摘要:
A method of receiving packets over a network interface and queuing the packets onto a receive queue containing packets to be processed by more than one processor is described. The method includes selecting a particular one of the processors to interrupt when the receive queue is to be processed. Related systems and methods are also described and claimed.
摘要:
In an embodiment, a method is provided. The method of this embodiment provides receiving indication of an event at a platform operating in shared address mode, the platform having an auxiliary entity, in response to the indication of the event, switching operation of the platform to multi address mode by acquiring a second address, and assigning the second address to the auxiliary entity, and receiving one or more packets directed to the second address.
摘要:
In an embodiment, a method is provided. The method of this embodiment provides receiving a packet having a wake-up pattern, and waking up if the wake-up pattern corresponds to one of a number of dynamically modifiable passwords on a pattern wake list, each of the dynamically modifiable passwords being based, at least in part, on a seed value.
摘要:
In an embodiment, a method is provided. The method of this embodiment provides receiving indication of an event at a platform operating in shared address mode, the platform having an auxiliary entity, in response to the indication of the event, switching operation of the platform to multi address mode by acquiring a second address, and assigning the second address to the auxiliary entity, and receiving one or more packets directed to the second address.
摘要:
Apparatus and systems, as well as methods and articles, may operate to control a security state associated with one or more network node(s) using a master heuristic policy enforcement module associated with a network firewall, and to selectively re-direct first packets to the network firewall from a remotely manageable network controller located within the network node(s) based upon the security state.
摘要:
A method and system may allow a management server in a first network to communicate via a mediator server with a management module of a computing system in a second network. The mediator server may establish a communication connection to the management module and the data transferred from the management server to the management module may be associated with the communication connection.
摘要:
Secure enterprise network communication technology provides improved authentication prior to granting network access of enterprise host platforms with the network devices via a backend infrastructure.
摘要:
Provided is a method, system, and article of manufacture for inbound packet placement in host memory. A first packet for a buffer in memory is received and a descriptor is generated indicating a length of the first packet and a buffer address of the buffer. At least one subsequent packet following the first packet capable of fitting in the buffer with the first packet is received and a descriptor is generated for each received subsequent packet. The first packet and the at least one subsequent packet capable of fitting into the buffer are transferred to the buffer. The descriptors of the first packet and the at least one subsequent packet written to the buffer are added to a descriptor array.
摘要:
Provided is a method, system, and article of manufacture for inbound packet placement in host memory. A first packet for a buffer in memory is received and a descriptor is generated indicating a length of the first packet and a buffer address of the buffer. At least one subsequent packet following the first packet capable of fitting in the buffer with the first packet is received and a descriptor is generated for each received subsequent packet. The first packet and the at least one subsequent packet capable of fitting into the buffer are transferred to the buffer. The descriptors of the first packet and the at least one subsequent packet written to the buffer are added to a descriptor array.
摘要:
A system establishes secure communications between first and second electronic devices. The first device stores secured content to be accessed by second device based on identification information of the first device. The identification information of the first device may be manually input into the second device, and the second device may perform an initial pairing operation with the first device based on this manually entered information. The identification information stored from initial pairing may allow secure automatic pairing.