Abstract:
The invention relates to a method, system, network node and computer program for processing packet data in a communication network, which comprises at least a first network node. In the method a first packet is received at the first network node. In the first network node is assigned for the first packet a chain comprising at least two logical service entities based on at least one service determination rule. A data unit comprising at least part of the first packet is formed. The data unit is processed in at least one logical service entity in the chain and a second packet is transmitted from the first network node comprising data sent by at least one logical service entity in the chain. The benefits of the invention relate to improved flexibility in introducing new value-added service for packet data and improved performance in the first network node.
Abstract:
One embodiment of the present invention receives a plurality of network services, maps the plurality of network services to a single network service at a network layer higher than layer 2, and transmits the single network service. Another embodiment of the present invention receives a single network service at a network layer higher than layer 2, maps the single network service to a plurality of network services, and transmits the plurality of network services.
Abstract:
A novel method of servicing multiple data queues having different priorities is provided in a network switch. A dequeuing logic circuit services the data queues in a round-robin fashion. Programmable number of data packets is selected from each data queue in each cycle. The dequeuing logic circuit compares the number of data packets selected from a current data queue in a current cycle with the preprogrammed number of data packets set for the current queue, and selects a data packet from the current data queue only if the number of packets selected from the current data queue in the current cycle is less than the preprogrammed number. Selection of a data packet from the current data queue is bypassed, processing a next data queue, if the number of packets selected from the current data queue in the current cycle is not less than the preprogrammed number.
Abstract:
A novel method of data forwarding is provided in a network switch having multiple ports including at least one backbone port for data communications with backbone network nodes. Destination information of a received data packet is compared with a predetermined set of address data in an address table. If the packet's destination information is not found in the address table, the received data packet is forwarded to the backbone port. Further, the source address information of the received data packet may be compared with the address table. In a regular mode of operation, if the packet's source address information is not found in the address table, this information is added to the address table. However, in a backbone mode of operation, the address information of a data packet received from the backbone port is prevented from being added to the address table. The switch may have backbone ports provided for multiple VLANs supported by the switch. A first data packet received from a first VLAN is forwarded to at least one backbone port for that VLAN, if the packet's destination information is not found in the address table. Similarly, a second data packet received from a second VLAN is forwarded to at least one backbone port for the second VLAN if the packet's destination information is not found in the address table. A backbone vector storage is provided for identifying backbone ports for the multiple VLANs supported by the switch.
Abstract:
An apparatus and method are disclosed for regulating the flow of data between plural network stations through a network switch. A receive port functions to receive data frames from a first network station, and a transmit port outputs the received data frames to a second network station. A programmable threshold register is provided for storing a threshold value that indicates a saturation level for the internal resources of the transmit port. Control circuitry is used to monitor the internal resources of the transmit port and determine whether or not the threshold value has been reached. If the threshold value has been reached, then the control circuitry will implement a flow control process that causes the first network station to discontinue transmission of data frames to the transmit port until the internal resources of the transmit port fall below the threshold value.
Abstract:
Content segmentation, categorization and identification methods are described. Content tracking approaches are illustrated that are suitable for large scale deployment. Time-aligned applications such as multi-language selection, customized advertisements, second screen services and content monitoring applications can be economically deployed at large scales. A client performs fingerprinting, scene change detection, audio turn detection, and logo detection on incoming video and gathers database search results, logos and text to identify and segment video streams into content, promos, and commercials. A learning engine is configured to learn rules for optimal identification and segmentation at each client for each channel and program. Content sensed at the client site is tracked with reduced computation and applications are executed with timing precision. A user interface for time-aligned publishing of content and subsequent usage and interaction on one or more displays is also described.
Abstract:
The overall architecture and details of a scalable video fingerprinting and identification system that is robust with respect to many classes of video distortions is described. In this system, a fingerprint for a piece of multimedia content is composed of a number of compact signatures, along with traversal hash signatures and associated metadata. Numerical descriptors are generated for features found in a multimedia clip, signatures are generated from these descriptors, and a reference signature database is constructed from these signatures. Query signatures are also generated for a query multimedia clip. These query signatures are searched against the reference database using a fast similarity search procedure, to produce a candidate list of matching signatures. This candidate list is further analyzed to find the most likely reference matches. Signature correlation is performed between the likely reference matches and the query clip to improve detection accuracy.
Abstract:
An architecture for a multimedia search system is described. To perform similarity matching of multimedia query frames against reference content, reference database comprising of a cluster index using cluster keys to perform similarity matching and a multimedia index to perform sequence matching is built. Methods to update and maintain the reference database that enables addition and removal of the multimedia contents, including portions of multimedia content, from the reference database in a running system are described. Hierarchical multi-level partitioning methods to organize the reference database are presented. Smart partitioning of the reference multimedia content according to the nature of the multimedia content, and according to the popularity among the social media, that supports scalable fast multimedia identification is also presented. A caching mechanism for multimedia search queries in a centralized or in a decentralized distributed system and a client based local multimedia search system enabling multimedia tracking are described.
Abstract:
A jitter buffer receives a plurality of data packets comprising a circuit emulation service over internet protocol (CESIP), buffers the plurality of data packets, and plays data from the plurality of data packets at a constant bit rate corresponding to the CESIP.
Abstract:
A micro-programmable controller is disclosed for parsing a packet and encapsulating data to form a packet. The micro-programmable controller loads an instruction within the micro-controller. The instruction word has a plurality of instruction fields. The micro-controller processes the plurality of instruction fields in parallel. Each instruction field is related to a specific operation for parsing a packet or encapsulating data to form a packet. The programmable micro-controller can be programmed to handle packets to support new types of protocols by programming a template to string specific routines together based on an instruction set specific for parsing and encapsulating.