摘要:
In one embodiment, a computer-implemented method includes receiving a network graph describing a network having two or more nodes. An application graph is received describing a data stream application. The application graph includes one or more vertices, each corresponding to an operator of the application and associated with a list of nodes. A first vertex of the application graph corresponds to a first operator and is associated with two or more nodes. The application graph is augmented, which includes replicating the first operator such that the augmented graph includes a copy of the first operator at each of the nodes associated with the first vertex. The application is deployed over the network based on the augmented graph, such that a copy of the first operator is deployed at each of the nodes associated with the first vertex. A route through the augmented graph is selected for a data stream.
摘要:
Disclosed is a novel system and method for utilizing information gathered at a based station for tracking a trajectory of a mobile device. Three types of information may be used including radio-layer information, ID information, session based information, or a combination thereof. The information is gathered at cellular base-stations to localize a mobile device. Cell towers have wide penetration and extensive coverage, and base-stations/mobile-devices have access to a lot of information. In one example, a method for tracking mobile device locations at a based station begins with accessing a list of mobile device information previously collected from mobile devices communicatively coupled over the wireless communications network to the base station. Currently active mobile device information measured by the network elements is accessed. A trajectory of the mobile device communicatively coupled to the base station is estimated by mapping the list of information previously collected with the currently active mobile device information.
摘要:
A mechanism is provided for bandwidth-efficient virtual machine image delivery. Responsive to a request to generate a virtual machine (VM) in a node using an existing virtual machine image (VMI) file, a set of file chunks that constitute the VMI file is identified. The set of file chunks are retrieved from within a set of distributed nodes by establishing an optimized plan for retrieving the set of file chunks in a bandwidth-efficient manner. Responsive to retrieving the set of file chunks from within the distributed nodes, the set of file chunks are reassembled into the VMI file for generation of the VM.
摘要:
Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window.
摘要:
Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window.
摘要:
Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window.
摘要:
In one embodiment, a computer-implemented method includes receiving a network graph describing a network having two or more nodes. An application graph is received describing a data stream application. The application graph includes one or more vertices, each corresponding to an operator of the application and associated with a list of nodes. A first vertex of the application graph corresponds to a first operator and is associated with two or more nodes. The application graph is augmented, which includes replicating the first operator such that the augmented graph includes a copy of the first operator at each of the nodes associated with the first vertex. The application is deployed over the network based on the augmented graph, such that a copy of the first operator is deployed at each of the nodes associated with the first vertex. A route through the augmented graph is selected for a data stream.
摘要:
A mechanism is provided for bandwidth-efficient virtual machine image delivery. Responsive to a request to generate a virtual machine (VM) in a node using an existing virtual machine image (VMI) file, a set of file chunks that constitute the VMI file is identified. The set of file chunks are retrieved from within a set of distributed nodes by establishing an optimized plan for retrieving the set of file chunks in a bandwidth-efficient manner. Responsive to retrieving the set of file chunks from within the distributed nodes, the set of file chunks are reassembled into the VMI file for generation of the VM.
摘要:
In one embodiment, a computer-implemented method includes receiving a network graph describing a network having two or more nodes. An application graph is received describing a data stream application. The application graph includes one or more vertices, each corresponding to an operator of the application and associated with a list of nodes. A first vertex of the application graph corresponds to a first operator and is associated with two or more nodes. The application graph is augmented, which includes replicating the first operator such that the augmented graph includes a copy of the first operator at each of the nodes associated with the first vertex. The application is deployed over the network based on the augmented graph, such that a copy of the first operator is deployed at each of the nodes associated with the first vertex. A route through the augmented graph is selected for a data stream.
摘要:
Disclosed is a novel system and method for utilizing information gathered at a based station for tracking a trajectory of a mobile device. Three types of information may be used including radio-layer information, ID information, session based information, or a combination thereof. The information is gathered at cellular base-stations to localize a mobile device. Cell towers have wide penetration and extensive coverage, and base-stations/mobile-devices have access to a lot of information. In one example, a method for tracking mobile device locations at a based station begins with accessing a list of mobile device information previously collected from mobile devices communicatively coupled over the wireless communications network to the base station. Currently active mobile device information measured by the network elements is accessed. A trajectory of the mobile device communicatively coupled to the base station is estimated by mapping the list of information previously collected with the currently active mobile device information.