摘要:
Addressing methods and apparatus which use airlink resources in an efficient manner are described. In order to use airlink resources efficiently, a variety of address types are supported. The number of bits in the address may vary depending on the type. In order to support a variety of different address types, of different lengths, in one embodiment, an address used for communications over an airlink is constructed by including in the address an address type field used to communicate an address type indicator and, optionally, an address field used to communicate an address value. The address field is variable in length and may be null, requiring the communication of no bits in this field, for certain types of addresses. Four types of addresses which may be supported include: i) an Access Terminal assisted address, ii) a Network assisted address, 3) a Pilot PN based address; and 4) a reserved address.
摘要:
Methods and apparatus for communicating between an access terminal (AT) and a device serving the AT by way of an Access Point (AP) are described. In accordance with one feature serving devices may be assigned specific addresses which are interpreted based on the source of the communication, e.g., MAC packet, in which the address is used. Such addresses may be interpreted as being of a different type than other addresses which can be interpreted and/or used without taking into account the identity of the sender. In some embodiments Session Controllers and/or Internet Attachment Points (IAPs) are identified with such addresses. The address value is the same for one or more ATs but is interpreted at an AP receiving such the IAP address based on information corresponding to the AT which sent the packet including the IAP or Session Controller address.
摘要:
A layer 2 switch network system includes: a Radius server notifying a temporary MAC address to be assigned to a terminal, to an edge switch; and the edge switch for acquiring the temporary MAC address from the Radius server and storing swap data correlating the acquired temporary MAC address to a real MAC address. When a MAC frame is received from a terminal, the edge switch converts the real MAC address of the transmission source set in the MAC frame into a temporary MAC address. When a MAC frame is transmitted to a terminal, the edge switch converts the temporary MAC address of the destination which has been set, into a real MAC address. Thus, it is possible to easily and safely operate the temporary MAC address.
摘要:
A method for handling a data packet includes a network device receiving the data packet. The method also includes the network device separating first network layer data of the data packet from message data of the data packet. The message data of the data packet includes a source address represented by less than four bytes, a destination address represented by less than four bytes, and a format identifier. The method includes determining whether the destination address of the message data matches an address of the network device or whether the message data indicates a broadcast message. The method also includes the network device processing the format identifier if the destination address of the message data matches the address of the network device or if the message data indicates the broadcast message. The method includes the network device providing the message data to the network device and/or other network devices.
摘要:
A system and method of assigning an identifier to an entity operating within a mobile device ecosystem including a domain are provided. The method comprises: obtaining an identifier of the entity which uniquely identifies the entity within the domain , the identifier of the entity including length information identifying the length of identifier of the entity; obtaining an identifier of the domain within which the identifier of the entity is unique; and combining the identifier of the entity with the identifier of the domain to create a globally unique identifier of the entity which is globally unique in the mobile device ecosystem.
摘要:
A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.
摘要:
A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.
摘要:
A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.