摘要:
The present invention includes a method and apparatus for automatically assigning a network address to a network device in an electronic communications network carrying inter-device communication packets to and from electronic devices located at assigned network addresses. The network device, also referred to as an appliance, communicates with at least one other network device to collect information from inter-device communication packets, which contain network address assignment information. From the network address assignment information in the communication packets, the appliance determines an available network address. The appliance assumes the available network address. The appliance may access a remote network device to retrieve an available, permanent, network configuration, including IP address.
摘要:
A method, a system, and an apparatus are provided for wireless communication of a traffic signal over a network. A message comprising data related to the traffic signal is received. Thereafter, the forwardability of the message is detemined. If forwardable, the message is forwarded. The validity of the message is checked and if found to be valid, information in the data is communicated to a vehicle controller. The message is discarded, if it is found to be invalid.
摘要:
A radio frequency identification device includes an integrated circuit including a receiver, a transmitter, and a microprocessor. The receiver and transmitter together define an active transponder. The integrated circuit is preferably a monolithic single die integrated circuit including the receiver, the transmitter, and the microprocessor. Because the device includes an active transponder, instead of a transponder which relies on magnetic coupling for power, the device has a much greater range.
摘要:
The invention is directed to techniques for maintaining a map of node relationships for a network of nodes (e.g., network of computers). In one example, the map of node relationships represents relationships overlaying and typically different from the network of physical connections among the nodes. Each child node periodically checks in with its parent nodes, and the parent nodes can thus determine when a child node has terminated a relationship with the parent or created a new relationship with a new parent. Changes in relationships propagate upward through the network of nodes so that each node maintains a map of the relationships among the descendants of that node. A root node receives the propagated change relationship information and maintains a map of the entire network and valid pathways through the network. The root node can use the map when responding to a request from a client to receive services from a node in the network and redirects the client to attach to a node in the network that has a valid path to the root node. The root node can then broadcast data (e.g. a stream of video data) throughout the network, which is received by all the clients attached to nodes in the network.
摘要:
A radio frequency identification device comprises an integrated circuit including a receiver, a transmitter, and a microprocessor. The receiver and transmitter together define an active transponder. The integrated circuit is preferably a monolithic single die integrated circuit including the receiver, the transmitter, and the microprocessor. Because the device includes an active transponder, instead of a transponder which relies on magnetic coupling for power, the device has a much greater range.
摘要:
A network operator identifies an address of a network element used by a particular client to obtain IP addresses. The client sends a test message to a test URL which includes a unique host name unknown to the client or network element. The network element accesses an authoritative server, which records the IP address of the requesting network element and resolves the host name in the test URL to a test IP address. The server records an IP address of the client when the client subsequently sends a message directly to the test IP address. In an alternative embodiment, another network node generates a redirect command, which incorporates the client IP address in a test URL, to allow for single-message determination of the network element and client IP addresses by the authoritative server. In both embodiments, user unique test URLs may be generated to allow the network operator to assist many users.
摘要:
In one embodiment, a subnet mask is automatically determined by a first network node attached to a subnet in a packet communication network. The first network node issues plural communication packets from plural source addresses to at least one address known to be used in the subnet to evoke responses, and based on the presence or absence of responses from the network nodes at the known addresses, the first network node determines the subnet mask which represents the subnet.
摘要:
Embodiments of the invention can resolve conflicts between candidate master network devices such as may be encountered in a failover condition. In a common type of failover protocol, two or more candidate master devices send messages to each other prior to a failover condition. A witness device (or process or service) also casts a vote to prevent a stalemate condition between the two candidate master devices that could lead to an error condition where multiple masters, or no masters, are elected.
摘要:
A method, a system, and an apparatus are provided for wireless communication of a traffic signal over a network. A message comprising data related to the traffic signal is received. Thereafter, the forwardability of the message is detemined. If forwardable, the message is forwarded. The validity of the message is checked and if found to be valid, information in the data is communicated to a vehicle controller. The message is discarded, if it is found to be invalid.
摘要:
A method, system and apparatus are provided for securely connecting a peripheral device to a processing device in a wireless network. The peripheral device makes a request for access to the processing device, which generates a challenge message and prompts a user to respond. The peripheral device is allowed access to the processing device, based on the user's response. If the user's response validates the challenge message, access is allowed; otherwise it is disallowed.