摘要:
In one embodiment, a VoIP device operable to estimate an upstream data rate for a network device is provided. The VoIP device includes a transceiver operable to transmit VoIP packets to and receive VoIP packets from the network device; and a logic engine configured to initiate a series of simulated VoIP streams through the network device to a VoIP call destination, the logic engine being further configured to determine when at least one of the simulated VoIP streams in the series is unsuccessful, the logic engine being further configured to estimate the upstream data rate for the network device based upon a data rate for those simulated VoIP streams preceding the unsuccessful simulated VoIP stream.
摘要:
An UNENROLLED adapter responds to an enrollment activation signal by generating an enrollment supplicant signal. The enrollment supplicant signal is received by an ENROLLED adapter, an enrollment provider, which responds by formulating and transmitting an enrollment provider signal, including security management service information, to the UNENROLLED adapter. The UNENROLLED adapter changes a network adapter configuration responsive to the security management service information provided by the ENROLLED adapter, by which the network adapter is configured securely, and secure communications are effectuated. Enrolled adapter can solicit enrollment of an UNENROLLED adapter. The activation signal can be a physical or virtual activation sequence.
摘要:
VoIP verification is initiated by subscriber-side test VoIP appliance, or VoIP proxy agent. Test VoIP appliance is coupled to test node over a communications internetwork by upstream and downstream datapaths. VoIP verification request is transmitted to test node. Responsively, test node transmits VoIP verification signal to test VoIP appliance. Perceivable indication of verification signal received by VoIP appliance is effected by visual display, audible indication, or both. Operational state verifier apparatus is disposed in a digital telephony device, a computer terminal, or with an ATA interface coupled to analog telephony device used in VoIP communications system.
摘要:
An UNENROLLED adapter responds to an enrollment activation signal by generating an enrollment supplicant signal. The enrollment supplicant signal is received by an ENROLLED adapter, an enrollment provider, which responds by formulating and transmitting an enrollment provider signal, including security management service information, to the UNENROLLED adapter. The UNENROLLED adapter changes a network adapter configuration responsive to the security management service information provided by the ENROLLED adapter, by which the network adapter is configured securely, and secure communications are effectuated. Enrolled adapter can solicit enrollment of an UNENROLLED adapter. The activation signal can be a physical or virtual activation sequence.
摘要:
Client adapter and method simplify security deployment in an EPN, including the shared services electrical power lines of a premises. With direct coupling, piggybacked adapter receives network signals and electrical from EPN-connected first adapter through a shared medium port. An authenticating adapter exchanges security management services and information with supplicant adapter. Two or more adapters may be piggybacked. Piggybacked adapters exchange security management service information without rogue intrusion. Exchanged information, stored, is later used to communicate securely. Defined adjacency (neighborhood) information can be exchanged, and a neighborhood established on an EPN, where one authorized neighbors securely communicate.
摘要:
Range-confined security management adapter and method simplify security deployment in a network. First RC security information, including nearest- and k-neighbor information, is transmitted between authenticating neighbor and supplicant neighbor using a predetermined transmission adaptation technique. The adapter can evoke a response from the neighbor by adapting the initial transmitted signal power level, and increasing incrementally; the initial transmitted signal bit rate, and decreasing incrementally; or both, in response to second RC security information signal. RC communications are effected at low power, high bit rate, or both, establishing secure configuration, effecting secure communication, and thwarting miscreant intrusion into the network.
摘要:
Range-confined security management adapter and method simplify security deployment in a network. First RC security information, including nearest- and k-neighbor information, is transmitted between authenticating neighbor and supplicant neighbor using a predetermined transmission adaptation technique. The adapter can evoke a response from the neighbor by adapting the initial transmitted signal power level, and increasing incrementally; the initial transmitted signal bit rate, and decreasing incrementally; or both, in response to second RC security information signal. RC communications are effected at low power, high bit rate, or both, establishing secure configuration, effecting secure communication, and thwarting miscreant intrusion into the network.
摘要:
Client adapter and method simplify security deployment in an EPN, including the shared services electrical power lines of a premises. With direct coupling, piggybacked adapter receives network signals and electrical from EPN-connected first adapter through a shared medium port. An authenticating adapter exchanges security management services and information with supplicant adapter. Two or more adapters may be piggybacked. Piggybacked adapters exchange security management service information without rogue intrusion. Exchanged information, stored, is later used to communicate securely. Defined adjacency (neighborhood) information can be exchanged, and a neighborhood established on an EPN, where one authorized neighbors securely communicate.
摘要:
Systems and methods are disclosed herein to provide IP bonding. For example, in accordance with an embodiment of the present invention, an IP bonding scheme is disclosed that modifies Generic Routing Encapsulation techniques such that information may be divided and carried through multiple paths (e.g., to improve capacity).