired network interface status/capabilities information, and any other appropriate parameters attributable to either an interface or network, and selects one or more networks and interfaces, in order to establish/maintain a connection. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To effectively perform network identification. SOLUTION: A network fingerprinting component for a computerized system issues network identifiers (NID) to computer networks. Identity confidences may be determined for each issued network identifier with respect to current computer networks. Computer network attributes may include passive network attributes and active network attributes. Retrieving values for active network attributes involves generating network traffic. Therefore, passive network attributes may be available with the network fingerprinting component before active network attributes. Learnt identity confidence modifiers may be applied to identity confidences determined independently of active network attributes to achieve more accurate identity confidences sooner. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
Computerized methods, systems, and computer-storage media for allowing virtual machines (VMs) residing on a common physical node to fairly share network bandwidth are provided. Restrictions on resource consumption are implemented to ameliorate stressing the network bandwidth or adversely affecting the quality of service (QoS) guaranteed to tenants of the physical node. The restrictions involves providing a scheduler that dynamically controls networking bandwidth allocated to each of the VMs as a function of QoS policies. These QoS policies are enforced by controlling a volume of traffic being sent from the VMs. Controlling traffic includes depositing tokens into token-bucket queues assigned to the VMs, respectively. The tokens are consumed as packets pass through the token-bucket queues. Upon consumption, packets are held until sufficient tokens are reloaded to the token-bucket queues.
Abstract:
A network fingerprinting component for a computerized system issues network identifiers (NID) for computer networks. Identity confidences may be determined for each issued network identifier with respect to current computer networks. Computer network attributes may include passive network attributes and active network attributes. Retrieving values for active network attributes involves generating network traffic. As a result passive network attributes may be available to the network fingerprinting component before active network attributes. Learned identity confidence modifiers may be applied to identity confidences determined independent of active network attributes to achieve more accurate identity confidence sooner. Better learned identity confidence modifiers may be obtained by comparing identity confidences for a particular computer network determined independently of active network attributes with identity confidences for the computer network determined once active network attributes become available and then adjusting the learned identity confidence modifiers so as to minimize any differences.
Abstract:
A network fingerprinting component for a computerized system issues network identifiers (NID) for computer networks. Identity confidences may be determined for each issued network identifier with respect to current computer networks. Computer network attributes may include passive network attributes and active network attributes. Retrieving values for active network attributes involves generating network traffic. As a result passive network attributes may be available to the network fingerprinting component before active network attributes. Learned identity confidence modifiers may be applied to identity confidences determined independent of active network attributes to achieve more accurate identity confidence sooner. Better learned identity confidence modifiers may be obtained by comparing identity confidences for a particular computer network determined independently of active network attributes with identity confidences for the computer network determined once active network attributes become available and then adjusting the learned identity confidence modifiers so as to minimize any differences.