摘要:
A method of producing activated carbon fibers (ACFs) includes the steps of providing a natural carbonaceous precursor fiber material, blending the carbonaceous precursor material with a chemical activation agent to form chemical agent-impregnated precursor fibers, spinning the chemical agent-impregnated precursor material into fibers, and thermally treating the chemical agent-impregnated precursor fibers. The carbonaceous precursor material is both carbonized and activated to form ACFs in a single step. The method produces ACFs exclusive of a step to isolate an intermediate carbon fiber.
摘要:
A method and system for verifying identification of an electronic mail message. An electronic mail message including a signature and a key is received, the signature identifying a domain from which the electronic mail message originated and the key for verifying the signature. A key registration server of the domain is accessed to verify the key. The key registration server provides for verifying that a key used to sign an electronic mail message is valid and that the sender is authorized by the domain to send the electronic mail message from the return address.
摘要:
A method of monitoring congestion within a data path having a queuing node located therein and a plurality of downstream nodes positioned downstream of the queuing node. The method includes monitoring congestion at the plurality of downstream nodes and setting a congestion notification flag by one of the downstream nodes when the node is congested. The transmission of data packets from the queuing node is stopped and packets received at the queuing node are queued when the flag is set. The method further includes transmitting packets from the queuing node when the congestion notification flag is cleared. A system for monitoring congestion on a data path is also disclosed.
摘要:
In one embodiment, an apparatus can include a service broker configured to: (i) register a service classifier, and to provide context information to the service classifier; and (ii) register a plurality of service nodes. The service broker can also receive capability and service requests from the service classifier. Further, the context information can include a service header, a reachability indication, and an encapsulation, where the service header and the encapsulation may be attached or related to a packet in the service classifier. In addition, the service classifier can use this information to redirect the packet to a first service node.
摘要:
Methods and apparatus providing information about characteristics associated with a network are described. A network node associated with a client for selecting a server that can best provide content to a client transmits a request for a response. A plurality of content servers or content routing agents receive requests corresponding to the request from the network node associated with the client. The content servers provide a response and fragment and/or pad datagrams associated with the response. The content servers transmit these fragmented and/or padded datagrams to the network node associated with the client. The network node associated with the client can reassemble and/or trim the received datagrams and identify as optimal the server that first completes transmission of the response.
摘要:
Methods and apparatus providing information about characteristics associated with a network are described. A network node associated with a client for selecting a server that can best provide content to a client transmits a request for a response. A plurality of content servers or content routing agents receive requests corresponding to the request from the network node associated with the client. The content servers provide a response and fragment and/or pad datagrams associated with the response. The content servers transmit these fragmented and/or padded datagrams to the network node associated with the client. The network node associated with the client can reassemble and/or trim the received datagrams and identify as optimal the server that first completes transmission of the response.
摘要:
The technique of the present invention provides a solution to the problem of routing or redirecting a given client to a replica or proxy server which has a relatively shortest propagation delay to the client. According to the technique of the present invention, a network device referred to as an intercept server sits in front of a host server, and intercepts packets routed to the host server. When desired, packets which are intercepted by the intercept server are replicated, encapsulated and tunneled to selected client servers in the overlay network. The tunneled packets are received and processed by each of the selected client servers, whereupon each of the selected client servers generates a respective spoofed response to the source device identified in the header of the originally intercepted packet. Further, according to the technique of the present invention, each of the selected client servers transmits its respective spoofed response to the identified source device at substantially the same time. The client server associated with the spoofed response which is first received at the identified source device is considered to have the relatively shortest propagation delay to the identified source device, and is identified as the successful client server. Thereafter, the source device will be directed or redirected to communicate directly with the successful client server when subsequently attempting to access information from the host server.
摘要:
The technique of the present invention provides a solution to the problem of routing or redirecting a given client to a replica or proxy server which has a relatively shortest propagation delay to the client. According to the technique of the present invention, a network device referred to as an intercept server sits in front of a host server, and intercepts packets routed to the host server. When desired, packets which are intercepted by the intercept server are replicated, encapsulated and tunneled to selected client servers in the overlay network. The tunneled packets are received and processed by each of the selected client servers, whereupon each of the selected client servers generates a respective spoofed response to the source device identified in the header of the originally intercepted packet. Further, according to the technique of the present invention, each of the selected client servers transmits its respective spoofed response to the identified source device at substantially the same time. The client server associated with the spoofed response which is first received at the identified source device is considered to have the relatively shortest propagation delay to the identified source device, and is identified as the successful client server. Thereafter, the source device will be directed or redirected to communicate directly with the successful client server when subsequently attempting to access information from the host server.