摘要:
A plurality of switching modules arrayed in a plurality of columns and in at least one row switch over paths in accordance with path data contained in cells to transfer inputted data to a target line on the cell-unit. One or more path switching units are provided between two adjacent columns of switching modules among plural columns of switching modules and switch paths between the respective switching modules, disposed in a side-by-side relationship in a row direction, of one column of switching modules of the two adjacent columns of switching modules and the respective switching modules, disposed in the side-by-side relationship in the row direction, of the other column of the two adjacent columns of switching modules.
摘要:
A wireless communication device, including a radio transceiver data configured to transmit and to receive data packets to and from a base station, and a processor configured to compute a proportional hidden standby time being computed on the basis of at least two of from among a proportional exposed communication time, a proportional exposed collision time, and a proportional exposed standby time, to compute a predicted PER from the proportional hidden standby time computed; to compute a threshold value for the number of retransmission attempts on the basis of the predicted PER computed, and to cause the radio transceiver to repeat transmission of a data packet to the base station until the number of transmissions exceeds the threshold value computed in the case of failed transmission of a data packet to the base station by the radio transceiver.
摘要:
This invention is to appropriately cope with abnormal states. A control method according to the present invention includes: identifying an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and converting the identified abnormal level to an authentication strength level according to a predetermined authentication strength level setting rule, and causing an authentication server to carry out an authentication processing according to the authentication strength level. By carrying out such a processing, it becomes possible to cause the authentication server to carry out an authentication having an authentication strength level corresponding to an abnormal state.
摘要:
This invention is to enable to provide a network service, flexibly and quickly. In an embodiment of the invention, a network platform is achieved by a service providing network. The network platform provides common functions such as authentication and authorization, billing, and client management, and individual functions such as session control for client terminals connected with the service providing network. The client terminal generates and registers a service program to utilize functions in the network platform via a network management interface SMI. Then, by executing the service program, a service request for a specific function is transmitted to the network platform through a service control interface SCI, and the execution result is received from the specific function in the network platform.
摘要:
In a first UPC, a PCR is set as a monitor rate for each connection. If a transfer rate of a cell exceeds the PCR set for the connection, the cell is discarded. In a second UPC, an ACR is set as a monitor rate for each connection. If the transfer rate of the cell exceeds the ACR set for the connection, a lower priority is assigned to that cell. Additionally, with a configuration where one UPC monitors a varying rate, a parameter change process is controlled by obtaining a time between a passage time of a detected B-RM cell and an arrival of a user cell and comparing the obtained time with maximum and minimum delay standard values. A parameter table including some parameters is provided. A header of an arrived cell in a forward direction is extracted, and it is determined whether or not the arrived cell is a violation cell using the leaky bucket algorithm, etc. If the arrived cell is a violation cell, it is discarded. An RM cell in a backward direction is received and extracted, and the parameter table is updated by calculating the minimum cell interval, etc. based on data included in a payload of the RM cell.
摘要:
This invention is to enable appropriate routing based on transition prediction of network traffic. This routing control method includes: reading out predicted utilization transition data (e.g. utilization rate, or utilized bandwidth) associated with a received connection set-up request from a predicted utilization transition data storage storing said predicted utilization transition data for each resource (e.g. links between routers, or server) in a network in future; and selecting a resource satisfying a predetermined condition based on the read predicted utilization transition data. Thus, by using said predicted utilization transition data, an appropriate resource is identified in accordance with future time transition of the resource utilization rate, for example, and thereby, appropriate routing is possible. For example, when a link that a traffic volume will increase after a predetermined time exists, it is possible to judge that such a link is not used even when there are a lot of available bandwidths now.
摘要:
This invention is to enable appropriate routing based on transition prediction of network traffic. This routing control method includes: reading out predicted utilization transition data (e.g. utilization rate, or utilized bandwidth) associated with a received connection set-up request from a predicted utilization transition data storage storing said predicted utilization transition data for each resource (e.g. links between routers, or server) in a network in future; and selecting a resource satisfying a predetermined condition based on the read predicted utilization transition data. Thus, by using said predicted utilization transition data, an appropriate resource is identified in accordance with future time transition of the resource utilization rate, for example, and thereby, appropriate routing is possible. For example, when a link that a traffic volume will increase after a predetermined time exists, it is possible to judge that such a link is not used even when there are a lot of available bandwidths now.
摘要:
This invention is to appropriately cope with abnormal states. A control method according to the present invention includes: identifying an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and converting the identified abnormal level to an authentication strength level according to a predetermined authentication strength level setting rule, and causing an authentication server to carry out an authentication processing according to the authentication strength level. By carrying out such a processing, it becomes possible to cause the authentication server to carry out an authentication having an authentication strength level corresponding to an abnormal state.
摘要:
This invention is to enable to provide a network service, flexibly and quickly. In an embodiment of the invention, a network platform is achieved by a service providing network. The network platform provides common functions such as authentication and authorization, billing, and client management, and individual functions such as session control for client terminals connected with the service providing network. The client terminal generates and registers a service program to utilize functions in the network platform via a network management interface SMI. When executing the service program, a service request for a specific function is transmitted via a service control interface SCI to the network platform, and the execution result is obtained from the specific function of the network platform. The execution entity and keeping entity of the service program are initially determined based on the detecting entity of a trigger and etc., and furthermore, when it is actually executed in the client terminal, there is a case where the execution is entrusted to the network platform, taking into account the remaining processing capability of the client terminal.
摘要:
An ATM connection is a virtual communication path specified by VPI/VCI. A plurality of ATM connections that are directed to the same output line is defined as an ATM connection group. A connection UPC (Usage Parameter Control) facility is provided for each of the ATM connections and a connection group UPC facility is provided for the ATM connection group. The connection UPC facilities and the connection group UPC facility are operated in either the monitor mode or the control mode. In the monitor mode, when the rate of flow of packets into a network exceeds a threshold, a control unit is informed of it, but cells are allowed to enter the network as they are. In the control mode, when the rate of flow of cells into the network exceeds the threshold, cells the flow rate of which exceeds the threshold are discarded.