摘要:
A method and system to dynamically manager power in a communication system are provided herein. The method comprises the steps of monitoring a transmit data queue once every first pre-determined period of time and determining whether the transmit data queue is empty for a pre-determined number of times. The method further includes the step of generating a transition state signal to stop de-queuing of data from the transmit queue if the transmit data queue is empty for the pre-determined number of times and selectively operating portions of a Physical Layer (PHY) that are used for functions other than transmitting and receiving an idle signal in a low power mode.
摘要:
A method and system to dynamically manager power in a communication system are provided herein. The method comprises the steps of monitoring a transmit data queue once every first pre-determined period of time and determining whether the transmit data queue is empty for a pre-determined number of times. The method further includes the step of generating a transition state signal to stop de-queuing of data from the transmit queue if the transmit data queue is empty for the pre-determined number of times and selectively operating portions of a Physical Layer (PHY) that are used for functions other than transmitting and receiving an idle signal in a low power mode.
摘要:
Embodiments of the present invention include a method, an apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. One method includes tagging packets and forwarding packets in a wireless mesh network using stored forwarding information for the tag, wherein the forwarding information is according to a centrally determined routing method and tag distribution method.
摘要:
A policy-based multicast tunneling system. In particular implementations, a method includes maintaining a plurality of multicast tunnels with one or more remote network elements, each multicast tunnel being operable to carry one or more multicast streams; forwarding one or more packets of a multicast stream using selected multicast tunnels of the plurality of multicast tunnels; and applying one or more policies operative to control subscriptions to one or more of the plurality of multicast tunnels.
摘要:
A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security association information for a tunnel in a security association memory; responsive to a session key renegotiation, storing security association information for the tunnel in a cache; decrypting received packets associated with the tunnel conditionally using the security association information in the cache or the security association information in the security association memory; and upon an expiration condition, overwriting the security association information, for the tunnel, in the security association memory with the security association information, for the tunnel, copied from the cache.
摘要:
A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security association information for a tunnel in a security association memory; responsive to a session key renegotiation, storing security association information for the tunnel in a cache; decrypting received packets associated with the tunnel conditionally using the security association information in the cache or the security association information in the security association memory; and upon an expiration condition, overwriting the security association information, for the tunnel, in the security association memory with the security association information, for the tunnel, copied from the cache.
摘要:
Priority-aware hierarchical communication traffic scheduling methods and apparatus are disclosed. Communication traffic is scheduled by schedulers. Each scheduler supports a multiple priority scheduling function to schedule communication traffic having any of multiple priorities. The communication traffic scheduled by the schedulers is further scheduled based on the priorities of the communication traffic scheduled by each of the schedulers. Traffic shaping may also be integrated into a hierarchical scheduler. The priority-aware further scheduling and the optional shaping may be implemented, for example, using multiple Active lists, one per traffic priority, and a Pending list to which a scheduler can be added if it has communication traffic to schedule but is not allowed to schedule that traffic due to the shaping.
摘要:
A repeater, useable for connecting switches in a data communication network, is provided in a distributed and/or modular fashion. The repeater includes a plurality of separate and distinct components or modules connected to or at least partially housed in, the various switches which the repeater modules couple. The distributed and/or modular repeater facilitates accommodating various switching or repeater needs as a network grows or contracts. A light pipe, preferably integral with a module case, conveys indicator lights to a position visible when viewing a switch front panel. A heat spreader unit receives and/or conveys heat and/or protects against undue EMI. A collision-handling state machine transmits modified collision fragments so as to avoid reduction in interpacket gaps, e.g. by downstream repeater modules.
摘要:
Priority-aware hierarchical communication traffic scheduling methods and apparatus are disclosed. Communication traffic is scheduled by schedulers. Each scheduler supports a multiple priority scheduling function to schedule communication traffic having any of multiple priorities. The communication traffic scheduled by the schedulers is further scheduled based on the priorities of the communication traffic scheduled by each of the schedulers. Traffic shaping may also be integrated into a hierarchical scheduler. The priority-aware further scheduling and the optional shaping may be implemented, for example, using multiple Active lists, one per traffic priority, and a Pending list to which a scheduler can be added if it has communication traffic to schedule but is not allowed to schedule that traffic due to the shaping.
摘要:
A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security association information for a tunnel in a security association memory; responsive to a session key renegotiation, storing security association information for the tunnel in a cache; decrypting received packets associated with the tunnel conditionally using the security association information in the cache or the security association information in the security association memory; and upon an expiration condition, overwriting the security association information, for the tunnel, in the security association memory with the security association information, for the tunnel, copied from the cache.