摘要:
A gateway network device may establish secure connections to a plurality of remote network devices using tunneling protocols to distribute to the remote network devices multimedia content received from one or more content providers. The consumption of the multimedia content may originally be restricted to local network associated with the gateway network device. The secure connections may be set up using L2TP protocol, and the L2TP tunneling connections may be secured using IPSec protocol. Use of multimedia content may be restricted based on DRM policies of the content provider. DRM policies may be implemented using DTCP protocol, which may restrict use of the multimedia content based on roundtrip times and/or IP subnetting. Each content provider may use one or more VLAN identifiers during communication of the multimedia content to the gateway network device, and the gateway network device may associate an additional VLAN identifier with each secure connection.
摘要:
Network Interface Controller (NIC) logic may receive a packet comprising a routing parameter indicating a service or cost to be utilized in processing the packet. The NIC logic may determine a selected virtual machine (VM) running on a network device to process the packet according to the routing parameter. The NIC logic may communicate the packet across a network after the packet has been processed by the selected virtual VM. Or, the NIC logic may initialize a VM in the network device to process the packet according to the routing parameter. The NIC logic may receive multiple packets and determine a second selected VM or initialize a second VM to process the multiple packets according to the respective routing parameters of the multiple packets. The routing parameters may indicate device capabilities, service class, quality measurements, latency, power usage or any combination thereof.
摘要:
Aspects of a method and system for traffic management via virtual machine migration include detecting an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources. Responsive to the detection of the abnormal pattern, a second virtual machine that utilizes a second set of network resources may be initialized. The second virtual machine may take over functions performed by the first virtual machine and initialization of the second virtual machine is based on an analysis of the traffic. The second virtual machine may be initialized utilizing stored virtual machine sate information in instances that the abnormal traffic is a result of a malicious attack. The second virtual machine may be initialized utilizing current virtual machine state information in instances that the abnormal traffic is not a result of a malicious attack.
摘要:
One or more processors and/or one or more circuits may be operable to configure one or more virtual machines and a hypervisor for controlling the one or more virtual machines. The virtual machines and the hypervisor may be distributed across a plurality of network devices. A sub-hypervisor may be configured within each of the virtual machines utilizing the hypervisor. Load information of the network devices may be communicated to the hypervisor utilizing the sub-hypervisors. The virtual machines may include threads, may be load balanced utilizing the hypervisor, dynamically configured utilizing the hypervisor based on changes in the network devices, and scaled by the distribution of the virtual machines across the network devices. Information from the processing of data may be received in the virtual machines. The network devices may include a plurality of: servers, switches, routers, racks, blades, mainframes, personal data assistants, smart phones, desktop computers, and/or laptop devices.
摘要:
Latency requirements for Ethernet link partners comprising PHY devices and memory buffers, may be determined for packets pending transmission. Transmission may be interrupted for a first packet having greater latency than a second packet, and the second packet may be transmitted. The second packet may be interrupted for transmission of a third or more packets. Packets are inspected for marks and/or for OSI layer 2 or higher OSI layer information to determine the latency requirements prior to completion of transmission of the first packet. The second packet is transmitted after a first portion of the first packet and/or prior to a second portion. Delimiters are inserted among the first and/or second packets for interrupting transmission. A PHY layer, MAC layer and/or higher OSI layer of the second link partner may receive, buffer and/or parse the packets and/or packet portions and/or may reconstruct the first packet and/or the second packet.
摘要:
A digital mode receiver for the reception of signals from multiple independent subscribers, as on a cable television bidirection broadband data transmission system, adapted for subscriber inquiries and two-way data transmission. Each burst comprises a fixed preamble portion and a variable data portion. The received burst is sampled and fed to a sample storage buffer. The preamble portion's output is used to initialize an equalizer, and to synchronize carrier and modulation clock. By repeating the processing of the preamble and optionally all or part of each burst, accuracy of detection of the variable data is improved, so that it is feasible to receive individual bursts without burst-to-burst coordination, while using a short preamble for increased efficiency.
摘要:
Aspects of a method and system for predictive leasing of network services and applications based on a usage pattern may comprise a management entity that coordinates operation of one or more endpoint devices. A user profile associated with the one or more endpoint devices may be received by the management entity, wherein the management entity may utilize the user profile associated with the one or more endpoint devices and a usage pattern associated with the one or more endpoint devices to determine leasing information for the one or more endpoint devices. The management entity may be operable to communicate the determined leasing information to the one or more endpoint devices. The leasing information may comprise leasing services and/or applications to the one or more endpoint devices.
摘要:
Aspects of a method and system for traffic management via virtual machine migration include detecting an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources. Responsive to the detection of the abnormal pattern, a second virtual machine that utilizes a second set of network resources may be initialized. The second virtual machine may take over functions performed by the first virtual machine and initialization of the second virtual machine is based on an analysis of the traffic. The second virtual machine may be initialized utilizing stored virtual machine state information in instances that the abnormal traffic is a result of a malicious attack. The second virtual machine may be initialized utilizing current virtual machine state information in instances that the abnormal traffic is not a result of a malicious attack.
摘要:
A virtual machine running on an endpoint device may encode a mark comprising routing parameters within one or more packets of a packet stream to indicate services and/or costs to be utilized in processing and/or communicating the packet stream. The virtual machine may communicate the packet stream to another network device. The routing parameters within the marks may indicate device capabilities, service class, quality measurements, latency and/or power usage. The routing parameters may comprise costs that may indicate capacity, efficiency and/or performance of power usage, bandwidth, absolute and/or relative latency, frame-drop eligibility, memory and processing. The packet stream is received and inspected to identify the marks and/or routing parameters. A virtual machine may be initialized and/or configured to process and/or communicate the packet stream based on the routing parameters. Routing may utilize based SPB, TRILL, and/or AVB.
摘要:
Aspects of a method and system for determining and controlling user experience in a network may comprise a management entity that coordinates operation of one or more endpoint devices. One or more parameters associated with a content type may be received from the one or more endpoint devices by the management entity. The management entity may utilize the received one or more parameters associated with the content type to determine configuration information for the one or more endpoint devices. The content type may specify a type of media content that is handled by the one or more endpoint devices.