97 research outputs found

    INTENT-AWARE FLOW REDIRECT USING SINGLE-HOP INTERNET CONTROL MESSAGE PROTOCOL (ICMP) EXTENSION

    Get PDF
    Techniques presented herein provide for a Control Agent that monitors flow distribution and Smart Network Interface Card (sNIC) capability and utilizes a simple Internet Control Message Protocol (ICMP) extension to instruct upstream node(s) to redirect traffic over other sNIC connected link(s). The techniques may be utilized for both Layer 2 (L2) and Layer 3 (L3) links and may provide a novel mechanism to leverage an sNIC for flow-based/intent-based/capability-aware load balancing and/or policy-balancing

    SRV6/BITMASK DATAPLANE SIGNALED SEAMLESS FAAS/SERVERLESS FUNCTION DEPLOYMENT

    Get PDF
    Presented herein are techniques through which a list of functions (FUNC) that are to be invoked in a system may be carried as part of a Segment Routing for Internet Protocol version 6 (SRv6) micro-Segment Identifier (uSID) or a bitmask in an interesting packet. A first packet may be used to invoke the functions and, once invoked, a more specific entry for the address can be instantiated in a forwarding table so as to avoid attempting to invoke the same functions for subsequent packets

    Targeting of the Year One dental visit for United States children

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/75098/1/j.1365-263X.2003.04602.x.pd

    IOT OAM CONNECTIVITY MODEL - END-TO-END APPLICATION LAYER RELAY PING FOR CONNECTIVITY CHECK

    Get PDF
    Methods are provided that allow for detecting the connectivity between an Internet-of-Things application (IoT-App) and a device at the application layer. In one method, an IoT gateway (IoT-GW) acts as a proxy that triggers a Request message to the device upon receiving a proxy request from the IoT-App with relevant details such as correlation identifier (ID) that can be used to correlate the response to the request. In another method, local statistics cached by the IoT-GW are leveraged for each device

    INFORMATION CENTRIC NETWORKING INTEREST SIGNALED DYNAMIC DATA INTEGRITY VALIDATION OFFLOAD TO FOG NODE OR MOBILE EDGE COMPUTING NODE

    Get PDF
    Techniques are described herein for offloading the responsibility of validation to an edge node such as a fog router or Mobile Edge Computing (MEC) platform by signaling the same in an Interest packet or using another Out-of-Band (OOB) mechanism. Upon receiving the Interest packet, the edge node creates the local state entry in a Pending Interest Table (PIT) and marks the entry for local integrity validation. The edge node uses any mechanism to retrieve the public key and perform the validation on behalf of the sensors/end-users

    MULTIPART, MULTIPATH ENTROPY QUERY BASED ON EGRESS LINK COMBINATION

    Get PDF
    Dynamic entropy ranges are runtime operational state pre-use cached results of entropy calculations based on an actual state of links. These results may include proactive entropy calculations based on the up- and down-states of links. A non-binary state for links that describes their load can also be included. This information enables network optimization and traffic engineering by introducing the capability of querying additional details in the multipart-multipath entropy query. Querying can be accomplished using Label Switched Path (LSP) Ping or any other Operations, Administration, and Maintenance (OAM) extensions, such as Yet Another Next Generation (YANG). Upon receiving such a query, a transit node will reply back with entropy ranges for different combinations of link failure. The response is cached by the initiator and used accordingly based on failure detection

    SERVICE LAYER DEPENDENCY MAPPING BASED HEATMAP FOR FAULT ISOLATION

    Get PDF
    Techniques are described herein for a two-fold process where a first Machine Learning (ML) model is engaged in building a Dependency Mapping Table (DMT) based on the data from the network (network observations). An Interior Gateway Protocol (IGP) database, service graph information, and in-band Operations, Administration and Management (iOAM) data is leveraged to feed into the ML model to build the DMT. The DMT is built with a per physical element precision (fiber optical cable in each direction). In other words, the database is built in a way to enable identification of the list of (connected/non-connected) services and protocols that potentially relies on the fiber cable. In the second fold, the ML model uses the dependency mapping built in the previous phase to identify the potential cause for an issue and prioritize the relevant alarms. In addition, it may be tied together with existing failure prediction mechanisms for any layer that in turn will be used with the above database to prioritize the alarm/notification to an operator Operations Support System (OSS) and take any necessary pre-emptive action on the above layers

    SRV6 SID/USID OAM FOR ADJ-SID VALIDATION

    Get PDF
    Techniques are presented for using a Loopback segment identifier (SID) that has the semantic of a Loopback address (terminate and process). Such a Loopback SID is assigned for both traditional SID and micro SID (uSID) that can be used in the segment-list of the probe packet to terminate the probe directly in the Nexthop of the adjacent SID (Adj-SID) which can be used to validate the forwarding semantic of the respective Adj-SID at the dataplane

    A Clinical Study on Glucosamine Sulfate versus Combination of Glucosamine Sulfate and NSAIDs in Mild to Moderate Knee Osteoarthritis

    Get PDF
    Background. Glucosamine may be effective in treating and possibly slowing the progression of Osteoarthritis (OA). It is believed Glucosamine supplements may help to stop cartilage breakdown, build cartilage and decrease swelling. Objective. The objective of this study was glucosamine sulfate versus combination of glucosamine sulfate and Non-Steroidal anti-inflammatory drugs (NSAID) in mild to moderate knee osteoarthritis. Methods. Subjects were randomly recruited from Rheumatology outpatient department after a diagnosis of mild or moderate Osteoarthritis. Study tools like patient data collection form, Western Ontario McMaster Universities Arthritis index (WOMAC) of Osteoarthritis questionnaires and Visual Analog Scale (VAS) were used. Results. After 12 weeks, WOMAC total score the result showed that the significant mean difference between the group A and Group B treatment (P < 0.01), with a combination of GS and NSAIDs reducing VAS pain scores. Thus, it is found that Group B treatments over 4 and 12 weeks produced improved WOMAC and VAS grades. Conclusions. Study results may suggest that the Glucosamine Sulfate has a carryover effect like Disease modifying agents. Long-term treatment of Glucosamine Sulfate may reduce the dependence of NSAIDs usage and delay the disease progression. Thereby we can reduce the NSAIDs side effects and improve the patient's quality of life

    EMBEDDED BACKUP PATH INFORMATION FOR STATELESS SRV6 MICRO SEGMENT IDENTIFIER NODE PROTECTION

    Get PDF
    Techniques presented herein provide for the ability to improve Topology Independent Loop-Free Alternate Fast Re-route (TI-LFA) with node protection by embedding backup path information (on a per segment basis) in a stack itself. In particular, techniques herein introduce a Node protected Prefix/Adjacency Segment Identifier (NP-SID) with a new (yet simple) forwarding semantic that can be used to embed backup path information directly in a segment stack. The NP-SID is always followed by the backup node information in the segment stack and the forwarding semantic to the NP-SID will involve a lookup on the backup information only if a protected node fails. The techniques may provide a benefit of being purely stateless by not involving context tables on nodes
    corecore