摘要:
Aspects of a method and system for content selection, delivery and payment may comprise a management entity that coordinates operation of one or more endpoint devices. The one or more endpoint devices may be operable to select one or more parameters associated with a particular content type from the management entity. The particular content type may specify a type of media content that is handled by the one or more endpoint devices. The one or more endpoint devices may be operable to receive configuration information from the management entity based on the selected one or more parameters associated with the particular content type. The one or more endpoint devices may be configured utilizing the received configuration information. The one or more endpoint devices may be operable to pay for the received configuration information.
摘要:
Aspects of a method and system for network communications utilizing shared scalable resources are provided. In this regard, networking state information for one or more of a plurality of communication devices may be communicated to a network management device. The network management device may be operable to aggregate the networking state information. The plurality of communication devices may receive aggregated networking state information from the network management device. The plurality of communication devices may route packets based on the received aggregated networking state information. The network management device may be dynamically or manually selected from the plurality of communication devices. The plurality of communication devices may be associated with a sharing domain, and one or more communication devices may be dynamically added to and/or removed from the sharing domain.
摘要:
A gateway network device may establish secure connections to a plurality of remote network devices using tunneling protocols to distribute to the remote network devices multimedia content received from one or more content providers. The consumption of the multimedia content may originally be restricted to local network associated with the gateway network device. The secure connections may be set up using L2TP protocol, and the L2TP tunneling connections may be secured using IPSec protocol. Use of multimedia content may be restricted based on DRM policies of the content provider. DRM policies may be implemented using DTCP protocol, which may restrict use of the multimedia content based on roundtrip times and/or IP subnetting. Each content provider may use one or more VLAN identifiers during communication of the multimedia content to the gateway network device, and the gateway network device may associate an additional VLAN identifier with each secure connection.
摘要:
Network Interface Controller (NIC) logic may receive a packet comprising a routing parameter indicating a service or cost to be utilized in processing the packet. The NIC logic may determine a selected virtual machine (VM) running on a network device to process the packet according to the routing parameter. The NIC logic may communicate the packet across a network after the packet has been processed by the selected virtual VM. Or, the NIC logic may initialize a VM in the network device to process the packet according to the routing parameter. The NIC logic may receive multiple packets and determine a second selected VM or initialize a second VM to process the multiple packets according to the respective routing parameters of the multiple packets. The routing parameters may indicate device capabilities, service class, quality measurements, latency, power usage or any combination thereof.
摘要:
Aspects of a method and system for traffic management via virtual machine migration include detecting an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources. Responsive to the detection of the abnormal pattern, a second virtual machine that utilizes a second set of network resources may be initialized. The second virtual machine may take over functions performed by the first virtual machine and initialization of the second virtual machine is based on an analysis of the traffic. The second virtual machine may be initialized utilizing stored virtual machine sate information in instances that the abnormal traffic is a result of a malicious attack. The second virtual machine may be initialized utilizing current virtual machine state information in instances that the abnormal traffic is not a result of a malicious attack.
摘要:
One or more processors and/or one or more circuits may be operable to configure one or more virtual machines and a hypervisor for controlling the one or more virtual machines. The virtual machines and the hypervisor may be distributed across a plurality of network devices. A sub-hypervisor may be configured within each of the virtual machines utilizing the hypervisor. Load information of the network devices may be communicated to the hypervisor utilizing the sub-hypervisors. The virtual machines may include threads, may be load balanced utilizing the hypervisor, dynamically configured utilizing the hypervisor based on changes in the network devices, and scaled by the distribution of the virtual machines across the network devices. Information from the processing of data may be received in the virtual machines. The network devices may include a plurality of: servers, switches, routers, racks, blades, mainframes, personal data assistants, smart phones, desktop computers, and/or laptop devices.
摘要:
Latency requirements for Ethernet link partners comprising PHY devices and memory buffers, may be determined for packets pending transmission. Transmission may be interrupted for a first packet having greater latency than a second packet, and the second packet may be transmitted. The second packet may be interrupted for transmission of a third or more packets. Packets are inspected for marks and/or for OSI layer 2 or higher OSI layer information to determine the latency requirements prior to completion of transmission of the first packet. The second packet is transmitted after a first portion of the first packet and/or prior to a second portion. Delimiters are inserted among the first and/or second packets for interrupting transmission. A PHY layer, MAC layer and/or higher OSI layer of the second link partner may receive, buffer and/or parse the packets and/or packet portions and/or may reconstruct the first packet and/or the second packet.
摘要:
A communication system performs burst noise cancellation. A transmitter produces and transmits a spread signal that comprises at least one known-value symbol spread by a plurality of non data-carrying orthogonal codes and data symbols spread by at least one data-carrying orthogonal code. The transmitter transmits the spread signal across a communication link that introduces burst noise. A burst noise detector determines burst noise affected chips of the orthogonal codes. A weight computation functional block calculates a plurality of complex-valued combining weights based upon the burst noise affected chips. A vector de-spreader and a linear combiner operate in combination to use the plurality of non data-carrying orthogonal codes, the at least one data-carrying orthogonal code, and the plurality of complex-valued combining weights to de-spread the received spread signal to produce the data symbols with the burst noise substantially removed.
摘要:
A digital mode receiver for the reception of signals from multiple independent subscribers, as on a cable television bidirection broadband data transmission system, adapted for subscriber inquiries and two-way data transmission. Each burst comprises a fixed preamble portion and a variable data portion. The received burst is sampled and fed to a sample storage buffer. The preamble portion's output is used to initialize an equalizer, and to synchronize carrier and modulation clock. By repeating the processing of the preamble and optionally all or part of each burst, accuracy of detection of the variable data is improved, so that it is feasible to receive individual bursts without burst-to-burst coordination, while using a short preamble for increased efficiency.
摘要:
Aspects of a method and system for predictive leasing of network services and applications based on a usage pattern may comprise a management entity that coordinates operation of one or more endpoint devices. A user profile associated with the one or more endpoint devices may be received by the management entity, wherein the management entity may utilize the user profile associated with the one or more endpoint devices and a usage pattern associated with the one or more endpoint devices to determine leasing information for the one or more endpoint devices. The management entity may be operable to communicate the determined leasing information to the one or more endpoint devices. The leasing information may comprise leasing services and/or applications to the one or more endpoint devices.