Abstract:
Systems and methods for transmitting content are provided. In some aspects, a method includes receiving an indication of a plurality of input streams of content. Each input stream is associated with an input bit rate. The method includes determining a plurality of output bit rates at which to transmit the content to one or more client devices, comparing the plurality of input bit rates to the plurality of output bit rates, and generating, by a server, a plurality of output streams of the content based on the comparison. Each generated output stream is associated with a corresponding output bit rate and includes a transcoded input stream or a non-transcoded input stream. The plurality of output streams is generated such that a number of output streams comprising non-transcoded input streams is maximized. The method also includes transmitting the generated output streams to the one or more client devices.
Abstract:
An IP multimedia gateway (IMG) receives content sharing service profiles generated by a service manager for communication devices that are coupled to the IMG. Content and/or content information that is received for communication to a first device, is communicated to other devices in response to a request. Content sharing profiles comprise permissions, group members, user preferences, device capabilities and security profiles. Content streams communicated to the first device may be shared with a second device based on the profiles. The second device may share additional streams with the first device. The first device or other devices may communicate the request. The content may be received from a service manager network device. The IMG and a communication device that may display the content may be integrated in a set-top-box or digital TV. Login access is enabled to devices for requesting content. Cooperation with other IMGs may enable discovery and/or content communication.
Abstract:
A network function virtualization security and trust system includes a network device that operates as a virtualized network device with virtualized services provided on the network device by network nodes included in the system. Security and trust within the system can include hardware authentication of the network nodes and the network device to obtain a level of security of the hardware provisioning the operation of the virtualized services. Security and trust can also include authentication of the services being used on the virtualized network device. Services authentication can be based on monitoring and analysis of the cooperative operation of the services in the virtualized network device. The virtualized services can be dynamically changed, added or stopped. Hardware authentication and dynamic services authentication in accordance with changes in the virtualized services can dynamically maintain a level of security across the devices and the virtualized services.
Abstract:
A broadband gateway may be used to authorize transactions associated with one or more accounts, which may be associated with a user of the broadband gateway. The transaction may be handled by the broadband gateway. The authorizations may be performed based on information associated with the accounts, whose storage may be controlled by the broadband gateway. The broadband gateway may block and/or terminate transactions failing authentication and/or validation, which may be performed based on the stored information. The transactions may be initiated within a network serviced by the broadband gateway. The transactions may also be initiated outside the serviced network. The stored information may comprise a user profile, which may comprise a plurality of settings for controlling and/or managing authorization performed by the broadband gateway. The user profiles may be configurable by users, wherein configuration may comprise initializing and/or modifying one or more of the transaction related settings.
Abstract:
A system, method, and apparatus for handling transition errors is presented herein. The transition errors include handling unreported time base discontinuities during trick mode transition, miscalculated time stamps during trick mode transition, erroneous sequence end codes, and unreported broken group of picture transmission. Unreported time base discontinuities are detected by comparing the program clock reference (PCR) value of the data packet to the system time clock (STC). If the difference exceeds a predetermined threshold, the STC is set to the PCR value. Miscalculated time stamps are detected by examining the difference in PTS values between temporally adjacent data packets. If the difference is not within a margin of error from predetermined value, the PTS is disabled. Unreported broken groups of pictures are handled by skipping the first two B-frames of the first group of pictures following a trick mode transition. Erroneous sequence end codes are detected by determining whether a packet containing a sequence end code is associated with a time base change. If the packet is not associated with a time base change, the sequence end code is disregarded.
Abstract:
A device in an industrial environment may adapt communications to account for industrial noise in the industrial environment. The device may send a first communication to a destination device in the industrial environment using a first communication technology. The device may access noise prediction data for the industrial environment, and the noise prediction data may indicate predicted noise for one or more portions of the industrial environment, including a communication pathway to the destination device using the first communication technology. The device may adapt a subsequent communication to the destination device to account for the predicted noise along the communication pathway.
Abstract:
A system may receive an input stream for a coding operation by a coding device. The system may determine a processing device to assist the coding device with the coding operation. The processing device may generate an indicator containing coding information or other coding assistance by processing the input stream. The processing device may send the indicator to the coding device. In some cases, the indicator may be embedded in the metadata of the stream by the processing device. The indicator may be extracted by the coding device. After reception of the indicator, the coding device may execute the coding task while using the information in the indicator to assist.
Abstract:
Different data communication architectures deliver a wide variety of content, including audio and video content, to consumers. The architectures employ channel bonding to deliver more bandwidth than any single communication channel can carry. In some implementations, the communication architectures distribute data streams to bonded channels that are clocked independently. A system is provided for synchronizing the bonded channels.
Abstract:
Different data communication architectures receive a wide variety of content, including audio and video content, for consumers. The architectures employ channel bonding to deliver more bandwidth than any single communication channel can carry. In some implementations, the communication architectures receive distributed video programming in the form of MPEG2 TS packets, flagged by marker packets. Channel bonding synchronization information may be present in packets defined above the data-link layer or received in fields within data-link layer frames.
Abstract:
A data communication architecture delivers a wide variety of content, including audio and video content, to consumers. The architecture employs channel bonding to deliver more bandwidth than any single communication channel can carry. In some implementations, the communication architecture communicates content according to an initial bonding configuration. The communication architecture may adjust the bonding configuration to adapt to bonding environment changes affecting the communication capabilities or requirements associated with transmitting the content.