摘要:
Maintenance entities may be defined between customer or provider flow points for performance management on an Ethernet network. The maintenance entities may be defined for access link, intra-domain, and inter-domain, and may be defined on a link or service basis. The maintenance entities may be used to monitor performance within a network or across networks, and may be used to monitor various performance parameters, such as frame loss, frame delay, frame delay variation, availability, errored frame seconds, service status, frame throughput, the number of frames transmitted, received or dropped, the status of a loopback interface and/or the amount of time a service has been unavailable. Several management mechanisms may be used, and the measurements may be collected using a solicited collection method, in which a responses are required and collected, or an unsolicited collection method in which a response is not required.
摘要:
A time-shared network comprising edge nodes and optical core nodes may be dynamically divided into several embedded networks, each of which covering selected edge nodes. At least one of the edge nodes may host an embedded-network controller operable to form multiple-source flow-rate allocation requests each of the requests specifying flow-rate allocations to a plurality of paths from several source nodes to several sink nodes. A core node may also host an embedded-network controller or several embedded-network controllers. The time-shared network may use both time-division multiplexing and burst switching.
摘要:
The performance and ease of management of wireless communications environments is improved by a mechanism that enables access points (APs) to perform automatic channel selection. A wireless network can therefore include multiple APs, each of which will automatically choose a channel such that channel usage is optimized. Furthermore, APs can perform automatic power adjustment so that multiple APs can operate on the same channel while minimizing interference with each other. Wireless stations are load balanced across APs so that user bandwidth is optimized. A movement detection scheme provides seamless roaming of stations between APs.
摘要:
A wireless access point broadcasts a unique RF domain identifier for each supported service set per radio. Within a wireless local area network (“WLAN”) the RF domain identifier is unique for each supported service set, and hence identifies the service set. In addition to identifying the service sets supported by the access point, RF domain identifiers may be used to adjust transmit power in order to differentiate service sets. For example, if a first access point receives a beacon with an RF domain identifier transmitted by a second access point, the transmit power of communications associated with the service set associated with the received RF domain identifier is reduced at the first access point if that service set is also supported on the same radio by the first access point. In one embodiment the first and second access points both reduce transmit power until the beacons are no longer received by the respective nearby access point. The transmit power of communications associated with other service sets and other radios are not effected by the transmit power reduction, i.e., the access point may reduce transmit power of overlapping service set communications while contemporaneously transmitting communications of non-overlapping service sets at full power.
摘要:
End-to-end security is established automatically for network communications. In one embodiment a first host is associated with a policy manager that determines, for the first host, whether a secure session is permissible. If the secure session is determined to be permissible then the policy manager signals to intermediate devices in order to prompt establishment of SA/DA pinholes. In an alternative embodiment a neutral policy broker determines, for both first and second hosts, whether the secure session is permissible and signals to the intermediate devices to establish the pinholes if the secure session is permissible. In another embodiment the end-to-end session includes back-to-back tunnel mode sessions linked by at least one intermediate device. The intermediate device is operative to decrypt and re-encrypt traffic in the session, and may be configured by a policy manager or policy broker. Further, another security association can be nested in one or more segments of the session in a manner that permits one host to access a third host or secure resource which is shielded from the second host.
摘要:
A system, device, and method for managing alternate site switching in an optical communication system recovers from failures/degradations that are uncorrected by the core optical communication network. When an uncorrected failure/degradation is detected, communications for a protected end-system are switched from a primary end-system to a backup end-system. The backup end-system may be selected a priori, for example, during connection establishment, in order to reduce switching time once a decision has been made to switch communications from the primary end-system to the backup end-system. Provisions are made for completing the alternate site switching within a specified amount of time. Load balancing may be used to further reduce switching time from the primary end-system to the backup end-system. This alternate site switching augments the various protection mechanisms provided by the core optical communication network in order to provide end-to-end protection for the optical communication path.
摘要:
Call Control entities in a network communicate between themselves by amending call processing messages to include encrypted network information. As such, a call may be established whose path through the network is dependent on the paths of other calls. Information of a scope larger than a Call Controller normally possesses can, as a result of this communication, be made available to Call Controllers for constraining call establishment. This information could relate to other calls and connections associated with those other calls. The information may also relate to gateways in and to adjacent networks and the Call Controllers in the adjacent networks that are related to the current Call Controller.
摘要:
A modular test chassis for use in testing wireless devices includes a backplane and a channel emulation module coupled to the backplane. The channel emulation module comprises circuitry for emulating the effects of a dynamic physical environment (including air, interfering signals, interfering structures, movement, etc.) on signals in the transmission channel shared by the first and second device. Different channel emulation modules may be included in the test system depending upon the protocol, network topology or capability under test. A test module may be provided to generate traffic at multiple interfaces of SISO or MIMO DUTs to enable thorough testing of device and system behavior in the presence of emulated network traffic and fault conditions. A latency measurement system and method applies timestamps frames as they are transmit and received at the test module for improved latency measurement accuracy.
摘要:
A system and method for securing communications in a wireless network includes the steps of authenticating members of the wireless network, generating a member private key to be used by the members of the wireless network, and distributing the member private key to each of the members of the wireless network. A member is authenticated based on the ability of the member to be physically proximate to at least one other member of the wireless network at a given instant. The member private key is generated by one of the members, hereinafter referred to as a master member, in response to a changing value stored at the one of the members. The member private key is then securely distributed to each of the members in the WLAN network.
摘要:
A timestamp-based all digital phase locked loop is utilized for clock synchronization for Circuit Emulation Service (“CES”) over packet networks. The all digital phase locked loop at a CES receiver includes a phase detector, a loop filter, a digital oscillator and a timestamp counter. The all digital phase locked loop enables the CES receiver to synchronize a local clock at the receiver with a clock at a CES transmitter, where indications of transmitter clock signals are communicated to the receiver as timestamps. The phase detector is operable to compute an error signal indicative of differences between the timestamps and a local clock signal. The loop filter is operable to reduce jitter and noise in the error signal, and thereby produce a control signal. The digital oscillator is operable to oscillate at a frequency based at least in-part on the control signal, and thereby produce a digital oscillator output signal. The timestamp counter operable to count pulses in the digital oscillator output signal, and output the local clock signal.