Abstract:
A system and method for routing data, the system having a processor, an interface in communication with the processor and capable of being in communication with a second system for routing data, a memory unit in communication with the processor, the memory unit having a network routing table having a plurality of routes, the plurality of routes having a first route; and a network failure route selection logic including instructions adapted to configure the processor to determine when the first route is inoperative, transmit a first data packet to the second system for routing data when the first route is inoperative and utilize a second route selected from one of the plurality of routes, the second route being different from the first route.
Abstract:
A method includes receiving an indication of at least one detected security issue at a network device. The indication is received from a security agent at a security manager processor. The method includes polling, via the security manager processor, at least one other network device in response to the indication in order to retrieve additional information when the security manager processor determines that the additional information is needed. The method includes selecting, via the security manager processor, at least one executable security object responsive to the indication and the additional information. The method also includes initiating communication of the at least one executable security object to the network device via the security manager processor.
Abstract:
A method and apparatus for automatic synchronization of monitoring points for a network management system (“NMS”) along a permanent virtual circuit (“PVC”) is disclosed. A NMS in an asynchronous transfer mode (“ATM”) network coupled to a plurality of ATM switches is operative to monitor each of the plurality of ATM switches storied in a monitoring service object corresponding to a PVC. The NMS receives at least one notification from at least one ATM switch of the plurality of ATM switches indicating an ATM switch has been added or removed from the PVC. In response to the at least notification, the NMS adds at least one ATM switch to the monitoring service object or removes at least one ATM switch from the monitoring service object.
Abstract:
The present disclosure provides a system and method configured to manage and facilitate network security. When a lack of security in a communication network is detected by a security agent or when a remote device requests security, a security profile can be determined by a security manager based on the detection or the request and the available network equipment. The security profile may contain numerous executable security objects that are selected based on the security issue and parameters of the specific network device(s) that will be implementing the security feature. The system and method may include a plurality of executable security objects configured to provide security for operations associated with multiple network devices communication over the network.
Abstract:
A matrixed memory array device is disclosed that includes input ports and output ports. Each input port is coupled to a first data bus and each output port is coupled to a second data bus that is different and separate from the first data bus. A memory brick is placed at each cross-point between first data buses and second data buses so as to switchably couple frames of data from input ports to output ports. Each memory brick contains a plurality of eight transistor (8-T) memory cells that can be used to store, erase, read, write, and switchably couple a data bit from the input port to a corresponding output port.
Abstract:
A system is disclosed for detecting packetization delay of packets in a network. The system includes a router to receive at least one packet containing data. A detection system, which is in communication with the router, extracts a codec information and a packet length information from the packet. A management system, which is in communication with the router, receives the codec information and the packet length information and determines packetization delay based on the codec information and the packet length information.
Abstract:
A frame relay data rate RFR for a VoIP call is determined based on a particular packetization time interval TS and its associated sample data size BS for a particular CODEC, a size BHT of at least one of a frame relay header and a frame relay trailer, and a size BIP of an IP header. A number of VoIP calls NUMVOIP that can be supported by a frame relay access link is determined based on a bandwidth of the frame relay access link that is to be allocated to VoIP traffic, and the frame relay data rate RFR. At least one network parameter is determined based on NUMVOIP. Bandwidth in an asynchronous transfer mode (ATM) network is allocated for the VoIP traffic based on the at least one network parameter.
Abstract:
A system and method are disclosed for monitoring communications of an individual in a packet network. A system that incorporates teachings of the present disclosure may include, for example, a network monitor (100) having a communications interface (110) coupled to a packet network (101), and a controller (102). The controller can be programmed to receive (202) a request from a third party to monitor communications associated with an individual, convey (204) to the third party information monitored on a group of one or more permanent virtual circuits (PVCs) of the packet network associated with the individual, detect (205, 206) an update in the group of one or more PVCs, determine (212) a new set of one or more PVCs associated with the individual, and convey (216) to the third party information monitored from the new set of one or more PVCs.
Abstract:
The present disclosure provides a system and method configured to and facilitate network security. When a lack of security in a communication network is detected by a security agent or when a remote device requests security, a security profile can be determined by a security manager based on the detection or the request and the available network equipment. The security profile may contain numerous executable security objects that are selected based on the security issue and parameters of the specific network device(s) that will be implementing the security feature. The system and method may include a plurality of executable security objects configured to provide security for operations associated with multiple network devices communication over the network.
Abstract:
VoIP traffic bandwidth through a router port is controlled so that it does not exceed a predetermined bandwidth to ensure a desired quality of service for all VoIP calls routed through the port. Information of a packet received by the port is extracted from a packet header. The information includes source and destination addresses and port numbers as well as the bandwidth used by the packet. If the packet is from an existing call, the packet is routed and the time the packet was received is updated. If the packet is from a new call, it is determined whether the port has sufficient bandwidth to route the new call. If the port has sufficient bandwidth, the packet is routed, bandwidth is allotted for subsequent packets from the new call, and the port information is updated to accept the subsequent packets. If the port does not have sufficient bandwidth, the packet is dropped.