摘要:
Documents written using a markup language such as XML may be decomposed into Path and Parent Associated Node (PPAN) elements, each of which is a linear data structure that includes the content of a node, the parent-child relationship of the node, and the path level of the node. A number of PPAN elements may be grouped together to form A PPAN chain. A PPAN matching process uses the PPAN elements/PPAN chain to search for structured documents that match the PPAN chain. The PPAN matching process is able to perform query and match at the same time to accelerate the PPAN matching process, and also enables complex services to be represented by generic structured documents. Optionally, the PPAN matching process may support wildcard requests so that services may be discovered without prior knowledge of the services.
摘要:
Providing power management to sensing nodes in a sensor network may include a plurality of sensing nodes, each sensing node connected through a power management device to an external power source, such as a powered node of another network, for managing power from the external power source to the sensing node. Multiple power management devices allow for a sensor network of fixed or mobile wireless sensing nodes or sensor gateways to make use of power from an external source such as an another network. An intelligent power management device connected to at least one of the sensing nodes may provide for power policy management.
摘要:
Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier identifier and a product identifier. The identifiers may be embedded in RFID tags or EPC labels. A secure VPN tunnel is established between a supplier and a seller. The VPN tunnel is associated with a particular supplier identifier such that only inventory data associated with the supplier identifier that matches the supplier is transmitted on the VPN tunnel, and inventory data associated with supplier identifiers that do not match the supplier are filtered out. Hence, the seller can provide the supplier with access to inventory data without exposing sensitive information related to the seller and other suppliers.
摘要:
A computer network processes data packets in the event of a network link failure. The network includes a plurality of routers that deliver data packets to the network via a plurality of links. At least one router includes a protection cycle manager. The protection cycle manager has a protection cycle packet identifier and a protection cycle packet processor. The protection cycle packet identifier identifies, as protection cycle packets, data packets having a specific protection cycle format. The protection cycle packet processor processes protection cycle packets to determine whether the packet destination corresponds to the routing node, and if the packet destination corresponds to the routing node, the protection cycle packet is treated by the routing node as a data packet received from the packet source via the failed link. Otherwise, if the packet destination does not correspond to the routing node, the protection cycle packet is sent to a protection cycle node for the routing node.
摘要:
Where a common network clock is available at both a TDM receiver and a TDM transmitter which communicate via a packet network, differential clock recovery can be accomplished by matching the number of service clock pulses in a network reference clock period at the transmitter and receiver. In one embodiment the transmitter need only send a counter value from a counter that is clocked and reset, respectively, by the service clock and network reference clock, thereby allowing use of different types of oscillators, both analog and digital, to be implemented at the transmitter and receiver. The technique is also general enough to be applied in a wide variety of packet networks including but not limited to IP, MPLS and Ethernet. In an alternative embodiment, a faster derived network clock fdnc drives both the transmitter and receiver counters, which in turn are reset, respectively by the slower transmitter service clock fsc and slower receiver service clock frc.
摘要:
The invention includes a technique for clock recovery in a network having master and slave clocks in respective Time Division Multiplexing (“TDM”) network segments which are interconnected by a non-TDM segment. Master clock timestamps are sent to the slave. The slave measures a master clock timestamp inter-arrival interval, and sends slave clock timestamps to the master. The master measures a slave clock timestamp inter-arrival interval, and sends that slave clock timestamp inter-arrival interval to the slave. The slave then calculates an error signal based at least in-part on the difference between the master clock timestamp inter-arrival interval and the slave clock timestamp inter-arrival interval, and employs the difference to recover the first service clock in the second TDM segment.
摘要:
A method and system for monitoring context information associated with a wireless communication entity for determining a potential occurrence of a network disruption for that wireless communication entity. Upon determining a potential occurrence of a network disruption, causing an adjustment of bandwidth available for data transfer involving the wireless communication entity. The adjustment is used to prevent or mitigate service disruptions.
摘要:
Described are a method and system for determining whether to establish a call over an internet protocol (IP)-based network. A network device inspects an IP packet to determine that the IP packet conveys a message to initiate a call. The network device determines a shortest path through a link-state network to be taken by traffic associated with the call if the call is admitted. The network device also determines whether each link in the shortest path through the link-state network is available for supporting the traffic associated with the call and issues a message that rejects admission of the call if at least one link in the shortest path through the link-state network is unavailable for supporting the traffic associated with the call.
摘要:
A technique for transmitting an optical signal along an optical wavelength path through an optical network having a plurality of network nodes is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for transmitting an optical signal along an optical wavelength path through an optical network having a plurality of network nodes. Such a method may comprise transmitting a first message from a first node to a second node requesting an optical wavelength path from the first node to at least the second node, and simultaneously configuring the first node for transmitting an optical signal along the optical wavelength path from the first node to the second node.
摘要:
A traffic controller is provided which integrates black-box tests of unauthorized applications to extract application characteristics from associated Internet traffic, exploits the networking information learned by host clients, actively scans and controls hosts on the corporate network, and dynamically configures a corporate firewall to block traffic to and from critical application network elements. As a result, the traffic controller effectively manages unauthorized applications and their associated traffic in a corporate environment.