Abstract:
In one embodiment, a method comprises detecting, by an access network computing node, a network service provided by a service provider for one or more identified endpoint devices via a wide area network connection, the access network computing node within an access network providing connections for the one or more identified endpoint devices to access the network service via the wide area network connection; detecting an unavailability of the network service via the wide area network connection; and supplying, by the access network computing node, at least a substitute of the network service for the one or more identified endpoint devices in response to the detected unavailability of the network service via the wide area network connection.
Abstract:
A precaching system identifies an object, such as a media file, that a user accesses and then analyzes a social graph of the user to identify social graph contacts that may be interested in the object. Based on the content of the object—and the interests and connections of contacts in the social graph—the precaching system determines whether a particular contact in the user's social graph is likely also to access the object. For example, the precaching system may determine a hit score corresponding to the object and a likelihood that the particular contact in the social graph will access the object. If the precaching system determines that the likelihood that the particular contact will access the object meets or exceeds a threshold probability level for precaching the object, the precaching system precaches the object near the contact in anticipation that the contact will access the object.
Abstract:
A precaching system identifies an object, such as a media file, that a user accesses and then analyzes a social graph of the user to identify social graph contacts that may be interested in the object. Based on the content of the object—and the interests and connections of contacts in the social graph—the precaching system determines whether a particular contact in the user's social graph is likely also to access the object. For example, the precaching system may determine a hit score corresponding to the object and a likelihood that the particular contact in the social graph will access the object. If the precaching system determines that the likelihood that the particular contact will access the object meets or exceeds a threshold probability level for precaching the object, the precaching system precaches the object near the contact in anticipation that the contact will access the object.
Abstract:
A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular network environment between a source and a receiver in the vehicular network environment, verifying the message is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies associated with the source, and blocking the message if the set of source flow control policies indicate the message is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in the set of source flow control policies does not match a level of access tagged on the message. In further embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver, and blocking the message if the set of receiver flow control policies indicates the message is not permitted.
Abstract:
In one embodiment, a device (e.g., a transmitter) determines a level of error protection of each bit position within symbols of a particular constellation map used for modulation-based communication, and also determines priority levels of application data bits to be placed into a communication frame. Application data bits may then be placed into symbols of the communication frame, where higher priority application data bits are placed into bit positions with greater or equal levels of protection than bit positions into which lower priority application data bits are placed. The communication frame may then be transmitted to one or more receivers with an indication of how to decode the placement of the application data bits within the symbols. In another embodiment, the particular constellation map may be dynamically selected from a plurality of available constellation maps, such as based on communication channel conditions and/or applications generating the data.
Abstract:
A system includes an on-board unit (OBU) in communication with an internal subsystem in a vehicle on at least one Ethernet network and a node on a wireless network. A method in one embodiment includes receiving a message on the Ethernet network in the vehicle, encapsulating the message to facilitate translation to Ethernet protocol if the message is not in Ethernet protocol, and transmitting the message in Ethernet protocol to its destination. Certain embodiments include optimizing data transmission over the wireless network using redundancy caches, dictionaries, object contexts databases, speech templates and protocol header templates, and cross layer optimization of data flow from a receiver to a sender over a TCP connection. Certain embodiments also include dynamically identifying and selecting an operating frequency with least interference for data transmission over the wireless network.
Abstract:
In one embodiment, a method comprises detecting, by an access network computing node, a network service provided by a service provider for one or more identified endpoint devices via a wide area network connection, the access network computing node within an access network providing connections for the one or more identified endpoint devices to access the network service via the wide area network connection; detecting an unavailability of the network service via the wide area network connection; and supplying, by the access network computing node, at least a substitute of the network service for the one or more identified endpoint devices in response to the detected unavailability of the network service via the wide area network connection.
Abstract:
A device includes a multistage filter and an elephant trap. The multistage filter has hash functions and an array. The multistage filter is operable to receive a packet associated with a candidate heavy network user and send the packet to the hash functions. The hash functions generate hash function output values corresponding to indices in the array. The elephant trap is connected to the multistage filter. The elephant trap includes a buffer and probabilistic sampling logic. The probabilistic sampling logic is operable to attempt to add information associated with the packet to the buffer a particular percentage of the time based in part on the result of the multistage filter lookup. The buffer is operable to hold information associated with the packet, counter information, and timestamp information.
Abstract:
A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular network environment between a source and a receiver in the vehicular network environment, verifying the message is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies associated with the source, and blocking the message if the set of source flow control policies indicate the message is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in the set of source flow control policies does not match a level of access tagged on the message. In further embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver, and blocking the message if the set of receiver flow control policies indicates the message is not permitted.
Abstract:
A precaching system identifies an object, such as a media file, that a user accesses and then analyzes a social graph of the user to identify social graph contacts that may be interested in the object. Based on the content of the object—and the interests and connections of contacts in the social graph—the precaching system determines whether a particular contact in the user's social graph is likely also to access the object. For example, the precaching system may determine a hit score corresponding to the object and a likelihood that the particular contact in the social graph will access the object. If the precaching system determines that the likelihood that the particular contact will access the object meets or exceeds a threshold probability level for precaching the object, the precaching system precaches the object near the contact in anticipation that the contact will access the object.