Abstract:
The present invention provides improved methods and devices for managing network congestion. Preferred implementations of the invention allow congestion to be pushed from congestion points in the core of a network to reaction points, which may be edge devices, host devices or components thereof. Preferably, rate limiters shape individual flows of the reaction points that are causing congestion. Parameters of these rate limiters are preferably tuned based on feedback from congestion points, e.g., in the form of backward congestion notification (“BCN”) messages. In some implementations, such BCN messages include congestion change information and at least one instantaneous measure of congestion. The instantaneous measure(s) of congestion may be relative to a threshold of a particular queue and/or relative to a threshold of a buffer that includes a plurality of queues.
Abstract:
A method includes establishing communication channels between an on-board unit (OBU) of a vehicle and a plurality of nodes, tagging each of a plurality of data from the plurality of nodes with a priority level, storing the plurality of data in a priority queue according to respective priority levels, selecting a medium to present a first data of the plurality of data to a user, and presenting the first data to the user via the medium. In the method, the plurality of nodes includes a remote node and an in-vehicle device. Another method includes receiving a data from a remote node, generating a plurality of data streams from the data and transmitting the plurality of data streams across a plurality of wireless interfaces. Another method includes enhancing audio signals from a plurality of microphones and speakers. Yet another method includes various gesture based user interfaces coupled to the OBU.
Abstract:
In one embodiment, a method comprises determining access network conditions by a network device in an access network, the access network providing communications between a client device and a destination reachable via a data network; selecting, by the network device based on the access network conditions, one of a plurality of coding methods for network traffic between the client device and the destination, including selecting coding parameters for the one coding method; and causing, by the network device, coding to be executed on the network traffic, on behalf of the client device, according to the one coding method and the selected coding parameters.
Abstract:
A method in one embodiment includes authenticating a first agent to an on board unit (OBU) of a vehicle if the first agent validates a first set of one or more authentication requirements and identifying a first identity profile corresponding to the first agent. The method also includes determining a role of the first agent in the vehicle and configuring the vehicle with the first identity profile, where the vehicle is configured based, at least in part, on the role of the first agent. In this embodiment, the first identity profile is one of a plurality of identity profiles provisioned on the OBU. In specific embodiments, each one of a plurality of agents corresponds to a respective one of the plurality of identity profiles, and includes one or more of a human agent, a machine device, a software agent, an authorized entity, and a mobile device.
Abstract:
A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular network environment between a source and a receiver in the vehicular network environment, verifying the message is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies associated with the source, and blocking the message if the set of source flow control policies indicate the message is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in the set of source flow control policies does not match a level of access tagged on the message. In further embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver, and blocking the message if the set of receiver flow control policies indicates the message is not permitted.
Abstract:
In one embodiment, a device (e.g., a transmitter) determines a level of error protection of each bit position within symbols of a particular constellation map used for modulation-based communication, and also determines priority levels of application data bits to be placed into a communication frame. Application data bits may then be placed into symbols of the communication frame, where higher priority application data bits are placed into bit positions with greater or equal levels of protection than bit positions into which lower priority application data bits are placed. The communication frame may then be transmitted to one or more receivers with an indication of how to decode the placement of the application data bits within the symbols. In another embodiment, the particular constellation map may be dynamically selected from a plurality of available constellation maps, such as based on communication channel conditions and/or applications generating the data.
Abstract:
A precaching system identifies an object, such as a media file, that a user accesses and then analyzes a social graph of the user to identify social graph contacts that may be interested in the object. Based on the content of the object—and the interests and connections of contacts in the social graph—the precaching system determines whether a particular contact in the user's social graph is likely also to access the object. For example, the precaching system may determine a hit score corresponding to the object and a likelihood that the particular contact in the social graph will access the object. If the precaching system determines that the likelihood that the particular contact will access the object meets or exceeds a threshold probability level for precaching the object, the precaching system precaches the object near the contact in anticipation that the contact will access the object.
Abstract:
A method includes establishing communication channels between an on-board unit (OBU) of a vehicle and a plurality of nodes, tagging each of a plurality of data from the plurality of nodes with a priority level, storing the plurality of data in a priority queue according to respective priority levels, selecting a medium to present a first data of the plurality of data to a user, and presenting the first data to the user via the medium. In the method, the plurality of nodes includes a remote node and an in-vehicle device. Another method includes receiving a data from a remote node, generating a plurality of data streams from the data and transmitting the plurality of data streams across a plurality of wireless interfaces. Another method includes enhancing audio signals from a plurality of microphones and speakers. Yet another method includes various gesture based user interfaces coupled to the OBU.
Abstract:
A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular network environment between a source and a receiver in the vehicular network environment, verifying the message is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies associated with the source, and blocking the message if the set of source flow control policies indicate the message is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in the set of source flow control policies does not match a level of access tagged on the message. In further embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver, and blocking the message if the set of receiver flow control policies indicates the message is not permitted.
Abstract:
In one embodiment, a router operating in a hierarchically routed computer network may receive collected data from one or more hierarchically lower devices in the network (e.g., hierarchically lower sensors or routers). The collected data may then be converted to aggregated metadata according to a dynamic schema, and the aggregated metadata is stored at the router. The aggregated metadata may also be transmitted to one or more hierarchically higher routers in the network. Queries may then be served by the router based on the aggregated metadata, accordingly.