摘要:
Techniques for updating configuration of an Optical Network Unit (ONU) in an Ethernet Passive Optical Network (EPON) include receiving a notification that an updated configuration file is available for the ONU, obtaining the updated configuration file, performing a first validation of the updated configuration file for structural errors, determining changes between a current configuration of the ONU and the updated configuration file to identify ONU resources to implement to the changes, performing a second validation about whether the ONU resources to implement the changes are available or not at the ONU and applying the changes to the ONU when it is determined that the ONU resources to implement the changes are available at the ONU.
摘要:
Techniques for updating configuration of an Optical Network Unit (ONU) in an Ethernet Passive Optical Network (EPON) include receiving a notification that an updated configuration file is available for the ONU, obtaining the updated configuration file, performing a first validation of the updated configuration file for structural errors, determining changes between a current configuration of the ONU and the updated configuration file to identify ONU resources to implement to the changes, performing a second validation about whether the ONU resources to implement the changes are available or not at the ONU and applying the changes to the ONU when it is determined that the ONU resources to implement the changes are available at the ONU.
摘要:
In accordance with an example embodiment of the present invention, there is provided an apparatus comprising at least one processor and computer program code, configured to cause the apparatus to at least transmit to a sensor node a request for processed sensor data, the request comprising an identity of a second node capable of processing sensor data, and receive a message enabling access to the processed sensor data, wherein the second node is comprised in the same peer network as the apparatus. The apparatus may also be configured to receive from the second node an indication that the second node has data processing capability it is willing to provide.
摘要:
A backpack with quick deploying body armor includes a backpack having a front compartment and rear compartment which has an opening on the top of the backpack; the opening can be closed by a flap which has open and closed positions; the flap can be locked to the top of the backpack. A rear ballistic panel is attached to the vertical face of the rear compartment. A front ballistic panel module has two connecting straps connecting to the bottom face of the rear compartment and two pulling straps. The front ballistic panel module has a storage position and deployed position. In the storage to position, the front ballistic panel is in the rear compartment and the pulling straps are attached to the shoulder straps of the backpack. In the deployed position, the front ballistic panel is out of the rear compartment and the pulling strap is fastened to the body of the wearer by connecting the end of the pulling strap.
摘要:
Provided are triazole derivatives of Formula I which are potent inhibitors of spleen tyrosine kinase and pharmaceutical composition. The triazole derivatives are useful in the treatment and prevention of diseases mediated by said enzyme, such as asthma, COPD, rheumatoid arthritis, and cancer.
摘要:
Provided are triazole derivatives of Formula I which are potent inhibitors of spleen tyrosine kinase and pharmaceutical composition. The triazole derivatives are useful in the treatment and prevention of diseases mediated by said enzyme, such as asthma, COPD, rheumatoid arthritis, and cancer.
摘要:
In accordance with an example embodiment of the present invention, there is provided an apparatus comprising at least one processor and computer program code, configured to cause the apparatus to at least transmit to a sensor node a request for processed sensor data, the request comprising an identity of a second node capable of processing sensor data, and receive a message enabling access to the processed sensor data, wherein the second node is comprised in the same peer network as the apparatus. The apparatus may also be configured to receive from the second node an indication that the second node has data processing capability it is willing to provide.
摘要:
The disclosure discloses a method and device for power control in non-adaptive retransmission. The solution thereof includes: when UE does not obtain a TPC adjustment value of a current HARQ process by parsing, determining a current power control mode; if the mode is an accumulation mode, determining whether the calculated sum of TPC adjustment values of each HARQ process is smaller than a given threshold, if yes, obtaining a transmission power by adding an increment adjustment value to a retransmission power, otherwise, calculating the transmission power of UE according to a formula in a protocol; if the mode is an absolute value mode, obtaining a transmission power by adding an increment adjustment value to a retransmission power. The solution can improve the SINR detected by an eNB and improve a retransmission success rate, thereby saving radio resources, facilitating utilization of radio resources and reduction of transmission delay, improving the throughput rate of an LTE system and improving the system performance.
摘要:
The embodiments of the present invention disclose a method for accessing a visited network. The method includes: a user selects a visited network and initiates an access request to a user information application apparatus; when the user information application apparatus detects that the visited network has changed, it obtains a list of authorized visited networks from a user information storage apparatus and checks whether the user is authorized to access the visited network; or the user information storage apparatus checks whether the user is authorized to access the visited network; if the user is authorized to access the visited network, the user information application apparatus returns an access accept response to the user, allowing the user to access the visited network. The embodiments of the present invention also disclose systems and apparatuses for accessing a visited network. The embodiments of the present invention make it possible to accurately check whether the user is authorized to access a visited network.