Abstract:
A method for establishing a virtual channel between network devices is disclosed. In the case of a local network device establishing a virtual channel with a remote network device, a virtual channel request message is sent from the local network device to the remote network device. A virtual channel acknowledgement message and a remote capability list are received and a virtual channel resume message and a local capability list are sent. The virtual channel is then enabled. In the case of a remote network device establishing a virtual channel with a local network device, a virtual channel request message is received from a local network device by a remote network device. A virtual channel acknowledgement message and a remote capability list are sent and a virtual channel resume message and a local capability list are received. The virtual channel is then enabled.
Abstract:
A method for selectively controlling the flow of data through a network device is discussed. The network device has a plurality of ports, with each port of the plurality of ports having a plurality of priority queues. Congestion at one priority queue of the plurality of priority queues is detected and a virtual channel message is sent to other network devices connected to the network device causing data destined for the one priority queue to be halted. After the congestion at the one priority queue has abated, a virtual channel resume message is sent to the other network devices.
Abstract:
A method for selectively controlling the flow of data through a network device is discussed. The network device has a plurality of ports, with each port of the plurality of ports having a plurality of priority queues. Congestion at one priority queue of the plurality of priority queues is detected and a virtual channel message is sent to other network devices connected to the network device causing data destined for the one priority queue to be halted. After the congestion at the one priority queue has abated, a virtual channel resume message is sent to the other network devices.
Abstract:
A network component for processing a packet includes at least one first storage unit, at least one second storage unit, at least one third storage unit, and an action implementation unit. The at least one first storage unit is configured to store an initial bit value selected from within the packet. The at least one second storage unit is configured to store a bit action length value. The at least one third storage unit is configured to store an extracted bit value based upon the initial bit value and the bit action length value. The action implementation unit is configured to implement at least one action on a packet by using an action bit value to modify the extracted bit value.
Abstract:
A network component for processing a packet can include a rules table configured to have a plurality of entries, and sets of first storage units within each one of the plurality of entries. The sets of first storage units are configured to store sets of range checking parameters with respect to the packet. The sets of range checking parameters can identify a plurality of packet field values and a plurality of range values. In addition, the network component can include an action implementation unit configured to implement at least one first action with respect to the packet when at least one of the plurality of packet field values falls within a corresponding pair of range values for one of the plurality of entries. The action implementation unit is also configured to implement at least one second action with respect to the packet when each one of the plurality of packet field values falls within each corresponding pair of range values for one of the plurality of entries, and the action implementation unit can implement at least one third action with respect to the packet when each one of the plurality of the packet field values does not fall within each corresponding pair of range values.
Abstract:
Aspects of the present invention may be found in a system, method, and/or apparatus for packet level security. In embodiment, there is presented a network node for transmitting packets. The network node comprises at least one port, a random number generator, and a circuit. There is at least one port for receiving the packets. The random number generator generates random numbers. The random numbers are associated and vary with different times. The circuit applies particular ones of the random numbers to the packets. There is at least one port for transmitting the packets with the particular ones of the random numbers applied to the packets.
Abstract:
Presented herein are systems and methods for video teleconferencing. A mobile terminal comprises a transceiver, a video decoder, and a display screen. The transceiver receives video data signals from a plurality of mobile terminals. The video decoder generates videos from the video data signals from the plurality of mobile terminals. The display screen simultaneously displays the videos.
Abstract:
A network device for handling data and a method for handling data in a network device are disclosed. The network device includes at least one media port and at least one high speed docking station, communicating with the at least one media port. At least one master is provided in the network device, where the at least one master is connected to the at least one high speed docking station. The master is configured to handle and process data received by the at least one media port and passed to the master through the at least one high speed docking station. The network device is configured to handle media ports of different media types. Thus, the device can handle data received through different media ports that have different media types with the same master, making the network device easily configured to meet a customer's needs.
Abstract:
Disclosed herein is a method and system for erasing at least a portion of non-volatile memory in an electronic device, such as for example, a mobile handset. The erase command may be received at a processor of the electronic device from an electronic device server via a wireless or a wired communication network. In an embodiment according to the present invention, the electronic device may also prompt an end-user to erase at least a portion of the non-volatile memory. Secure erasure of non-volatile memory may include overwriting at least one selected portion of memory with predetermined data/information and/or randomly generated data/information. In an embodiment according to the present invention, a secure erasure of at least one portion of non-volatile memory may include overwriting one of a plurality of times and at least once the selected portion of non-volatile memory to be erased.
Abstract:
Presented herein are systems and methods for integrating secure identification logic into cell phones. A registration is received, wherein said registration includes an identifier identifying a mobile terminal. Information is transmitted to the mobile terminal, wherein a password is a function of the information.