1,166 research outputs found

    ENVIRONMENTAL-IMPACT EXTENSIONS FOR TRACEROUTE AND PING

    Get PDF
    The computer network diagnostic facilities traceroute and ping are arguably some of the most used networking troubleshooting tools. Augmenting those facilities to present environmental and sustainability data and metadata would contribute to gain visibility on “green metrics” on the Internet, an objective mentioned in the Internet Engineering Task Force (IETF) E-Impact initiative. Techniques are presented herein that support Environmental-Impact extensions (or “E-Impact” extensions for short) to both traceroute and ping. The presented extensions are backwards compatible and potentially provide per-hop (e.g., per networking topological node) power metrics, estimated greenhouse gas (GHG) emission numbers, and potentially other current or future sustainability metrics. Aspects of the presented techniques support a combination of in-packet (e.g., Internet Control Message Protocol (ICMP) extensions) plus out-of-band (e.g., out of band database lookup or application programming interface (API) calls from a host) methods that, together, yield the above-described new metrics. The presented techniques are useful not only in a transactional setting (e.g., a user desired to find some information so they issue a traceroute or a ping request) but they may also be run periodically in a mesh across the Internet or across an administrative domain to map out environmental-impact metrics, including energy usage, power and normalized power, and estimated GHG emissions

    The Role of Tobacco Cessation Counseling in Physical Therapist Practice and Education

    Get PDF
    The goal of this research was to promote the use of evidence-based TCC guidelines in physical therapist practice and education by applying principles of knowledge translation as defined by the National Institute on Disability and Rehabilitation Research (NIDRR). According to the NIDDR, research should be framed so that knowledge gained is ultimately applied in a manner geared towards improving the lives of people with disabilities.;Study 1 resulted in a perspectives paper which established a sound clinical rationale for the inclusion of TCC as a component of physical therapist practice. This rationale is based on the pathophysiologic effects of smoking on all systems of the body, and the potential for smoking cessation to enhance treatment outcomes in all areas described by the Guide to Physical Therapist Practice, including cardiovascular, pulmonary, neuromuscular, musculoskeletal, and integumentary health. The paper derived from study 1 also provided a template for implementation of the AHRQ clinical guidelines for TCC within the context of physical therapist patient assessment and management.;Study 2 consisted of an assessment of the existing need for TCC training in entry-level physical therapist education, and examined the prevalence and scope of TCC training, as well as the opinions of physical therapy educators towards the inclusion of TCC in the academic and clinical environment. Methodology for Study 2 involved a cross-sectional survey of faculty at accredited entry-level physical therapist programs across the United States. Data were analyzed using frequency counts and percentages. Logistic regression was employed to assess factors that influence curricular inclusion of TCC training in entry-level physical therapist education, such as perceived barriers and facilitators to TCC in the clinical environment, and the perceived relevance of TCC within the physical therapist\u27s scope of practice and professional obligations.;Study 3 involved pilot testing of a curricular blueprint for TCC training as a component of entrylevel physical therapist education. Results of Study 3 demonstrated the feasibility and impact of TCC training for student physical therapists in producing positive changes in knowledge, skill, and intention to apply evidence-based TCC guidelines when working with physical therapy clientele.;Results: Due to higher prevalence of smoking among people with disabilities, and the negative influence of tobacco use on physical therapy treatment outcomes, TCC is an important element in physical therapist practice. Barriers to the implementation of TCC clinical guidelines in the clinical environment include limited training for entry-level physical therapists. A tailored TCC training program for student physical therapists was successful in improving knowledge, skill, and intention to apply AHRQ/ USDHHS evidence-based TCC guidelines during subsequent clinical practice.;Conclusions: There is a need for dissemination and adoption of evidence-based TCC guidelines in physical therapist practice and education. Study 1 resulted in a perspectives paper that described the scientific rationale for TCC as a component of physical therapist practice based on the detrimental impact of tobacco use on all aspects of rehabilitative care. Study 2 provided data highlighting the existing need for evidence-based TCC training in entry-level physical therapist education. Study 3 consisted of a pilot training program. Results of Study 3 supported the efficacy of a tailored curricular blueprint specifically designed to enhance the knowledge, skills, and intentions of student physical therapists towards the application of TCC guidelines as a component of future practice. (Abstract shortened by UMI.)

    SELF-ADAPTIVE ANOMALY DETECTION WITH DEEP REINFORCEMENT LEARNING AND TOPOLOGY

    Get PDF
    In the networking field, network topology is one of the most important perspectives as it can bring additional insights to the modeling process. Existing anomaly detection approaches do not take topology information into consideration. To address such limitations techniques are presented herein that support deep Convolutional Neural Network (CNN) modeling with Reinforcement Learning (RL) employing, for example, an Advantage Actor Critic (A2C) algorithm. Additionally, aspects of the techniques presented herein support an innovative new way to model a customer profile that leverages topology information

    SRV6/BITMASK DATAPLANE SIGNALED SEAMLESS FAAS/SERVERLESS FUNCTION DEPLOYMENT

    Get PDF
    Presented herein are techniques through which a list of functions (FUNC) that are to be invoked in a system may be carried as part of a Segment Routing for Internet Protocol version 6 (SRv6) micro-Segment Identifier (uSID) or a bitmask in an interesting packet. A first packet may be used to invoke the functions and, once invoked, a more specific entry for the address can be instantiated in a forwarding table so as to avoid attempting to invoke the same functions for subsequent packets

    INTENT-AWARE FLOW REDIRECT USING SINGLE-HOP INTERNET CONTROL MESSAGE PROTOCOL (ICMP) EXTENSION

    Get PDF
    Techniques presented herein provide for a Control Agent that monitors flow distribution and Smart Network Interface Card (sNIC) capability and utilizes a simple Internet Control Message Protocol (ICMP) extension to instruct upstream node(s) to redirect traffic over other sNIC connected link(s). The techniques may be utilized for both Layer 2 (L2) and Layer 3 (L3) links and may provide a novel mechanism to leverage an sNIC for flow-based/intent-based/capability-aware load balancing and/or policy-balancing

    SECURE AND FULLY TRANSPARENT ROAMING FOR LONG RANGE

    Get PDF
    Roaming with Long Range wide-area network (LoRaWAN) requires connections to home Network Servers (hNS), serving Network Servers (sNS) and forwarding Network Servers (fNS) across LoRa domains. Today, this entails a tedious manual process for generating the keys, certificates and configuration files to connect these servers on a peer-to-peer basis. This means that manual configurations grow quadratically with the number of LoRa networks involved. In addition, today there is no way to enable roaming across LoRa networks dynamically (i.e., not if these pre-configurations among the visited and the home/serving LoRa networks aren\u27t in place). Accordingly, presented herein are techniques to scale LoRaWAN roaming linearly, while not only automating the entire roaming process, but also allowing the acceptance of dynamic roaming requests. Opposite to conventional arrangements, such as roaming hubs, where roaming partners need to adhere to the hub\u27s rules for packet routing, service levels and trust, the techniques presented herein act transparently to the servers, keeping routing and data exchanges under the control of each peer

    INFORMATION CENTRIC NETWORKING INTEREST SIGNALED DYNAMIC DATA INTEGRITY VALIDATION OFFLOAD TO FOG NODE OR MOBILE EDGE COMPUTING NODE

    Get PDF
    Techniques are described herein for offloading the responsibility of validation to an edge node such as a fog router or Mobile Edge Computing (MEC) platform by signaling the same in an Interest packet or using another Out-of-Band (OOB) mechanism. Upon receiving the Interest packet, the edge node creates the local state entry in a Pending Interest Table (PIT) and marks the entry for local integrity validation. The edge node uses any mechanism to retrieve the public key and perform the validation on behalf of the sensors/end-users

    SRV6 SID/USID OAM FOR ADJ-SID VALIDATION

    Get PDF
    Techniques are presented for using a Loopback segment identifier (SID) that has the semantic of a Loopback address (terminate and process). Such a Loopback SID is assigned for both traditional SID and micro SID (uSID) that can be used in the segment-list of the probe packet to terminate the probe directly in the Nexthop of the adjacent SID (Adj-SID) which can be used to validate the forwarding semantic of the respective Adj-SID at the dataplane

    IOT OAM CONNECTIVITY MODEL - END-TO-END APPLICATION LAYER RELAY PING FOR CONNECTIVITY CHECK

    Get PDF
    Methods are provided that allow for detecting the connectivity between an Internet-of-Things application (IoT-App) and a device at the application layer. In one method, an IoT gateway (IoT-GW) acts as a proxy that triggers a Request message to the device upon receiving a proxy request from the IoT-App with relevant details such as correlation identifier (ID) that can be used to correlate the response to the request. In another method, local statistics cached by the IoT-GW are leveraged for each device

    SERVICE LAYER DEPENDENCY MAPPING BASED HEATMAP FOR FAULT ISOLATION

    Get PDF
    Techniques are described herein for a two-fold process where a first Machine Learning (ML) model is engaged in building a Dependency Mapping Table (DMT) based on the data from the network (network observations). An Interior Gateway Protocol (IGP) database, service graph information, and in-band Operations, Administration and Management (iOAM) data is leveraged to feed into the ML model to build the DMT. The DMT is built with a per physical element precision (fiber optical cable in each direction). In other words, the database is built in a way to enable identification of the list of (connected/non-connected) services and protocols that potentially relies on the fiber cable. In the second fold, the ML model uses the dependency mapping built in the previous phase to identify the potential cause for an issue and prioritize the relevant alarms. In addition, it may be tied together with existing failure prediction mechanisms for any layer that in turn will be used with the above database to prioritize the alarm/notification to an operator Operations Support System (OSS) and take any necessary pre-emptive action on the above layers
    • …
    corecore