摘要:
A system for evaluating a network having a plurality of domains, each domain embodying a respective topology, includes: (a) at least one gateway unit effecting signal handling between adjacent domains; (b) a plurality of communicating nodes coupled with the at least one gateway unit; and (c) at least one respective edge establishing a respective communication link between adjacent respective communicating nodes. At least one first selected communicating node is a unicast node. At least one second selected communicating node is a multicast node. At least one communicating node is a media node. Each unicast node is configured for handling messages addressed to the unicast node. Each multicast node is connected with at least one media node within a domain. Each media node is configured for handling messages addressed to multicast nodes connected with the media node individually or en masse.
摘要:
An apparatus comprises a structure including a cavity that, when excited with electromagnetic energy, produces an electric field having randomized distribution of field amplitude and polarity. The apparatus further comprises a sensor within the cavity. The sensor has a plurality of antennas for wirelessly harvesting operating power along different paths within the cavity.
摘要:
A server includes a memory device configured to store a plurality of computer-executable instructions, and a processor coupled to the memory device. When the processor executes the plurality of computer-executable instructions, the processor is programmed to determine an available spectrum of frequencies within a location over time, and receive a request from a wireless device to access the available spectrum for a predefined duration. The processor is also programmed to select a frequency band within the spectrum that is available to be used by the wireless device for the predefined duration, and transmit an authorization message to the wireless device to use the selected frequency band.
摘要:
Methods and apparatus for use in identifying cyber-security threats for an aircraft are provided. The method includes storing parts information relating to each hardware and software component used on the aircraft in an aircraft parts database, receiving, by a computing device, a cyber-security threat, and determining, by the computing device, a threat is relevant to the aircraft by comparing the received threats to the stored parts information.
摘要:
A method is described for routing data from a first node to a second node via a gateway. The second node is detected at the gateway, which determines a local identifier of the second node. A name and a global address are associated with the second node. The name and the global address are published to a name service, such that the first node can retrieve the global address based on the name. The gateway receives data from the first node that is addressed to the global address and transmits the data to the second node using the local identifier. The gateway includes software implementing a service-oriented architecture (SOA). Any number of additional services may be added to process messages passing through the gateway.
摘要:
In one embodiment, a method to authenticate a claimant comprises receiving, from the claimant, at least one of a set of beam data from a spot beam transmission, comparing the claimed at least one set of beam data to a known valid data set, and authenticating the claimant when a difference between at least one set of beam data and the known valid data set is less than a threshold.
摘要:
A filter for high speed digital signal processing. In one embodiment the filter includes a linear, phase-B, interpolating cubic spline filter having a pre-filter section and an interpolating post-filter section. The pre-filter section may be formed to implement any one of a 1-4-1 cubic spline function, a 2-5-2 cubic spline function or a 1-2-1 cubic spline function. The post-filter may be formed using a plurality of running average filters arranged in a cascade (i.e., serial) fashion. The filter can be constructed using significantly fewer independent component parts for a given level of pass band and stop band performance criteria, as compared with a conventional finite impulse response (FIR) filter. The filter is thus ideally suited for implementation with very large scale integration (VLSI) technology, and in a wide variety of electronic devices where high speed digital filtering is required.
摘要:
An architecture and methods for extending the depth of a WLAN to a four-level hierarchal access point structure including wireless access points. The wireless access points in the WLAN can be networked by scanning for a network, collecting one or more packets that identify the network from one or more access points, each packet including an address identifying an ancestry of the access points to an ancestral wired access point; and applying an access point selection algorithm to configure a parent access point. The architecture includes a scanning object configured to issue a scan request to a network interface and collect access point data; a selection object configured to filter and sort the collected access point data; an authentication state machine configured to perform authentication and validate; and an association state machine configured to compose a packet including hierarchical data indicative of access point ancestry to a conventional access point.
摘要:
A method for providing network integrated services based ReSerVation Protocol acorss a cryptographic network boundary includes assigning one or more DiffServ forwarding classifications to correspond to IntServ requests for QoS provisioning. A daemon in the QoS Service Provider module signals the QoS upon detecting data packets indicating a DiffServ forwarding class assigned to IntServ QoS requests. In response to the notification, the QoS Services Provider module initiates an RSVP-based request for network resources, and establishes a network path in response to acceptance of the RSVP path request. The data flow comprised of encrypted data is then transmitted over the reserved path. Multiple simultaneous aggregated flows may be provisioned. Path may be reconfigured and resized by the QoS services provider module in response to an overlimit data flow, subject to network resource availability. An ECN bit is returnable from the destination application to signal a problem with the data transmission.
摘要:
A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.