摘要:
In one embodiment, a method includes receiving at a network device information on paths to a destination node, determining a number of common nodes or links between at least two of the paths, calculating a path diversity index based on the number of common nodes or links, and selecting a route to the destination node based on the path diversity index. An apparatus for calculating path diversity index for use in route selection is also disclosed.
摘要:
In one embodiment, a method includes receiving at a network device information on paths to a destination node, determining a number of common nodes or links between at least two of the paths, calculating a path diversity index based on the number of common nodes or links, and selecting a route to the destination node based on the path diversity index. An apparatus for calculating path diversity index for use in route selection is also disclosed.
摘要:
A technique performs route optimization of services provided by one or more service providers (SPs) for communication links that are combined in a computer network. According to the novel technique, performance characteristics and statistics (“link data”) for two or more combined links are merged to form link data for a single “virtual combined link.” Route optimization techniques (e.g., priority-based route optimization) may then be applied to one or more virtual combined links based on the combined link data, in addition to link data for zero or more conventional single links (physical or virtual). Illustratively, a route optimization technique may be used in accordance with the present invention to efficiently and accurately minimize costs associated with services provided by a plurality of SPs, wherein each SP charges for utilization of its service based on a tiered pricing structure. The tiered pricing structure comprises one or more tiers, wherein each tier correlates to an amount of service provided by the SP and an associated cost.
摘要:
In one embodiment, a plurality of connections couple to a plurality of service providers (SPs) that each provide services at a cost. The cost of the services of each SP is determined according to a tiered pricing structure that includes one or more tiers. Each tier correlates a particular amount of data transferred with the SP to a particular cost. A data collector collects measurement data that indicates an amount of data transferred with each SP. A processor selects a target tier in the tiered pricing structure of each SP based on the measurement data. The processor also generates a momentary target utilization rate (MTUR) for each SP based on the target tier for the SP and the measurement data. The processor then distributes utilization of services among the SPs based on the MTUR and tiered pricing structure of each SP to minimize the cost of the services provided by the SPs.
摘要:
A technique for efficiently and accurately minimizing costs associated with services provided by a plurality of service providers (SPs) that bill for their services based on a tiered cost structure. Target tiers are generated based on the utilization of the SPs' services and the SPs' cost structures. Utilization of the SPs' services is monitored. A momentary target utilization rate (MTUR) is generated for each SP based on the cumulated utilization of the SP's service and the SP's target tier. Utilization of the SPs' services is distributed based on the generated MTURs in a manner that minimizes cost. If the utilization of the SPs' services indicates the MTURs have been exceeded, new target tiers and MTURs are generated and utilization of the SPs' services is redistributed among the SPs in a manner that minimizes cost.
摘要:
An “ownership tag” in a special area of memory of a computer system identifies an owner of the computer system by displaying the ownership tag during initialization of the computer system. The ownership tag may be presented during the installation and execution of the Basic Input Output System. (BIOS) preferably during Power on Self Test (POST) process. An administrator may access the ownership tag by interrupting the process by pressing the an appropriate key, which transitions the computer to an administrator set up mode. An administrator able to enter the administrator password may then alter the contents of the protected memory, changing the ownership tag. The ownership tag is preferably stored in a region of memory not accessible to a typical user, but accessible to an administrator aware of the administrator password. The ownership tag is stored in a flash memory, which is very difficult to remove from the system board, or to modify without administrator-level security access. This makes it superior to conventional storage mechanisms such as RTC RPM, hard disk, etc. since these are easily modifiable and/or easily removable.
摘要:
According to one aspect, a method includes monitoring traffic between a first network element and a second network element, and determining when no packets have been sent from the first network element towards the second network element within a predetermined amount of time. When it is determined that no packets have been sent from the first network element towards the second network element within the predetermined amount of time, the method includes sending at least one smart probe packet from the first network element to the second network element
摘要:
An oral care composition includes an effective amount of calcium silicate particles. The calcium silicate particles have an average diameter of less than about 5 microns, such that they can occlude dentinal tubules of the teeth. An oral care method includes applying the composition to an oral cavity of a subject to reduce or inhibit hypersensitivity of the teeth and to achieve other benefits.
摘要:
According to one aspect, a method includes monitoring traffic between a first network element and a second network element, and determining when no packets have been sent from the first network element towards the second network element within a predetermined amount of time. When it is determined that no packets have been sent from the first network element towards the second network element within the predetermined amount of time, the method includes sending at least one smart probe packet from the first network element to the second network element.
摘要:
Described herein are oral care compositions comprising (i) a magnesium alkali metal silicate complex clay, and (ii) an orally acceptable anionic polymer, in a dentifrice base, which compositions are useful for alleviating dental sensitivity. Also provided for, are methods of making and using the compositions described herein.