摘要:
A system, method and apparatus for facilitating handoff of communications with a user device between a first communication network having a first domain technology, and a second communication network having a second domain technology different from the first domain technology, the system, method and apparatus includes an anchor point that establishes a first service flow with the first communication network, and a second service flow with the second communication network based upon a triggering event respectively, with the user device, and a handoff device that receives at least one handoff parameter for determining a handoff operation of the user device from the first communication network to the second communication network.
摘要:
This invention provides a system, method and apparatus for facilitating handoffs from a first communication network to a second communication network, the first communication network and second communication network being heterogeneous with respect to each other. The system, method and apparatus may further include a contextual information server, which stores contextual elements corresponding to a user device and the operating environment of the user device, and a handoff decision function module that evaluates at least one of the contextual elements to determine whether to handoff user device communications from the first communication network to the second communication network. The method and apparatus may further include obtaining at least one contextual element corresponding to a user device and the operating environment of the user device, evaluating the at least one contextual element with a handoff decision function module to establish a handoff decision, establishing a handoff decision, and notifying the user device of the handoff decision. The method for facilitating handoffs from a first communication network to a second communication network may further include receiving a received signal strength indication, receiving a link quality determination, receiving a characteristic of the user device, and determining the location of the user device.
摘要:
Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier identifier and a product identifier. The identifiers may be embedded in RFID tags or EPC labels. A secure VPN tunnel is established between a supplier and a seller. The VPN tunnel is associated with a particular supplier identifier such that only inventory data associated with the supplier identifier that matches the supplier is transmitted on the VPN tunnel, and inventory data associated with supplier identifiers that do not match the supplier are filtered out. Hence, the seller can provide the supplier with access to inventory data without exposing sensitive information related to the seller and other suppliers.
摘要:
An optical network unit (ONU) interconnected by passive optical network (PON) equipment to an optical line terminal (OLT) is identified using secondary modulation of the optical carrier to impress an identifier of the ONU onto the carrier. This resolves a recurring ONU failure mode detection problem caused by failure of a laser driver that causes the ONU to be stuck in an on state.
摘要:
A method and apparatus for communicating wireless network landscape information to a mobile device is shown and described. Strategic placement of beaconing devices that are encoded with pre-defined, specialized SSIDs allows information to be forwarded to the mobile clients to trigger specific behavior in the clients and to enable the clients to pro-actively control network transitions, thereby increasing their ability to provide seamless communications.
摘要:
Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier identifier and a product identifier. The identifiers may be embedded in RFID tags or EPC labels. A secure VPN tunnel is established between a supplier and a seller. The VPN tunnel is associated with a particular supplier identifier such that only inventory data associated with the supplier identifier that matches the supplier is transmitted on the VPN tunnel, and inventory data associated with supplier identifiers that do not match the supplier are filtered out. Hence, the seller can provide the supplier with access to inventory data without exposing sensitive information related to the seller and other suppliers.
摘要:
Documents written using a markup language such as XML may be decomposed into Path and Parent Associated Node (PPAN) elements, each of which is a linear data structure that includes the content of a node, the parent-child relationship of the node, and the path level of the node. A number of PPAN elements may be grouped together to form A PPAN chain. A PPAN matching process uses the PPAN elements/PPAN chain to search for structured documents that match the PPAN chain. The PPAN matching process is able to perform query and match at the same time to accelerate the PPAN matching process, and also enables complex services to be represented by generic structured documents. Optionally, the PPAN matching process may support wildcard requests so that services may be discovered without prior knowledge of the services.
摘要:
Providing power management to sensing nodes in a sensor network may include a plurality of sensing nodes, each sensing node connected through a power management device to an external power source, such as a powered node of another network, for managing power from the external power source to the sensing node. Multiple power management devices allow for a sensor network of fixed or mobile wireless sensing nodes or sensor gateways to make use of power from an external source such as an another network. An intelligent power management device connected to at least one of the sensing nodes may provide for power policy management.
摘要:
A computer network processes data packets in the event of a network link failure. The network includes a plurality of routers that deliver data packets to the network via a plurality of links. At least one router includes a protection cycle manager. The protection cycle manager has a protection cycle packet identifier and a protection cycle packet processor. The protection cycle packet identifier identifies, as protection cycle packets, data packets having a specific protection cycle format. The protection cycle packet processor processes protection cycle packets to determine whether the packet destination corresponds to the routing node, and if the packet destination corresponds to the routing node, the protection cycle packet is treated by the routing node as a data packet received from the packet source via the failed link. Otherwise, if the packet destination does not correspond to the routing node, the protection cycle packet is sent to a protection cycle node for the routing node.
摘要:
Where a common network clock is available at both a TDM receiver and a TDM transmitter which communicate via a packet network, differential clock recovery can be accomplished by matching the number of service clock pulses in a network reference clock period at the transmitter and receiver. In one embodiment the transmitter need only send a counter value from a counter that is clocked and reset, respectively, by the service clock and network reference clock, thereby allowing use of different types of oscillators, both analog and digital, to be implemented at the transmitter and receiver. The technique is also general enough to be applied in a wide variety of packet networks including but not limited to IP, MPLS and Ethernet. In an alternative embodiment, a faster derived network clock fdnc drives both the transmitter and receiver counters, which in turn are reset, respectively by the slower transmitter service clock fsc and slower receiver service clock frc.