摘要:
The invention provides a Virtual Local Area Network (VLAN) over a DLSw interconnection so that VLAN identification is preserved as a packet is forwarded from a source VLAN over the TCP/IP link of the DLSw interconnection to a corresponding destination VLAN. A packet assigned to a VLAN is received by a first router. The first router uses a universal parser to determine the VLAN assignment of the packet. The parser is universal as it responds to the type of packet and type of VLAN (Ethernet, IEEE 802.5, etc.). The parser then writes VLAN information into a data structure in the router memory. The parsed data written into the data structure may include the following: the VLAN identification; a user priority identification; a CFI tag field; etc. The information fields in the data structure are assigned to the particular packet as it is processed by the router. Finally, as an outgoing encapsulated packet is built by the router, the fields of the data structure are read by the processes building the packet and written into fields of the encapsulating header. An encapsulated packet is then built by the first router for transmission over a TCP/IP connection with an encapsulating SSP header. A second router receives the encapsulated packet. The second router then builds a VLAN packet in response to the VLAN identification read from the encapsulating header and transmits the packet onto a destination VLAN corresponding to the source VLAN.
摘要:
Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access server and a content server. The user data includes subscriber identifier data that indicates a unique identifier for a particular user, network address data that indicates a network address for a host used by the particular user, NAS data that indicates an identifier for the network access server, flow list data that indicates one or more open data packet flows, and suspicious activity data. The suspicious activity data indicates a value for a property of the open data packet flows that indicates suspicious activity. It is determined whether an intrusion condition is satisfied based on the suspicious activity data. If the intrusion condition is satisfied, then the gateway responds based at least in part on user data other than the network address data.
摘要:
A method for communicating data is provided that includes receiving a plurality of bits associated with a communications flow and inspecting the bits. The method also includes determining whether one or more samples included in the flow should be suppressed. A portion of the bits is converted to 1 bits such that they are designated for later suppression. A selected one or more of the samples are suppressed if the selected samples are designated for suppression.
摘要:
A method for communicating data is provided that includes receiving a plurality of bits associated with a communications flow and determining whether one or more samples included in the flow should be suppressed. The method also includes suppressing a selected one or more of the samples. The method also includes retransmitting certain samples when a given sample has stopped changing, in comparison to a previously received sample, for a configured time interval.
摘要:
A device for measuring network performance in an Internet protocol (IP) network including a counter generating a send sequence number representing a relative send timing indicator for a data packet sent to a respondent network address. The counter generates a receive sequence number representing a relative receive timing indicator for a return data packet received by the device. A comparator compares the send sequence number with the receive sequence number to measure data packet loss.
摘要:
A method of monitoring performance of an Internet protocol (IP) network is described. The method includes generating a timing probe data packet to be sent over the network, the timing probe data packet containing at least a send time of day (STOD) stamp for a sender of the timing probe data packet. The method further includes sending the timing probe data packet over the network from the sender to a receiver. Finally, the method further includes analyzing the timing probe data packet contents including at least the STOD stamp as a performance measure of the network. Between the sending and the analyzing, there is further included writing into the timing probe data packet at the receiver data including at least a receive time of day (RTOD) stamp, and echoing the timing probe data packet by the receiver thereof. Thus, the sender of the timing probe data packet performs the analysis based upon the STOD stamp and the RTOD stamp. Preferably, the generating is performed in such manner that the timing probe data packet further contains a send sequence stamp, wherein the writing further includes a receive sequence stamp, and wherein the analysis is based further upon the send sequence stamp and the receive sequence stamp. The analysis may include first calculating the difference between the STOD stamp and the RTOD stamp as a latency performance measure of the network. Most preferably, the generating, sending and analyzing are repeated for at least two successive ones of such timing probe data packets. The analysis then includes three further calculations. First, the difference between the STOD stamp and the RTOD stamp for a first one of the successive ones of such timing probe data packets is calculated. Second, the difference between the STOD stamp and the RTOD stamp for a second one of the successive ones of such timing probe data packets is calculated. Finally, the difference between the first and second calculated differences is calculated as an inter-packet jitter performance measure of the network.
摘要:
A method for communicating data is provided that includes receiving a plurality of cells associated with a communications flow and determining whether one or more of the cells included in the flow should be suppressed. In specific embodiments, the method further includes suppressing a selected one or more of the cells associated with asynchronous transfer mode (ATM) adaptation layer 2 (AAL2).
摘要:
A control mechanism enables a destination router to authenticate a response time request issued by a source router. The control mechanism uses a control message that is transmitted by the source router to the destination router. Receipt of the control message by the destination router causes the destination router to listen for a server request message for a designated response time. The source router, after sending the control message, transmits a server request message to the destination router. In the event that the destination router receives the server request message within the designated response time, then the destination router responds to the server request message by providing the request to service software. The control message may encapsulate a message that holds the response time request. The request message may be encrypted.