摘要:
Bridges (10, 12, 14) are used to interconnect local area networks transparently. In the IEEE 802.1D standard for bridges, a spanning tree is built among the bridges for loop-free frame forwarding (FIG. 10). Although this approach is simple, it does not support all-pair shortest paths. A novel bridge protocol is employed that attempts to find and forward frames over alternate paths that are shorter than their corresponding tree paths on the standard spanning tree, and makes use of the standard spanning tree for default forwarding. The protocol, referred to as the Spanning Tree Alternate Routing (STAR) Bridge Protocol, is backward compatible with the IEEE 802.1D standard and has a complexity that is comparable to that of the standard and other existing protocols and further includes an ability to prioritize the forwarding of frames over at least two different paths responsive to a priority value carried by a frame to be forwarded.
摘要:
Bridges (10, 12, 14) are used to interconnect local area networks transparently. In the IEEE 802.1D standard for bridges, a spanning tree is built among the bridges for loop-free frame forwarding (FIG. 10). Although this approach is simple, it does not support all-pair shortest paths. A novel bridge protocol is employed that attempts to find and forward frames over alternate paths that are shorter than their corresponding tree paths on the standard spanning tree, and makes use of the standard spanning tree for default forwarding. The proposed protocol, referred to as the Spanning Tree Alternate Routing (STAR) Bridge Protocol, is backward compatible with the IEEE 802.1D standard and has a complexity that is comparable to that of the standard and other existing protocols.
摘要:
A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).
摘要:
In certain embodiments, a method for managing operational parameters of a cognitive radio device to minimize non-compliance with a regulatory policy involves sensing a change in an operational condition that will affect compliance with a current operational policy; estimating a time at which the current operational policy will become invalid; selecting a method for determining how to update the current operational policy; and updating the current operational policy of the cognitive radio device. Other embodiments may incorporate more, fewer or other elements.
摘要:
In an embodiment, an adaptively-augmentable wireless network (100, FIG. 1) may include at least one mobile device (110-115) and at least one relay device (104-109). During network setup, a mobile device associated with a first host user may determine (505, FIG. 5) that no relay device signal is receivable by the mobile device which has an adequate signal quality. When an undeployed relay device is not available to the first host user, he mobile device may transmit (508) a deployment request message (700, FIG. 7). Another mobile device associated with a second host user may receive (902, FIG. 9) the deployment request message, and may determine (908) whether to initiate deployment of an undeployed relay device associated with the second host user. When the other mobile device decides to initiate deployment, it may transmit (912) a responsive deployment announcement message (800, FIG. 8). Accordingly, collaborative relay device deployment is achievable.
摘要:
A method for priority-based admission control in a network, comprises receiving an admission request for transmitting an information flow to a network through a communication channel and determining an admissible region within a range of a channel data rate of a communication channel for an information flow in response to a priority of the information flow, where the priority of the information flow is one of a plurality of priorities of information flow. The admissible region is one of a plurality of admissible regions within the channel data rate range that correspond to different ones of the plurality of priorities of information flow, respectively, and each of the plurality of admissible regions within the channel data rate range is useable for transmitting information flow with a respective one of the plurality of priorities. Further included in the method is determining an available channel data rate of the communication channel for receiving the information flow by the network, and granting the admission request for the information flow after determining that the available channel data rate of the communication channel is within the admissible region of the channel data rate range.
摘要:
A method and apparatus for electing broadcast relay nodes (520B, H, M) in an ad hoc network (500). Each node (520A-520O) generates an attribute message including associated parameters. Each node (520A-520O) generates a weighted value (WV) based on the parameters. The WV can be included in the attribute message for that node, can provide a metric for ranking that node to be nominated to be a broadcast relay node, can alternatively provide a probability measure for that node to probabilistically elect itself as a broadcast relay node. The broadcast manager node (520C) receives the attribute messages and elects at least one nominated node as a broadcast relay node (520B, H, M) based on the attribute messages. Each node (520A-520O) can also initiate election of an intermediate broadcast relay node if that node fails to receive a test message within a predetermined time.
摘要:
To address the need for protecting the QoS of high priority flows in a communication network when network conditions vary, original queue weights (B) are modified by a bandwidth allocation adaptor. The modification of the original queue weights is based, in part, on channel conditions.
摘要:
A system (800), device (820), and method (600, 700) for aggregating MAC users in a shared medium network improve MAC performance and minimize complexity of a headend scheduler by aggregating a number of MAC Users into an Aggregate MAC User. The Aggregate MAC User acts as a proxy for its Constituent MAC Users by contending for network resources on behalf of the Constituent MAC Users and allocating network resources to the Constituent MAC Users as needed.
摘要:
A method and apparatus for alerting nodes of a malicious node in a mobile ad-hoc communication system is provided herein. Particularly, a method and apparatus for distributing an alert message to nodes surrounding a recently discovered malicious node is provided. This alert technique further leverages mobility to distribute the alert message to a large majority of nodes in the ad hoc wireless network within a reasonable amount of time.