Abstract:
Methods and apparatus for congestion control in computer networks achieve high burst tolerance, low latency and high throughput with shallow-buffered switches. A method for controlling congestion includes transmitting a set of data packets on a network connection from a first computing device to a second computing device, identifying each data packet in the set of data packets that experienced congestion on the network connection, sending, by the second computing device to the first computing device, a sequence of bits that represents the number of data packets in the set of data packets that were identified as having experienced congestion, and adjusting a rate of transmitting data packets on the network connection based on the sequence of bits sent to the first computing device.
Abstract:
A system and method for using a wireless beacon broadcast to provide a media message is disclosed. A first beacon broadcast is provided from a wireless access point, the first beacon broadcast having a first beacon component with a first portion of media. A second beacon broadcast is provided from the wireless access point, the second beacon broadcast having a second beacon component with a second portion of media. The first portion of media and the second portion of media are combinable to provide a complete media message.
Abstract:
Wireless communication techniques are described in which control and data are separated. In an implementation, a method is described which includes sending data packets on one or more wireless channels and sending control data relating to the data packets on at least one other wireless channel having a data rate that is lower than a data rate of the one or more wireless channels.
Abstract:
Aspects of the subject disclosure are directed towards monitoring application performance during actual use, particularly mobile application performance. Described is instrumenting mobile application binaries to automatically identify a critical path in user transactions, including across asynchronous-call boundaries. Trace data is logged by the instrumented application to capture UI manipulations, thread execution, asynchronous calls and callbacks, UI updates and/or thread synchronization. The trace data is analyzed to assist developers in improving application performance.
Abstract:
Techniques for enhancing throughput capacity available to client devices connected to a wireless local area network (WLAN) are described. Specifically, existing WLAN resources are converted into wireless access points (APs) to create a dense infrastructure of wireless APs. To leverage this dense AP infrastructure, central management techniques are employed. With client-to-AP mapping, these techniques are used to prevent discovery of multiple APs in a WLAN by a client device and to select a single AP (using certain policies) to associate with the client device and provide it with an enhanced wireless connection to the WLAN. Additionally, techniques are employed to centrally determine, using certain policies, when the AP should disassociate from the client device and when another centrally selected AP should respond to, and associate with, the client device to provide it with an enhanced wireless connection to the WLAN - without interrupting/disrupting the client device's access.
Abstract:
Wireless adapters are installed on one or more general purpose computing devices and are connected via a network in an enterprise environment. The adapters are densely deployed at known locations throughout the environment and are configured as air monitors. The air monitors monitor signals transmitted by one or more transceiver devices and records information about these signals. One or more analysis or inference engines may be deployed to obtain the recorded signal information and the air monitor locations to determine a location of the one or more wireless transceivers devices deployed in the environment.
Abstract:
Described is a technology by which additional network communications capacity is provided to an oversubscribed base network where needed, through the use of dynamically provisioned communications links referred to as flyways. A controller detects a need for additional network communications capacity between two network machines, e.g., between two racks of servers with top-of-rack switches. The controller configures flyway mechanisms (e.g., one per rack) to carry at least some of the network traffic between the machines of the racks and thereby provide the additional network communications capacity. The flyway mechanisms may be based on any wireless or wired technologies, including 60GHz technology, optical links, 802.11n or wired commodity switches.
Abstract:
A communication device cognitively monitors interference signals across a communication band so that adaptations for physical and medium access control (MAC) of data packet transmissions are appropriate for a particular interference signal. Characteristics of an interference signal of interest (e.g., bandwidth, power and/or duration relative to an average data packet transmitted over a communication channel of the communication device) are sensed for an appropriate adaptation (e.g., forward error correction, modulation technique, back off, request to send/clear to send protocol, etc.). Patterns for known types of interference sources can be compared so that when recognized an associated adaptation can be used.
Abstract:
Techniques for enhancing throughput capacity available to client devices connected to a wireless local area network (WLAN) are described. Specifically, existing WLAN resources are converted into wireless access points (APs) to create a dense infrastructure of wireless APs. To leverage this dense AP infrastructure, central management techniques are employed. With client-to-AP mapping, these techniques are used to prevent discovery of multiple APs in a WLAN by a client device and to select a single AP (using certain policies) to associate with the client device and provide it with an enhanced wireless connection to the WLAN. Additionally, techniques are employed to centrally determine, using certain policies, when the AP should disassociate from the client device and when another centrally selected AP should respond to, and associate with, the client device to provide it with an enhanced wireless connection to the WLAN - without interrupting/disrupting the client device's access.
Abstract:
Wireless communication techniques are described in which control and data are separated. In an implementation, a method is described which includes sending data packets on one or more wireless channels and sending control data relating to the data packets on at least one other wireless channel having a data rate that is lower than a data rate of the one or more wireless channels.