摘要:
A method is provided in one example and includes querying for a total capacity for data transmissions for a local network segment, and identifying an available capacity for the local network segment by subtracting a sum of current aggregate consumption of the local network segment from the total capacity. The method also includes comparing the available capacity to a requested capacity that is generated by a network element for a specific communication session. If the requested capacity is equal to or greater than the available capacity, the request is withheld and not transmitted. In more specific embodiments, if the requested capacity is less than the available capacity, the request is transmitted. The query can be communicated to a gateway. In still other embodiments, the query includes a specific query as to a capacity allocated for video data and the network element is a set-top box.
摘要:
A multi-use adapter configured to provide network connectivity for a serial bus client is provided. The adapter includes: a serial interface for coupling with the serial bus client; a network interface for interfacing the adapter with a network; and host control logic configured to interface a plurality of types of serial bus clients with a utilizing device over the network. The host control logic may be configured to detect a USB client coupled to the USB interface, to determine a corresponding driver for the detected USB client, and to retrieve the corresponding driver via the network interface.
摘要:
In one embodiment, a method of configuring a network connectivity device comprises receiving a network association request from a prospective client device requesting access to a network and sending an alert signal to a control device to cause the control device to emit an audible signal indicative of a network association request from a prospective client device. A prompt message is sent to the control device to cause the control device to provide instructions on providing feedback to the network connectivity device. The network connectivity device receives feedback from the control device and permits or denies access to the network responsive to the feedback from the control device.
摘要:
An UNENROLLED adapter responds to an enrollment activation signal by generating an enrollment supplicant signal. The enrollment supplicant signal is received by an ENROLLED adapter, an enrollment provider, which responds by formulating and transmitting an enrollment provider signal, including security management service information, to the UNENROLLED adapter. The UNENROLLED adapter changes a network adapter configuration responsive to the security management service information provided by the ENROLLED adapter, by which the network adapter is configured securely, and secure communications are effectuated. Enrolled adapter can solicit enrollment of an UNENROLLED adapter. The activation signal can be a physical or virtual activation sequence.
摘要:
Client adapter and method simplify security deployment in an EPN, including the shared services electrical power lines of a premises. With direct coupling, piggybacked adapter receives network signals and electrical from EPN-connected first adapter through a shared medium port. An authenticating adapter exchanges security management services and information with supplicant adapter. Two or more adapters may be piggybacked. Piggybacked adapters exchange security management service information without rogue intrusion. Exchanged information, stored, is later used to communicate securely. Defined adjacency (neighborhood) information can be exchanged, and a neighborhood established on an EPN, where one authorized neighbors securely communicate.
摘要:
Range-confined security management adapter and method simplify security deployment in a network. First RC security information, including nearest- and k-neighbor information, is transmitted between authenticating neighbor and supplicant neighbor using a predetermined transmission adaptation technique. The adapter can evoke a response from the neighbor by adapting the initial transmitted signal power level, and increasing incrementally; the initial transmitted signal bit rate, and decreasing incrementally; or both, in response to second RC security information signal. RC communications are effected at low power, high bit rate, or both, establishing secure configuration, effecting secure communication, and thwarting miscreant intrusion into the network.
摘要:
In one embodiment, a router gateway in a first Local Area Network (LAN) hosts both an Internet Protocol version 6 (IPv6) Rapid Deployment (6rd) Customer Edge (CE) as well as a 6rd Border Router (BR). In one specific example embodiment, upon registering the BR to a global computer network, the router gateway may then accept a 6rd tunnel from a device hosting a second 6rd CE of a second LAN, such that the 6rd tunnel joins the first and second LANs into a single LAN. The second CE may then communicate, via the router gateway, between the first and second LANs as a single LAN (e.g., site-to-site), accordingly.
摘要:
In one embodiment, a first interface of a switch interconnects with a broadband modem within a wide area network (WAN), while a second interface of the switch interconnects with a WAN interface of a router, where the router provides a gateway between the WAN and a local area network (LAN). Additionally, a web server is provided at the switch, where the web server is reachable to the WAN on the first interface and to the LAN on the second interface. The switch may then inspect traffic received at the first and second interfaces, and determines, based on inspecting, whether to transparently forward the traffic between the first and second interfaces or to redirect the traffic to the web server.
摘要:
Systems and methods for connecting a wireless station to a wireless network are provided. The method may include: receiving a pre-connection management signal from each of a plurality of wireless access points, each of the access points connecting an upstream network to a downstream wireless network; retrieving from each of the management signals characteristics of the access point corresponding to the management signal, the characteristics of the access point comprising information regarding the upstream network associated with the respective access point; analyzing the characteristics of the access point for each of the management signals; and based on the analysis of the characteristics of the access points, identifying a preferred access point from the plurality of access points.
摘要:
Range-confined security management adapter and method simplify security deployment in a network. First RC security information, including nearest- and k-neighbor information, is transmitted between authenticating neighbor and supplicant neighbor using a predetermined transmission adaptation technique. The adapter can evoke a response from the neighbor by adapting the initial transmitted signal power level, and increasing incrementally; the initial transmitted signal bit rate, and decreasing incrementally; or both, in response to second RC security information signal. RC communications are effected at low power, high bit rate, or both, establishing secure configuration, effecting secure communication, and thwarting miscreant intrusion into the network.