摘要:
A method for operating a computer network has a source router transmit a first message to be received by an intermediate router of the computer network, the first message to activate the intermediate router to listen for a designated time period for the intermediate router to receive a second message. Upon receiving a second message by the intermediate router during the designated time period, the intermediate router responds to the second message in response to receiving the second message during the designated time period.
摘要:
A control mechanism enables a destination router to authenticate a response time request issued by a source router. The control mechanism uses a control message that is transmitted by the source router to the destination router. Receipt of the control message by the destination router causes the destination router to listen for a server request message for a designated response time. The source router, after sending the control message, transmits a server request message to the destination router. In the event that the destination router receives the server request message within the designated response time, then the destination router responds to the server request message by providing the request to service software. The control message may encapsulate a message that holds the response time request. The request message may be encrypted.
摘要:
The invention provides a control mechanism that enables a destination router to authenticate response time requests issued by a source router before providing the requests to service software for processing. The control mechanism comprises a Network Endpoint Control Protocol (NECP) message format that is exchanged between the source and destination routers when measuring response time throughout the network. The NECP message format encapsulates a Command Length Status Data (CLSD) message that actually holds the response time requests. A collector router issues a novel control message to a responder router over a default responder port. If the responder is enabled for encryption communication, it will decrypt the control message according to the specified key and algorithm. If the responder is not so configured, it will check a conventional ACL to determine whether the client is authorized to communicate with the server. If permitted, the responder then responds to the collector in a manner dependent upon the particular protocol. In the case of a request to enable a UDP port for a particular time period, the responder processes a request and then sends back an acknowledgment to the collector. The collector receives the acknowledgment and then sends out a UDP probe packet to the responder. The responder then “echoes” the packet back to the collector, which keeps the result.
摘要:
A method and apparatus for accurately calculating packet loss along a communication channel using data in a pair of measuring packets is disclosed. The invention calculates packet loss between a first and second node over a communication circuit. A first known quantity of packets is communicated from the first node to the second node at a first known time. A first actual count of packets received by the second node from the first known quantity of packets is then determined. A second known quantity of packets is then communicated from the first node to the second node at a second known time. A second actual count of packets received by the second node from the second known quantity of packets is then determined. The difference between the first known quantity of packets communicated at the first known time and the second known quantity of packets communicated at the second known time is calculated to obtain a value for “packets sent”. The difference between the first actual count of packets received and the second actual count of packets received is calculated to obtain a value for “packets received”. The difference between the packets sent and the packets received provides a value for “packet loss” between the first known time and second known time.
摘要:
The invention is directed to a system and method for accurately determining the latency of a selected path within a computer network. First, a setup or signaling protocol is used to establish a bi-directional path state that is associated with a given traffic flow having predefined parameters at each intermediary node along the selected path. Once the path states are established, a source entity disposed at a first end of the selected path formulates and transmits a test message carrying a time record or time stamp to a receiver disposed at the opposite end of the selected path. The test message is configured in accordance with the predefined traffic flow parameters, but does not include any options. By virtue of the previously established path states at each node, the message is forwarded along the selected path without incurring any route or option processing delays. Upon receipt of the test message at the receiver, it is returned back to the source, and again follows the selected path. By comparing the time at which the test message is returned with the time record contained within the message, an accurate determination of the latency of the selected path may be determined.
摘要:
A method for operating a computer network has a source router transmit a first message to be received by an intermediate router of the computer network, the first message to activate the intermediate router to listen for a designated time period for the intermediate router to receive a second message. Upon receiving a second message by the intermediate router during the designated time period, the intermediate router responds to the second message in response to receiving the second message during the designated time period.
摘要:
A control mechanism enables a destination router to authenticate a response time request issued by a source router. The control mechanism uses a control message that is transmitted by the source router to the destination router. Receipt of the control message by the destination router causes the destination router to listen for a server request message for a designated response time. The source router, after sending the control message, transmits a server request message to the destination router. In the event that the destination router receives the server request message within the designated response time, then the destination router responds to the server request message by providing the request to service software. The control message may encapsulate a message that holds the response time request. The request message may be encrypted.
摘要:
In one aspect, the invention provides a gas treatment apparatus (1) comprising a gas-flow path and a plurality of reactor units (5)-(7) through which gas to be treated may flow arranged in series along the path. The reactor units (5)-(7) are adapted to generate a non-equilibrium plasma. This aspect of the invention may be used for decomposing pollutant materials in a gas (e.g. air). When air is being treated, the apparatus of this aspect of the invention is advantageously provided, downstream of the final reactor unit in series, with at least one catalyst bed (8) incorporating a catalyst capable of decomposing ozone. A further aspect of the invention provides apparatus (1) for decomposing a pollutant material dispersed in a gas, the apparatus comprising a gas flow path along which are provided for gas flow therethrough (i) at least one reactor unit (5) which is adapted to generate a non-equilibrium plasma and produce ozone in the gas, and (ii) downstream of (i), at least one catalyst bed (8) incorporating a catalyst capable of decomposing ozone.
摘要:
A method is provided in one example and includes receiving data propagating in a network environment and separating the data into one or more fields. At least some of the fields are evaluated in order to identify nouns and noun phrases within the fields. The method also includes identifying selected words within the nouns and noun phrases based on a whitelist and a blacklist. The whitelist includes a plurality of designated words to be tagged and the blacklist includes a plurality of rejected words that are not to be tagged. A resultant composite is generated for the selected nouns and noun phrases that are tagged. The resultant composite is incorporated into the whitelist if the resultant composite is approved.
摘要:
A method is provided in one example and includes receiving data propagating in a network environment, separating the data into one or more fields, evaluating at least some of the fields in order to identify nouns and noun phrases within the fields, and identifying selected terms within the nouns and noun phrases to be tagged. The selected terms are tagged with respective expertise tags. The method may also include receiving a search query for a particular expertise, the search query includes the selected terms. The method may also include matching the expertise tags to an end user in order to generate a response to the search query, the response includes an identifier of the end user. In more specific embodiments, the identifying of the selected terms includes using synaptic analysis or word occurrence counting. The expertise tags can be provided in a profile for the end user.