摘要:
An ultra wideband antenna comprises a substrate (21). A metal layer deposited on the substrate comprises first and second non-metallic regions (22a, 22b) defined therein. The first and second non-metallic regions (22a, 22b) are arranged on either side of a longitudinal axis (X0), the longitudinal axis (X0) corresponding to a feed axis of the antenna. The first and second non-metallic regions taper towards the first longitudinal (X0) to form a bowtie pattern. Each of the first and second non-metallic regions (22a, 22b) comprises at least one tuning slot (31, 33), the at least one tuning slot (31, 33) being arranged about a respective first axis (X1, X2), the first axis (X1, X2) being parallel to the longitudinal axis (X0), and wherein the at least one tuning slot extends along its respective axis (X1, X2) to form a non-metallic area outside the non-metallic area defined by the respective first and second non-metallic region (22a, 22b). The tapering of the first and second non-metallic regions (22a, 22b) in combination with the at least one pair of tuning slots (31, 33) enables the antenna to be reduced in size, while being capable of operating over at least the UWB frequency range.
摘要:
A parasitic antenna element (20) comprises first and second switches: one at the base (PIN diode 22) and one approximately half way along the parasitic element (PIN diode 28). The lower half of the parasitic element is realized as a coplanar waveguide with a central conductor (32). This not only provides a convenient method for biasing the second PIN diode (28), but the outer conductors (24, 26) provide shielding and reduce coupling of the RF energy into the bias circuitry. The first switch located near the base of the antenna element is provided for selectively coupling the antenna element to a ground plane for quenching a first current mode. The second switch located along the antenna element selectively partitions the antenna element into first and second portions, thereby quenching higher order current modes.
摘要:
A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.
摘要:
There is provided an antenna element for use in an ultra wideband network, the antenna element comprising a radiating element, for radiating signals over a range of frequencies in response to a signal received at a feed point; and a frequency shaping device located near the feed point of the radiating element for acting as a broad-banding device for the radiating element. A plurality of antenna elements may be formed into an antenna array.
摘要:
A system and method for throttling transmissions of gathered computer system monitoring and asset data within a customer's communications network. A relay is provided within the network with an interface for transmitting messages to a downstream device such as the Internet. A data transmission throttle controls the downstream interface to transmit data at or below a data transfer threshold defining an allowable data transfer volume per transmission period. The method includes receiving customer input and modifying the data transfer threshold based on the input, with thresholds being set for a matrix of transmission periods (such as 24 hour by 7 day). The data transmission throttle determines whether messages exceed thresholds for the current transmission period, such as by comparing the size of the message to a data flow counter, and controls data transmissions by the relay to not exceed the threshold and by resetting the counter for each threshold.
摘要:
A system and method for monitoring the configuration and/or status of target devices on a network. The system comprises a monitoring application that can be run on a first network device. The monitoring application is configured to monitor one or more target devices on the network using data collector modules that run on the target devices. The data collector modules are launched on the target devices by the monitoring application and are configured to collect configuration and/or status information about the target devices. After collecting the data, the data collector modules preferably pass the data back to the first network device, where a data upload application receives the data and uploads it to a central site. The data at the central site is placed in a database for access by users or clients. Users can access the data in the database by communicating with the central site, for example, via a dial-up connection or via the Internet. Once connected to the central site, a user can retrieve system information using a graphical user interface, or can submit report requests to the central site. The interface used to access information at the central site may be a web browser communicating through a web server at the central site.