摘要:
In a communication network comprising nodes and links between the nodes, a controller node disseminates link state information. A nodal routing table exists at each node comprising routes between pairs of nodes. The nodal routing table is either populated by the given node based on network information received from the controlling node or populated at the controlling node and received by the given node. Each node receives heartbeat signals from its neighboring nodes. An unexpected delay between heartbeat signals may be perceived as a failure of a link. The perceived failure of that link is reported by the perceiving node to the controlling node. Upon receiving link failure information from a node, the controlling node may determine a subset of nodes in the network influenced by the link failure and indicate the link failure to the determined subset of influenced nodes.
摘要:
To register a mobile device located in a first network with a packet-switched services network, a registration request is received from an aggregation device in the first network. The registration request contains an identifier of the aggregation device and identification information of the mobile device, where the identification information is previously unknown to the packet-switched services network. A globally unique identifier of the mobile device is dynamically created based on the identifier of the aggregation device and the identification information of the mobile device, wherein the globally unique identifier is used for uniquely identifying the mobile device in the packet-switched services network.
摘要:
Paths may be advertised on a network implementing a link state routing protocol by using path state advertisement that are distributed in the same manner as link state advertisements. The path state advertisements contain path entries, each of which includes a globally unique path ID and path information such as a series of nodes or links that defines the path through the network. When a path state advertisement is received by a network element, the network element will evaluate the path entries in the path state advertisement to determine if the path state advertisement is relevant and, if necessary, install forwarding state for the relevant path entries. Path state advertisements not relevant to a network element are not used to affect forwarding state on the network element. Label based forwarding may then be used by the network elements to forward data along the path, in which the globally unique path ID is used as the label for the data.
摘要:
A high capacity distributed switching system comprises electronic edge nodes connected to a balanced bufferless switch which may be electronic or optical. The balanced bufferless switch comprises a balanced connector and a switch fabric. The balanced connector comprises an array of temporally cyclic rotator units having graduated rotation shifts and each having a prime number of output ports. The switch fabric may be a mesh interconnection of switch modules. Due to the use of the balanced connector, establishing a path through the switch fabric requires at most a second-order time-slot matching process for a high proportion of connection requests with a much reduced need for a third-order time-slot matching process required in a conventional mesh structure.
摘要:
A centralized password repository (CPR) provides network users with a password portal through which the user can manage password access to domains and applications on the network. A subset of the domains and applications on the network may be required, by design, to maintain a separate password infrastructure. For these systems, the CPR establishes a secure and authenticated communication channel and software on the system interfaces with the password infrastructure to synchronize the password in the system password infrastructure with the password in the CPR. For other systems not required to maintain a separate password infrastructure, the CPR performs password services by responding to requests from those systems seeking to validate user IDs and passwords. The CPR enables an administrator to modify network privileges and enables a user to alter passwords on the network through a single interface.
摘要:
The rate at which a particular wireless client may be PINGed may depend on many factors, including the accuracy with which the location of the wireless client is required to be known, how accurate the system has historically been able to locate other previous clients in the same general area; the speed with which the client is moving, the amount of other data being transmitted by the client, the needs of other clients being serviced by the access point that will need to PING the client, the current battery life of the client, and the priority of obtaining an accurate location for a particular wireless user verses other uses of the network bandwidth. Based on the multiple factors considered by the system, the rate at which the client will be PINGed is adjusted to optimize the amount of bandwidth used to determine the client's location.
摘要:
A method and apparatus is disclosed by which IGMP Host messaging is translated to PIM messaging for the purposes of efficiently and accurately maintaining group membership data in a multicast network.
摘要:
A method and apparatus for managing communication between participants in a virtual environment enables the participants to elect to automatically connect with each other via a preferred communication mechanism, manually connect with each other, or choose not to connect with each other. The connection may be point-to-point between two participants or may include multiple participants. Establishment of a connection, or the ability to establish a connection, may be based on the proximity of the participants, or the Avatars representing the participants, in the virtual environment. Once the connection is established, the connection may be managed so that the connection is maintained while the Avatars remain proximate each other and is automatically severed once the Avatars move away from each other. Environmental noise and other audio aspects may be included in the connection to simulate a real-world conversation.
摘要:
A set of critical nodes or links is identified on the network through which most of the shortest paths on the network occur. Each node compares their distance to end points on the network with a distance between the end points and each of the distinct critical nodes. Where the distance between the end points and the critical nodes is shorter than the distance between the end points and the node, the node is not on the shortest path and does not install forwarding state. Where the distance between the end points and the critical node is larger than or equal to the distance between the end points and the node, the node may be on the shortest path between the pair of end nodes and installs forwarding state. Installation of forwarding state may cause packet duplication, but determining forwarding state is dramatically simplified. The level of duplication may be reduced by selecting a larger number of critical nodes on the network.
摘要:
Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier identifier and a product identifier. The identifiers may be embedded in RFID tags or EPC labels. A secure VPN tunnel is established between a supplier and a seller. The VPN tunnel is associated with a particular supplier identifier such that only inventory data associated with the supplier identifier that matches the supplier is transmitted on the VPN tunnel, and inventory data associated with supplier identifiers that do not match the supplier are filtered out. Hence, the seller can provide the supplier with access to inventory data without exposing sensitive information related to the seller and other suppliers.