摘要:
The disclosure relates to a system comprising a processing circuit and a circuit (230a) configured to provide at output a given number N A2 of bits of configuration information (A_CFG) to be used by said processing circuit. The circuit (230a) comprises a non-volatile programmable memory (2300) providing at output a first group (A_CFG1) of N A2 bits. The circuit (230a) may comprise also N A2 terminals for receiving a second group (A_CFG2) of N 42 bits and N A2 logic gates (2304). In this case, a first input terminal of each logic gate (2304) may be connected to a respective bit of the output of the non-volatile programmable memory (2300) providing at output the first group (A_CFG1) of N A2 bits, and a second input terminal of each logic gate (2304) may be connected to a respective terminal of the N A2 terminals for receiving the second group of N A2 bits. In addition, or alternatively, the circuit (230a) may comprises a further memory (2306) providing at output a third group (A_CFG3) of N A2 bits and N A2 logic gates (2308). In this case, a first input terminal of each logic gate (2308) may be connected to a respective bit of the output of the non-volatile programmable memory (2300) providing at output the first group (A_CFG1) of N A2 bits, and a second input terminal of each logic gate (2308) may be connected to a respective bit of the output of the further memory (2306) providing at output the third group (A_CFG3) of N A2 bits.
摘要:
A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.
摘要:
A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.
摘要:
The present invention discloses a method, an apparatus and a system for processing user identity information in a GPON system. In this case, the method comprises: an optical line terminal OLT determining that a length of a string of user identity information used for an SIP session exceeds a threshold; the optical line terminal OLT constructing an optical network terminal management and control interface OMCI message, wherein the OMCI message carries the user identity information used for the SIP session; the optical line terminal OLT sending the OMCI message to an optical network unit ONU or an optical network terminal ONT; and the optical network unit ONU or the optical network terminal ONT acquiring the user identity information from the OMCI message. By virtue of the present invention, overlong user identity information of the ONU/ONT end can be set and managed by the OLT end.
摘要:
In an addressing scheme for wireless communication a communication channel may be defined based on a unique identifier associated with a destination node or a source node. In addition, a short identifier may be included in messages sent over the communication channel such that a node may uniquely identify the source node or destination node for the message. A node may use a short identifier as an index into a lookup table to determine one or more parameters to be used for communicating with another node.
摘要:
A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.
摘要:
In a mobile communication system, cell-wide short identifiers are assigned to the mobile transceivers by the base station transceiver to reduce the overhead of long addresses (e.g., globally unique). The base station obtains information about a number of mobile terminals and determines the appropriate bit-length of the identifiers of the terminals. If new terminals join the cell and there are no more identifiers available, the base station increases the bit-length and notifies (e.g., through a broadcast message) the terminals about the change. Similarly, when terminals leave the cell, the base station may decide to reduce the length of the identifiers. The updates can be performed respectively by prepending a pre-defined digit or removing a digit. As digit removal may lead to collisions (i.e. same identifier for multiple terminals), the base station should individually provide replacement identifiers to affected terminals.
摘要:
The present application presents example data routing methods and apparatuses for reducing the amount of nonvolatile memory required to store secure element application locations associated with a near-field communications device. For example, the present disclosure presents a method of communication routing in a near-field communication device, which can include receiving, at a near-field communications controller (NFCC), a routing request message (e.g. from a requesting device), wherein the routing request message includes an original application identifier (AID) associated with an application. The example method may also include generating a compressed AID by applying a hash function to the original AID, reading an entry corresponding to the compressed AID in a routing data structure, wherein the entry contains one or more secure element pointers associated with one or more secure elements, and querying at least one of the secure elements to determine whether each contains the application.
摘要:
A network element is described. In one embodiment includes receiving a packet from the host in the first domain at the network element in the first domain, the packet including a destination address to the host in the second domain, the destination address being formed by replacing an Interface Identifier of an IP address by a second domain label and a shortened Media Access Control (MAC) address, the second domain label identifying the second domain. A routing label and the shortened MAC address are attached to the received packet, and the packet is sent on a label switched path indicated by the label to the second domain.
摘要:
A method for internet communication is presented. An identifier is embedded in an internet-accessible computer readable medium, and an internet address is embedded in the internet-accessible computer readable medium in a relation to the identifier. The identifier is located to provide an identifier location, and the internet address is located based on the identifier location.