摘要:
A first apparatus includes a sending unit which attaches a sequence number which is numbered for each priority of QoS set in a first packet, the sequence number is numbered for each priority of QoS set in the first packet, and sends the first packet with the sequence number. A second apparatus includes a storage unit which stores, for each priority, a history of sequence numbers attached to packets received, a determining unit which receives the first packet from the first apparatus, identifies the sequence number of the first packet, and determines whether the first packet has been previously received by comparing the identified sequence number with the history of sequence numbers according to the priority of QoS set in the first packet stored in the storage unit, and a unit which discards, when the determining unit determines the first packet has been previously received, the first packet.
摘要:
A communication apparatus is configured to include first and second cards, and a card-to-card link connecting the cards. Each card is communicably connected to another communication apparatus through a route connected to the card. One of the cards is determined to be a primary card that controls data transmission between the communication apparatus and another communication apparatus, and the other card is determined to be a secondary card controlled by the primary card. The primary card establishes a primary data-path for transmitting primary data, using one of the first and second routes connected to the primary card. The primary card further establishes a secondary data-path for transmitting secondary data, using the card-to-card link, the secondary card, and the other one of the first and second routes connected to the secondary card.
摘要:
When being triggered by a call setting request that has been made, dummy information that is different from information to be transmitted and is information used for creating a path on which encrypted communication is to be performed is generated. The path on which the encrypted communication is to be performed is established by using the generated dummy information. A responding process of responding to the call setting request is performed after the path on which the encrypted communication is to be performed has been established. Thus, in the case where information that is obtained after the responding process of responding to the call setting request is encrypted and transmitted, it is possible to transmit the information while maintaining the real-time characteristics of the information to be transmitted.
摘要:
A communication apparatus is configured to include first and second cards, and a card-to-card link connecting the cards. Each card is communicably connected to another communication apparatus through a route connected to the card. One of the cards is determined to be a primary card that controls data transmission between the communication apparatus and another communication apparatus, and the other card is determined to be a secondary card controlled by the primary card. The primary card establishes a primary data-path for transmitting primary data, using one of the first and second routes connected to the primary card. The primary card further establishes a secondary data-path for transmitting secondary data, using the card-to-card link, the secondary card, and the other one of the first and second routes connected to the secondary card.
摘要:
When being triggered by a call setting request that has been made, dummy information that is different from information to be transmitted and is information used for creating a path on which encrypted communication is to be performed is generated. The path on which the encrypted communication is to be performed is established by using the generated dummy information. A responding process of responding to the call setting request is performed after the path on which the encrypted communication is to be performed has been established. Thus, in the case where information that is obtained after the responding process of responding to the call setting request is encrypted and transmitted, it is possible to transmit the information while maintaining the real-time characteristics of the information to be transmitted.