摘要:
A method of applying a premold to a cable. The cable may have a plurality of shielded pairs, where the shielded pairs have conductors. A premold is applied to the cable, where the shielded pairs are aligned within the premold. A deformable material is wrapped over the premold. A shell is applied over the deformable material. The premold is sufficiently hard so as to protect the conductors from deformation when applying the shell. A portion of the conductors may be deformed before being welded.
摘要:
A system for multicasting a data packet in a multicast group includes a network entity, and a plurality of members of the multicast group. A member can notify the network entity of a rogue member of the group claiming an identity of a spoofed member of the group. In response to being notified, the network entity can distribute, to at least the members of the group other than the spoofed member, different versions of a symmetric key associated with the spoofed member. The member notifying the network entity of the rogue member can then receive a next data packet and a code for the next data packet, the code having been generated at the rogue member using a version of the symmetric key associated with the spoofed member such that the rogue member can be identified based upon the version of the symmetric key.
摘要:
Systems and methods are provided for routing packets on a network based on interface information of a routing gateway or a neighboring gateway. One embodiment includes updating a routing table using interface information shared by a neighboring router. Another embodiment includes making routing decisions based on interface information from a neighboring router. A further embodiment includes making routing decisions based on priorities determined from interface information. Another embodiment includes the steps of updating a routing table on a first gateway, which includes the steps of receiving data disclosing interface information on a neighboring second gateway, and updating a routing table based on the interface information. The interface information for the neighboring second gateway includes identification of communication interfaces on the second gateway, an interface type for each of the interfaces, and a physical type interface on which each virtual type interface is overlaid.
摘要:
A method of applying a premold to a cable. The cable may have a plurality of shielded pairs, where the shielded pairs comprise conductors. A premold is applied to the cable, where the shielded pairs are aligned within the premold. A deformable material is wrapped over the premold. A shell is applied over the deformable material. The premold is sufficiently hard so as to protect the conductors from deformation when applying the shell. A portion of the conductors may be deformed before being welded.
摘要:
A system for multicasting a data packet in a multicast group includes a network entity, and a plurality of members of the multicast group. A member can notify the network entity of a rogue member of the group claiming an identity of a spoofed member of the group. In response to being notified, the network entity can distribute, to at least the members of the group other than the spoofed member, different versions of a symmetric key associated with the spoofed member. The member notifying the network entity of the rogue member can then receive a next data packet and a code for the next data packet, the code having been generated at the rogue member using a version of the symmetric key associated with the spoofed member such that the rogue member can be identified based upon the version of the symmetric key.
摘要:
A method and apparatus for data source authentication in multicast communications is provided. Multicasting a packet may be divided into two actions. The first action includes unicasting the packet from a sending member to a group controller. The second action includes multicasting the packet from the group controller to the multicast group. The packet may be unicast to the group controller with a message authentication code (MAC) that may be generated by encrypting the packet with a symmetric key that is intended to be known only to the sending member and the group controller. After authenticating the MAC, the group controller multicasts the packet to the multicast group. The group controller includes with the packet a separate MAC for substantially each receiving member of the multicast group, each encrypted by a separate symmetric key. Each symmetric key may be intended to be known only by the receiving member and the group controller.
摘要:
A drying method for use of latent heat includes the following steps: A. installing a heating plate and a latent heat device having wax in a dry environmental space; B. placing an article to be dried in the dry environmental space; C. absorbing outside heat energy with the heating plate for drying process; D. utilizing the latent heat device to accumulate heat energy; and E. releasing the heat energy from the latent heat device for drying process. A drying apparatus for use of latent heat includes a box, a heating plate provided on the box, and a latent heat device provided in the box. The box has an entrance and a vent. The entrance is provided with a door to seal the entrance. The latent heat device comprises wax therein to do heat exchange through for drying purpose.
摘要:
A system is provided for multicasting a data packet in a multicast group. The system includes a source member and a plurality of destination members. The source member is capable of generating a code for the data packet using a symmetric key associated with the source member, and thereafter multicasting the data packet and the code. Each of the destination members is capable of receiving the data packet and the code. The destination member can then multicast a recall packet to the members of the multicast group when the destination member determines that the source member claims an identity of the respective destination member (i.e., spoofs the identity of the respective destination member). Otherwise, the destination member is capable of authenticating the source member based upon the code.