摘要:
In one embodiment, a router is configured to relay a provisioning request originating from a remote network device to a remote provisioning server. When the router receives back a provisioning response including provisioning information identifying a first remotely stored configuration file, the router is configured to modify the provisioning information such that the modified provisioning information no longer identifies the first remotely stored configuration file. The router then relays the provisioning reply, which may identify a second different configuration file, to the remote network device.
摘要:
In one example, a Cable Modem Termination System (CMTS) combines a value identifying itself with a cable modem Media Access Control (MAC) address stored in a provisioning request. The CMTS then relays the modified provisioning request to a provisioning server, which analyzes the value to identify a CMTS associated with the cable modem MAC address. Then, to regulate cable modem cloning or for other reasons, the provisioning server selects provisioning information for the cable modem according to the identified CMTS-MAC address association.
摘要:
In one embodiment, a router is configured to relay a provisioning request originating from a remote network device to a remote provisioning server. When the router receives back a provisioning response including provisioning information identifying a first remotely stored configuration file, the router is configured to modify the provisioning information such that the modified provisioning information no longer identifies the first remotely stored configuration file. The router then relays the provisioning reply, which may identify a second different configuration file, to the remote network device.
摘要:
In one embodiment, a cloned cable modem detector is configured to assemble a table associating cable modem physical addresses to Cable Modem Termination Systems (CMTSs) according to provisioning requests forwarded from the CMTSs. When one of the provisioning requests associates a cable modem physical address with a different CMTS than an existing association in the table, the detector outputs an indication of cable modem cloning.
摘要:
A remote survivable DHCP technique is described for facilitating communications between nodes of a computer network. According to a specific embodiment, the network include a remote survivable DHCP (RSD) system adapted to enable a DHCP relay agent to temporarily respond, during at least a portion of times when the DHCP server is down or unreachable, to DHCP-related requests from clients that have already received a valid DHCP lease offer from a DHCP server during at least a portion of times when the DHCP server is down or unreachable.
摘要:
A power manager for a mobile device comprises a traffic shaping unit (30) and a management unit (26). The traffic shaping unit is incorporated into a networking layer (8) of a mobile device architecture. The traffic management unit spans application layer (7) and networking layer (8) of the mobile device architecture. The traffic shaping unit and management unit are connected via a feed path (73). The management unit (26) is provided with inputs (74) to receive measurements of external parameters (65 to 69). The management unit further comprises a processor (20) to process the received measurements and a traffic shaping function generator (21) to receive the processed measurements and generate a traffic shaping function. The management unit (26) inputs the generated traffic shaping function to the traffic shaping unit (30) via the feed path (73), whereby the traffic management unit controls transmissions from the mobile device.
摘要:
The present invention relates to methods and apparatuses for providing network access, wherein a connection to a core network is established via a wireless access device and a gateway device. Connectivity of the wireless access device is restricted to a pre-defined group of core network address of a pool of gateway devices with multi-node connectivity to the core network, and a single address is selected to establish the connection to a one of the gateway devices. The gateway device is provided with a relay function for mapping a single input address to a plurality of core network addresses based on a location information of the wireless access device and with at least one co-located decentralized core network functionality.
摘要:
The present invention relates to methods and apparatuses for providing network access, wherein a connection to a core network is established via a wireless access device and a gateway device. Connectivity of the wireless access device is restricted to a pre-defined group of core network address of a pool of gateway devices with multi-node connectivity to the core network, and a single address is selected to establish the connection to a one of the gateway devices. The gateway device is provided with a relay function for mapping a single input address to a plurality of core network addresses based on a location information of the wireless access device and with at least one co-located decentralized core network functionality.
摘要:
Methods and devices are provided for detecting or preventing unauthorized upgrades to a customer's quality of service in an access data network. Several aspects of the invention require customer nodes to properly perform an initialization procedure. For example, the initialization procedure may involve making a request to a server controlled by, or at least trusted by, the service provider. The initialization procedure may involve downloading a configuration file, such as a DOCSIS configuration file, from the trusted server. According to some such aspects of the invention, nodes that cannot properly perform the initialization procedure are prevented from coming online. According to other such aspects of the invention, nodes that cannot properly perform the initialization procedure are marked. A warning may be sent to marked nodes. A customer associated with a marked node may be charged a higher rate for service.
摘要:
A power manager for a mobile device comprises a traffic shaping unit (30) and a management unit (26). The traffic shaping unit is incorporated into a networking layer (8) of a mobile device architecture. The traffic management unit spans application layer (7) and networking layer (8) of the mobile device architecture. The traffic shaping unit and management unit are connected via a feed path (73). The management unit (26) is provided with inputs (74) to receive measurements of external parameters (65 to 69). The management unit further comprises a processor (20) to process the received measurements and a traffic shaping function generator (21) to receive the processed measurements and generate a traffic shaping function. The management unit (26) inputs the generated traffic shaping function to the traffic shaping unit (30) via the feed path (73), whereby the traffic management unit controls transmissions from the mobile device.