Method and system for providing congestion control in a data
communications network
    1.
    发明授权
    Method and system for providing congestion control in a data communications network 失效
    在数据通信网络中提供拥塞控制的方法和系统

    公开(公告)号:US6035333A

    公开(公告)日:2000-03-07

    申请号:US977252

    申请日:1997-11-24

    IPC分类号: H04L12/56 G06F15/173

    摘要: A bin packing algorithm is employed to schedule computer network activities, such as pause times required for operation of an Ethernet network which implements existing IEEE 802.3x standards. In such a network, any node in the network can control the flow of traffic from upstream stations in order to avoid congestion at the flow-controlling node. Upon sensing congestion, the flow-controlling node determines how long each upstream node contributing to the congestion should pause transmission over the next control interval. In accordance with the invention, the pause times are scheduled or staggered by using the bin packing algorithm to sort the sources into one or more bins. One required bin property is that there is no overlap in pause times for the sources within a particular bin. Another required bin property is that the sum of the pause times within a bin can be no greater than the length of the control interval. In a preferred embodiment, the calculated pause times are separated into different groups having different number ranges and no more than one pause time is selected from any particular group for packing into a given bin.

    摘要翻译: 采用bin打包算法来调度计算机网络活动,例如实现现有IEEE 802.3x标准的以太网的操作所需的暂停时间。 在这种网络中,网络中的任何节点可以控制来自上游站的业务流,以避免流控制节点处的拥塞。 在感测到拥塞时,流控制节点确定每个有助于拥塞的上游节点在暂停下一个控制间隔时间内的传输时间。 根据本发明,通过使用二进制打包算法来排列或交错暂停时间,以将源排列成一个或多个仓。 一个必需的bin属性是在特定仓中的源的暂停时间没有重叠。 另一个所需的bin属性是bin内暂停时间的总和可以不大于控制间隔的长度。 在优选实施例中,将计算的暂停时间分成具有不同数量范围的不同组,并且从用于打包到给定仓中的任何特定组中选择不超过一个暂停时间。

    Enhanced flow control in ATM edge switches
    2.
    发明授权
    Enhanced flow control in ATM edge switches 有权
    ATM边缘交换机中增强的流量控制

    公开(公告)号:US06633585B1

    公开(公告)日:2003-10-14

    申请号:US09374349

    申请日:1999-08-13

    IPC分类号: H04J322

    摘要: A method and system within a telecommunications network for allocating available bandwidth among a plurality of sessions that share a common data link. First, a repeating unit time interval is designated for conducting the plurality of sessions. Next, the input flow rate from the source node of each of the sessions into the common data link is monitored. Thereafter, a target flow rate is computed and assigned to each of the sessions. The sum of the target flow rates is equal to the available bandwidth of the common data link. Finally, for each of the sessions in which the monitored input flow rate exceeds the assigned target flow rate, the source node is dynamically paused during each repeating unit time interval, such that the monitored input flow rate conforms to the assigned target flow rate for each of the sessions.

    摘要翻译: 一种用于在共享公共数据链路的多个会话之间分配可用带宽的电信网络内的方法和系统。 首先,指定进行多个会话的重复单位时间间隔。 接下来,监视从每个会话的源节点到公共数据链路的输入流速。 此后,计算目标流量并将其分配给每个会话。 目标流量的总和等于公共数据链路的可用带宽。 最后,对于监视的输入流量超过分配的目标流量的每个会话,源节点在每个重复单位时间间隔期间被动态地暂停,使得所监视的输入流量符合每个 的会话。

    Cache storage management using dual stacks
    4.
    发明授权
    Cache storage management using dual stacks 失效
    使用双栈缓存存储管理

    公开(公告)号:US06336167B1

    公开(公告)日:2002-01-01

    申请号:US09415416

    申请日:1999-10-08

    IPC分类号: G06F1200

    CPC分类号: G06F12/123

    摘要: Cache management in a computer system is achieved by using a cache with dual stacks with storage locations for labels associated with data units stored either in the stack or in a separate cache memory unit. The first or preliminary stack is always refreshed following each label request using a conventional Least Recently Used (LRU) algorithm. If the requested label exists in either stack, the conventional LRU algorithm is also used to update the second stack. If the requested label does not exist in either stack and the bottom position in the second stack is empty, the label is written into the top position of the second stack and existing stack entries are pushed down one position. If the bottom position in the second stack is not empty, stack entries at and below a predetermined insertion point (which may be set statically or dynamically) are pushed down, the entry in the bottom position in the stack is discarded and the label is written into the predetermined insertion point in the second stack.

    摘要翻译: 计算机系统中的缓存管理通过使用具有双堆栈的高速缓存来实现,该缓存具有与存储在堆栈中的数据单元相关联的标签的存储单元或单独的高速缓冲存储器单元中。 使用常规的最近最少使用(LRU)算法,在每个标签请求之后总是刷新第一或初步堆叠。 如果请求的标签存在于任一堆栈中,传统的LRU算法也用于更新第二堆栈。 如果请求的标签不存在于任一堆栈中,并且第二堆栈中的底部位置为空,则将标签写入第二堆栈的顶部位置,并将现有堆栈条目按下一个位置。 如果第二堆栈中的底部位置不为空,则在预定插入点(可以静态或动态设置)下方的堆栈条目被按下,堆叠中底部位置的条目被丢弃并且标签被写入 进入第二堆叠中的预定插入点。

    ATM network available bit rate (ABR) explicit rate flow control system
    5.
    发明授权
    ATM network available bit rate (ABR) explicit rate flow control system 失效
    ATM网络可用比特率(ABR)显式速率流量控制系统

    公开(公告)号:US06359862B1

    公开(公告)日:2002-03-19

    申请号:US08978178

    申请日:1997-11-25

    IPC分类号: H04J324

    摘要: A method of flow control for Available Bit Rate (ABR) sources in an Asynchronous Transfer Mode (ATM) network is implemented. An effective rate for the source is determined by an ATM switch based on a critically damped second order system. The effective rate is damped toward a share value that is based on the source queue length, a target queue length, and the actual cell rates of the connected ABR sources sending traffic through the ATM switch. The resulting feedback loop ensures that the source queue length will not exceed the target queue length.

    摘要翻译: 实现了异步传输模式(ATM)网络中可用比特率(ABR)源的流量控制方法。 源的有效速率由基于绝对阻尼二阶系统的ATM交换机确定。 根据源队列长度,目标队列长度和连接的ABR源通过ATM交换机发送流量的实际信元速率,有效速率被抑制。 所产生的反馈循环确保源队列长度不会超过目标队列长度。

    System, method and computer program to block spam
    6.
    发明授权
    System, method and computer program to block spam 失效
    阻止垃圾邮件的系统,方法和计算机程序

    公开(公告)号:US08468208B2

    公开(公告)日:2013-06-18

    申请号:US13532061

    申请日:2012-06-25

    IPC分类号: G06F15/16

    摘要: A system, method and program product for blocking unwanted e-mails. An e-mail is identified as unwanted. A source IP address of the unwanted e-mail is determined. Other source IP addresses owned or registered by an owner or registrant of the source IP address of the unwanted e-mail are determined. Subsequent e-mails from the source IP address and the other IP addresses are blocked. This will thwart a spammer who shifts to a new source IP address when its spam is blocked from one source IP address.

    摘要翻译: 用于阻止不必要的电子邮件的系统,方法和程序产品。 电子邮件被标识为不需要的。 确定不需要的电子邮件的源IP地址。 确定不想要的电子邮件的源IP地址的所有者或注册人拥有或注册的其他源IP地址。 源IP地址和其他IP地址的后续电子邮件被阻止。 这将阻止垃圾邮件发送者转移到新的源IP地址,当其垃圾邮件被一个源IP地址阻止时。

    Delayed-start method for minimizing internal switch congestion
    7.
    发明授权
    Delayed-start method for minimizing internal switch congestion 失效
    用于最小化内部交换机拥塞的延迟启动方法

    公开(公告)号:US07911960B1

    公开(公告)日:2011-03-22

    申请号:US09373837

    申请日:1999-08-13

    摘要: A data flow control method and system within a data switch. The data switch includes a plurality of input sections each having an associated input buffer and each transmitting data to an output section. In response to a detection of congestion within the output section, data transmissions from the plurality of input sections to the output section are paused. Input buffer occupancies of each of the input sections are then determined. Thereafter, and in response to a backpressure relief signal, the restart of said data transmission from each of the input sections to the output section is delayed in inverse proportion to each of the determined input buffer occupancies.

    摘要翻译: 数据交换机内的数据流控制方法和系统。 数据开关包括多个输入部分,每个输入部分具有相关联的输入缓冲器,并且每个输入部分将数据发送到输出部分。 响应于输出部分内的拥塞的检测,暂停从多个输入部分到输出部分的数据传输。 然后确定每个输入部分的输入缓冲器占用。 此后,并且响应于背压释放信号,从每个输入部分到输出部分的所述数据传输的重新开始被延迟与所确定的输入缓冲器占用中的每一个成反比。

    System, method and program to filter out login attempts by unauthorized entities
    8.
    发明授权
    System, method and program to filter out login attempts by unauthorized entities 失效
    系统,方法和程序过滤掉未经授权的实体的登录尝试

    公开(公告)号:US07475252B2

    公开(公告)日:2009-01-06

    申请号:US10918523

    申请日:2004-08-12

    IPC分类号: H04L9/32

    摘要: System, method and computer program for authenticating a user of a client computer to a remote server computer. A client computer initially sends a userID but not a password of the user to the remote server computer. In response to the userID, the server computer determines a subsequent time window during which the server computer will consider for authentication submission of a combination of the userID and a password. The server computer notifies the client computer of the time window. After receipt of the notification from the server computer, during the time window, the client computer sends the userID and a corresponding password to the server computer. In response to receipt of the userID and the corresponding password from the client computer, the server computer determines if the combination of the userID and the corresponding password is valid. If the combination of the userID and the corresponding password is valid, the server computer notifies the client computer that the combination of the userID and the corresponding password is valid. In response, the client computer establishes a session with the server computer and accesses a resource requiring a valid combination of userID and password to access. The server computer ignores combinations of userIDs and passwords submitted before or after the time window.

    摘要翻译: 用于向远程服务器计算机认证客户端计算机的用户的系统,方法和计算机程序。 客户端计算机最初向远程服务器计算机发送用户ID而不是用户的密码。 响应于用户ID,服务器计算机确定服务器计算机将考虑为用户ID和密码的组合的认证提交的后续时间窗口。 服务器计算机通知客户端计算机的时间窗口。 在从服务器计算机接收到通知之后,在时间窗口期间,客户端计算机向服务器计算机发送用户ID和相应的密码。 响应于从客户端计算机接收到用户ID和相应的密码,服务器计算机确定用户ID和对应密码的组合是否有效。 如果userID和相应密码的组合有效,则服务器计算机通知客户端计算机userID和相应密码的组合有效。 作为响应,客户端计算机与服务器计算机建立会话,并访问需要用户ID和密码的有效组合以访问的资源。 服务器计算机忽略在时间窗口之前或之后提交的用户ID和密码的组合。

    Efficient method for providing secure remote access
    9.
    发明授权
    Efficient method for providing secure remote access 失效
    提供安全远程访问的高效方法

    公开(公告)号:US07434050B2

    公开(公告)日:2008-10-07

    申请号:US10733713

    申请日:2003-12-11

    IPC分类号: H04L9/30

    摘要: A remote user, two-way authentication and password change protocol that also allows parties to optionally establish a session key which can be used to protect subsequent communication. In a preferred embodiment, a challenge token is generated and exchanged which is a one-time value that includes a random value that changes from session to session. The construction and use of the challenge token avoids transmission of the password or even the transmission of a digest of the password itself. Thus the challenge token does not reveal any information about a secret password or a digest of the password.

    摘要翻译: 远程用户双向认证和密码更改协议,还允许各方可选地建立可用于保护后续通信的会话密钥。 在优选实施例中,生成和交换挑战令牌,其是包括从会话到会话改变的随机值的一次值。 挑战令牌的构建和使用避免了密码的传输,甚至传输密码本身的摘要。 因此,挑战令牌不会显示关于密码的秘密密码或摘要的任何信息。

    Method and system for priority enforcement with flow control

    公开(公告)号:US07142552B2

    公开(公告)日:2006-11-28

    申请号:US10117814

    申请日:2002-04-08

    IPC分类号: H04L12/28 H04L12/56

    摘要: A method and system for controlling a plurality of pipes in a computer network, including at least one processor for a switch, the at least one processor having a queue, the plurality of pipes utilizing the queue for transmitting traffic through the switch, wherein each pipe is assigned a priority ranking class, each class has a unique priority rank with respect to each of the other classes, the ranks ranging from a highest priority rank to a lowest priority rank. A transmission probability is calculated for each pipe responsive to its priority rank. If excess bandwidth exists for the queue, the transmission probability of each pipe is linearly increased. Alternatively, if excess bandwidth does not exist, the transmission probability for each pipe is exponentially decreased. Packets are transferred from a pipe to the queue responsive to the pipe transmission probability and priority rank.