Abstract:
An interactive centerpiece system includes a plurality of tablet computers with interactive display devices for displaying slideshows of photograph image data. A substantially flat base with opposing upper and lower surfaces is also provided. The base is formed to lay flat on a table in a table position whereat a base central axis that is perpendicular to both the upper and lower surfaces substantially aligns with a geometric center of the table, to surround a surface area defined by an outer perimeter, about which the plurality of docking stations, into which one of the tablet computers is fixed, are arranged at substantially equal distances from each other. The docking stations are configured to face the interactive display devices outward and define a usable area between the docking stations and the base central axis for uses including receiving traditional event centerpieces.
Abstract:
An interactive centerpiece system includes a plurality of tablet computers with interactive display devices for displaying slideshows of photograph image data. A substantially flat base with opposing upper and lower surfaces is also provided. The base is formed to lay flat on a table in a table position whereat a base central axis that is perpendicular to both the upper and lower surfaces substantially aligns with a geometric center of the table, to surround a surface area defined by an outer perimeter, about which the plurality of docking stations, into which one of the tablet computers is fixed, are arranged at substantially equal distances from each other. The docking stations are configured to face the interactive display devices outward and define a usable area between the docking stations and the base central axis for uses including receiving traditional event centerpieces.
Abstract:
Methods, systems, and apparatus used to determine whether to discard a network packet based upon the latency exhibited by an associated a network packet queue. Network devices can include a queue management module operable to identify a latency metric in network packet queues and determine whether the latency metric renders the network packet queue eligible for discarding packets based upon, for example, a latency policy.
Abstract:
A translation agent adapts DOCSIS information, primarily QoS information, for transmission over a PON. The agent places into an IP address field of a DHCP message the MAC address of an ONU associated with a CPE device attempting to register with a CMTS. The translation agent intercepts DHCP reply messages from the DHCP server using the MAC address of the ONU. The translation agent extracts information, including an IP address of the client CPE assigned by the DHCP server. The agent downloads a configuration file for the CPE device using the configuration filename and configuration file server contained in a DHCP reply message. Information contained in the configuration file is converted from content in a format used by DOCSIS, to content in a format used by PON devices. The translated content includes QoS parameters, functions related to which are controlled at the ONU by an OLT coupled to the CMTS.
Abstract:
A token bucket instantiation regulate packets in a traffic flow stream based on a predetermined peak traffic flow rate. The token bucket size is nominally set to zero. An evaluation is made at a device that has received a given packet. The packet is considered conforming and is passed from the device if the token depth of the bucket is zero or greater. The token depth is decreased by the number of byes in the packet that was passed. The token depth is continuously replenished at a predetermined token rate until the predetermined bucket size is attained (the bucket is full). A received packet is deemed nonconforming if the token depth is less than zero; the non-conforming packet is not passed but is processed according to non-conforming criteria. Token bucket instantiations may be implemented in hardware, software or firmware for each traffic flow to regulate traffic to a given user.
Abstract:
A token bucket instantiation regulate packets in a traffic flow stream based on a predetermined peak traffic flow rate. The token bucket size is nominally set to zero. An evaluation is made at a device that has received a given packet. The packet is considered conforming and is passed from the device if the token depth of the bucket is zero or greater. The token depth is decreased by the number of byes in the packet that was passed. The token depth is continuously replenished at a predetermined token rate until the predetermined bucket size is attained (the bucket is full). A received packet is deemed nonconforming if the token depth is less than zero; the non-conforming packet is not passed but is processed according to non-conforming criteria. Token bucket instantiations may be implemented in hardware, software or firmware for each traffic flow to regulate traffic to a given user.
Abstract:
TFTP server address, configuration file name and relay agent address contained in a DHCPACK are recorded; the TFTP server address is overwritten with the relay agent address before forwarding. Upon receipt of a TFTP request, a transfer identifier is selected from a pool of available port values, and the source address/port pair and relay agent's address are associated therewith. The relay agent's address and the transfer identifier replace the source address/port pair, and a check is made to determine whether the cable modem is requesting the correct configuration file. Action may be taken if the CM requests an incorrect filename, or if configuration TLVs are incorrect. The relay agent retrieves the TFTP server's address/port pair from the first TFTP data packet received, and associates these with the transfer identifier before returning it to the available pool. The transfer identifier is used to lookup the CM address/port pair.