摘要:
In a communication system wherein a plurality of electronic devices connect and disconnect from communication over a medium and wherein the communication system has a protocol such that it is followed by the plurality of electronic devices when using the communication system, a probing device attempts to detect presence of a listening device and parameters associated with a connection to be set up between the probing device and the listening device by sending a probe request packet directed to the listening device and sending, from the listening device, a probe response packet in response to the probe request packet, wherein the listening device bypasses at least one step of the protocol when sending the probe response packet.
摘要:
In a communication system comprising one master device and one or more slave devices, the slave devices synchronize to a common timebase maintained at the master device, independently of a wireless module timebase, without requiring transmission of accurate and real time master timer information from the master device. In one approach, a slave device sends timing information to the master device, the timing information representing the slave device timebase, and the master device sends back correction information to the slave device, the correction information representing a difference between the slave device timebase and the master device timebase, the correction information being usable independent of the timing of sending back the correction information. The master timebase might be a system master timer of an accurate timer based on a timer interrupt and a high resolution timer having a resolution greater than a timer interrupt resolution.
摘要:
In a network environment, a wireless medium is reserved for transmissions. Medium reservation modifications can be requested and granted wherein a master device allocates a medium using reservations that are observed by other devices sharing the medium and a slave device complies with reservations by holding data for transmission until its reservation in time arrives by determining a reserved length of an upcoming transmitting opportunity reserved for a slave device, determining a desired length for transmitting data from the slave device over the medium, comparing the reserved length and the desired length to determine if a medium reservation modification is warranted, if the medium reservation modification is warranted, requesting, during the reserved time covered by the medium reservation, the medium reservation modification, and determining whether to grant or deny the medium reservation modification and conveying the determination to the slave device.
摘要:
In a communication system comprising one master device and one or more slave devices, the slave devices synchronize to a common timebase maintained at the master device without requiring transmission of accurate and real time master timer information from the master device. In one approach, a slave device sends timing information to the master device, the timing information representing the slave device timebase, and the master device sends back correction information to the slave device, the correction information representing a difference between the slave device timebase and the master device timebase, the correction information being usable independent of the timing of sending back the correction information.
摘要:
Medium reservation modifications can be requested and granted wherein a master device allocates a medium using reservations that are observed by other devices sharing the medium and a slave device complies with reservations by holding data for transmission until its reservation in time arrives by determining a reserved length of an upcoming transmitting opportunity reserved for a slave device, determining, at the slave device, a desired length for transmitting data from the slave device over the medium, comparing the reserved length and the desired length to determine if a medium reservation modification is warranted, if the medium reservation modification is warranted, requesting, using the slave device and the medium, during the reserved time covered by the medium reservation, the medium reservation modification, and determining, at the master device, whether to grant or deny the medium reservation modification and conveying the determination to the slave device.
摘要:
A method for packet processing on a multi-core processor. According to one embodiment of the invention, a first set of one or more processing cores are configured to include the capability to process packets belonging to a first set of one or more packet types, and a second set of one or more processing cores are configured to include the capability to process packets belonging to a second set of one or more packet types, where the second set of packet types is a subset of the first set of packet types. Packets belonging to the first set of packet types are processed at a processing core of either the first or second set of processing cores. Packets belonging to the second set of packet types are processed at a processing core of the first set of processing cores.
摘要:
A method for packet processing on a multi-core processor. According to one embodiment of the invention, a first set of one or more processing cores are configured to include the capability to process packets belonging to a first set of one or more packet types, and a second set of one or more processing cores are configured to include the capability to process packets belonging to a second set of one or more packet types, where the second set of packet types is a subset of the first set of packet types. Packets belonging to the first set of packet types are processed at a processing core of either the first or second set of processing cores. Packets belonging to the second set of packet types are processed at a processing core of the first set of processing cores.
摘要:
A system, method and computer program product are provided for affording network security features. A plurality of network objects are identified. Rule sets associated with one or more of the identified network objects are retrieved. Each rule set includes a plurality of policy rules that govern actions relating to the identified network objects. Overlapping policy rules of the rule sets are reconciled amongst the network objects. The reconciled rule sets are executed. A computer program product and a method are also provided for establishing network security. A plurality of network objects of a network and a plurality of rule sets are provided. The network objects are associated with the rule sets. The rule sets include a plurality of policy rules that govern actions relating to the identified network objects during operation of the network.
摘要:
Some embodiments of reassembly-free deep packet inspection (DPI) on multi-core hardware have been presented. In one embodiment, a set of packets of one or more files is received at a networked device from one or more connections. Each packet is scanned using one of a set of processing cores in the networked device without buffering the one or more files in the networked device. Furthermore, the set of processing cores may scan the packets substantially concurrently.
摘要:
A system an adaptive access point node includes (a) a switch disposed within a network, the network comprising at least one virtual local area network; (b) an anchor access point disposed in the at least one virtual local area network, the anchor access point connected to the switch via a data path, the anchor access point configured to receive a broadcast data packet from the switch via the data path; and (c) at least one access point connected to the anchor access point via a local data path to receive the broadcast data packet from the anchor access point via the local data path. The anchor access point and the access points further forward the broadcast data packet to other devices connected thereto.