摘要:
A traffic controller is provided which integrates black-box tests of unauthorized applications to extract application characteristics from associated Internet traffic, exploits the networking information learned by host clients, actively scans and controls hosts on the corporate network, and dynamically configures a corporate firewall to block traffic to and from critical application network elements. As a result, the traffic controller effectively manages unauthorized applications and their associated traffic in a corporate environment.
摘要:
A microfluidic bubble fuse is formed from a hermetically sealed reservoir containing an electrically conductive liquid. The reservoir is interposed between a pair of electrodes such that each electrode is in electrical contact with the fluid within the reservoir, and such that the fluid within the reservoir provides electrical interconnectivity between the electrodes. The reservoir may be implemented on a substrate, in a tube, or in another manner. When the current or voltage across the electrodes increases beyond a threshold, the excess current or voltage will cause a bubble to be created within the fluid to reduce or inhibit the flow of electricity between the electrodes. When the current/voltage is reduced, the bubble will collapse to restore the flow of electricity between the electrodes.
摘要:
Time-varying conditions in a wireless network are simulated using an architecture that includes an enclosure for shielding a wireless device under test (“DUT”) from electro-magnetic interference, including other wireless devices; and at least one of: (1) a communications traffic generating device operable to generate communications traffic having selected characteristics; and (2) at least one dynamically adjustable attenuator in communication with the wireless device and the traffic generator. Embodiments of the architecture include wireless test equipment for testing operating range, roaming and capacity. The attenuator is used to adjustably attenuate signals between the device and the traffic generator over time during a test, whereby motion of the device is simulated. By connecting multiple access points, each associated with a dynamically adjustable attenuator, it is possible to force the DUT to roam between access points. The communications traffic generating device can be used to vary traffic over time during a test in order to test capacity, prioritization and admission control. For example, the communications traffic generator may include phone and data client emulators which simulate different traffic types that can be independently varied over time during a test.
摘要:
Mid-call services may be added to a communication session such as a telephone call (call session) by a wireless device on a mobile telephone network by causing the wireless device associated with the communication session to invoke a second call session directed to a vertical service code. The second call session is established on the wireless communication network and terminated on the PSTN to an application server associated with the vertical service code. The application server on the PSTN instantiates the service and matches the service associated with the vertical service code on the second call session with the first call session. The application server then applies the mid-call service associated with the vertical service code to the first call session to thus enable mid-call services to be applied to the first call session by the wireless device.
摘要:
The present invention relates to a system and method for providing power management to sensing nodes in a sensor network. A system may include a plurality of sensing nodes, each sensing node connected through a power management device to an external power source, such as a powered node of another network, for managing power from the external power source to the sensing node. Beneficially, a plurality of power management devices allow for a sensor network of fixed or mobile wireless sensing nodes or sensor gateways to make use of power from an external source such as an another network e.g. an existing emergency lighting system or other similar powered building system. Thus for example, a sensor or group of sensing nodes and their associated power management devices may be integral with or co-located in proximity to powered nodes of these other networks. An intelligent power management device connected to at least one of the sensing nodes may provide for power policy management to sensing nodes based on monitoring power conditions such as available power, power level status, and information obtained from the sensing nodes indicative of network conditions, detecting a change therein, and regulating power to the sensing node depending on the change.
摘要:
A Legacy User Proxy CSCF (“L-CSCF”) provides multimedia services from a SIP based network to legacy access networks and devices. The L-CSCF includes a legacy service control state machine; a P-CSCF state machine and associated protocols; a mapping between a user's legacy network address and a corresponding network entry point; a database and logic for mapping between legacy user addresses and corresponding authentication data; legacy specific QoS control mechanisms; and an interworking function to handle incompatibilities between the legacy and SIP call models. The L-CSCF may be disposed logically between the legacy network and the multimedia network to translate and process communications such that legacy network and multimedia network devices need not require extensive modifications in order to support operation.
摘要:
Burst-switching nodes using a common-memory or a time shared space switch and employing flow-rate control are disclosed. Within a switching node, data bursts are segmented into data segments of a fixed size with some segments containing information bits as well as null bits. A switching node handles data streams allocated different flow rates and, for any data stream, the internal flow rate through the switching node can be higher than the external flow rate due to null padding of segmented data. The switching node is provided with a sufficient internal capacity expansion in order to offset the effect of null padding. A controller of the switching node is provided with a flow-rate-regulation apparatus to enable scheduling the transfer of data segments across the switching node in a manner that guarantees adherence to the allocated information flow rates.
摘要:
The present invention relates to the generation of customised documents using document templates and in particular to the generation of different types of customised documents including clauses or other portions of document content which are common to two or more types of customised document.
摘要:
The performance and ease of management of wireless communications environments is improved by a mechanism that enables access points (APs) to perform automatic channel selection. A wireless network can therefore include multiple APs, each of which will automatically choose a channel such that channel usage is optimized. Furthermore, APs can perform automatic power adjustment so that multiple APs can operate on the same channel while minimizing interference with each other. Wireless stations are load balanced across APs so that user bandwidth is optimized. A movement detection scheme provides seamless roaming of stations between APs.
摘要:
IP applications may be hosted on processors other than the processor on which their associated routing entity is hosted by causing the routing context to be extended to the new processor and causing IP termination to occur at the new processor. Applications may define policies specifying packet attributes and actions to be taken on matching packets, so that packets matching the policy may be directed to a processor hosting the application rather than a processor hosting the routing entity. A steering policy manager may be implemented to receive policies from the applications, verify the policy format and uniqueness vis-à-vis previously implemented policies, and implement the policies by passing the policies to one or more steering policy agents. Filters may be programmed into the data plane or the control plane to cause IP termination to occur on the processor hosting the application.