摘要:
In one general embodiment, a method for setting a value of waiting time for switching is provided. At a node in a sonet ring, it is determined which path to the node is an actual path and which path is a preliminary path. Additionally, it is determined whether a one way fiber transmission delay of the actual path is less than a one way fiber transmission delay of the preliminary path. If the one way fiber transmission delay of the actual path is greater than the one way fiber transmission delay of the preliminary path, a switching time is set to zero and normal switching is performed. If the one way fiber transmission delay of the actual path is less than the one way fiber transmission delay of the preliminary path, a switching time is set equal to the one way fiber transmission delay of the preliminary path minus the one way fiber transmission delay of the actual path and it is determined whether a path alarm indication signal (AIS) occurred in the actual path. If the path alarm indication signal occurred in the actual path, path switching of the actual path is stopped within the switching time and it is determined whether a path alarm indication signal occurred in the preliminary path. If the path alarm indication signal did not occur in the preliminary path, normal path switching is performed for the actual path.
摘要:
A communication relay apparatus, information management system, and control method and program therefor. The communication relay apparatus includes several communication ports, and that includes a communication relay section, a buffer, a control signal transmitting section, a bandwidth information acquiring section, and a transmission interval control section.
摘要:
A communication relay apparatus, information management system, and control method and program therefor. The communication relay apparatus includes several communication ports, and that includes a communication relay section, a buffer, a control signal transmitting section, a bandwidth information acquiring section, and a transmission interval control section.
摘要:
A method for processing a communication data item. The communication data item is divided into at least two unencrypted packets to be encrypted. Each encrypted packet is generated from a corresponding unencrypted packet. Each unencrypted packet has a packet header and plaintext data. The packet header has an identifier field that includes a packet identifier. The packet identifier is identical for all unencrypted packets. Generating an encrypted packet for each unencrypted packet includes: determining a vector identifier from the identical packet identifier, wherein the vector identifier is associated with the identical packet identifier; ascertaining an initial vector from the vector identifier; and forming an encrypted packet header by inserting the vector identifier into a first portion of the packet header and encrypting a second portion of the packet header through use of the initial vector. The encrypted packets are subsequently decrypted and combined to reconstruct the communication data item.
摘要:
A system for processing a communication data item. The communication data item is divided into at least two unencrypted packets to be encrypted. Each encrypted packet is generated from a corresponding unencrypted packet. Each unencrypted packet has a packet header and plaintext data. The packet header has an identifier field that includes a packet identifier that is identical for all unencrypted packets. Generating an encrypted packet for each unencrypted packet includes: determining a vector identifier from the identical packet identifier, wherein the vector identifier is associated with the identical packet identifier; ascertaining an initial vector from the vector identifier; and forming an encrypted packet header by inserting the vector identifier into a first portion of the packet header and encrypting a second portion of the packet header through use of the initial vector. The encrypted packets are subsequently decrypted and combined to reconstruct the communication data item.
摘要:
A method for processing a communication data item. The communication data item is divided into at least two unencrypted packets to be encrypted. Each encrypted packet is generated from a corresponding unencrypted packet. Each unencrypted packet has a packet header and plaintext data. The packet header has an identifier field that includes a packet identifier. The packet identifier is identical for all unencrypted packets. Generating an encrypted packet for each unencrypted packet includes: determining a vector identifier from the identical packet identifier, wherein the vector identifier is associated with the identical packet identifier; ascertaining an initial vector from the vector identifier; and forming an encrypted packet header by inserting the vector identifier into a first portion of the packet header and encrypting a second portion of the packet header through use of the initial vector. The encrypted packets are subsequently decrypted and combined to reconstruct the communication data item.
摘要:
A system for processing a communication data item. The communication data item is divided into at least two unencrypted packets to be encrypted. Each encrypted packet is generated from a corresponding unencrypted packet. Each unencrypted packet has a packet header and plaintext data. The packet header has an identifier field that includes a packet identifier that is identical for all unencrypted packets. Generating an encrypted packet for each unencrypted packet includes: determining a vector identifier from the identical packet identifier, wherein the vector identifier is associated with the identical packet identifier; ascertaining an initial vector from the vector identifier; and forming an encrypted packet header by inserting the vector identifier into a first portion of the packet header and encrypting a second portion of the packet header through use of the initial vector. The encrypted packets are subsequently decrypted and combined to reconstruct the communication data item.
摘要:
A method and apparatus for controlling a transmission of data from a first storage device to a second storage device. The first storage device includes a recording unit for recording the data, a buffer for temporarily storing the data read from the recording unit, and a transmission unit for transmitting the data read from the buffer. It is determined that sufficient buffer space in the buffer is not available for the transmission of the data in a predetermined time interval. It is ascertained whether a transmission error exists in a communication line connecting the first storage device to the second storage device. If the transmission error exits, then the transmission unit is controlled to not perform the transmission of the data from the first storage device; otherwise the transmission unit is not controlled to not perform the transmission of the data from the first storage device.
摘要:
A method and apparatus for controlling a transmission of data from a first storage device to a second storage device. The first storage device includes a recording unit for recording the data, a buffer for temporarily storing the data read from the recording unit, and a transmission unit for transmitting the data read from the buffer. It is determined that sufficient buffer space in the buffer is not available for the transmission of the data in a predetermined time interval. It is ascertained whether a transmission error exists in a communication line connecting the first storage device to the second storage device. If the transmission error exits, then the transmission unit is controlled to not perform the transmission of the data from the first storage device; otherwise the transmission unit is not controlled to not perform the transmission of the data from the first storage device.
摘要:
A method for authentication. A computer obtains a random number R generated by a hardware token. The computer forms and returns to the hardware token a signature Ck′(R) formed using the random number R with a computer secret key Ck′. The computer receiving from the hardware token authentication of the signature Ck′(R) that is performed by the hardware token using a computer public key Ck stored in the hardware token.