摘要:
A computer implemented method for providing security on a software defined network (SDN). The method comprises providing a master SDN controller for managing data flow control on the SDN network. Requesting access to a uniform resource locator (URL) from a requesting networked device. Initiating a domain name system (DNS) interaction with the requesting networked device. Relaying by the DNS data associated with the requested URL to a threat management control system (TMCS). Determining by the TMCS if the requested URL has an associated security criteria. Communicating a threat status by the TMCS to the SDN co-controller associated with the requesting networked device.
摘要:
A computer implemented method for controlling a software defined network (SDN) is disclosed. The method includes providing one or more client portals configured for facilitating users controlling networked devices, generating configuration data based on input received from users via the client portals, and providing a master SDN controller for managing data flow control on the SDN network. The master SDN controller is operable to route data for the networked devices, generate a plurality of discrete co-controllers each associated with a particular end user with each co-controller having configuration data and routing data for an associated networked device, dispatching the co-controllers to the networked devices associated with the respective end users, installing the co-controllers on the networked devices, and registering the installed co-controllers with the master SDN controller for controlling the routing of data and configuration of the networked devices.
摘要:
A system (and corresponding methodology) by which a user can interact directly with visual data is provided. The system employs associations and relationships between visual data objects to automatically update objects based upon a change in other objects. The innovation also provides specialized controls (e.g., dashboard tools/controls) that facilitate manipulation of visual data. As there can be numerous manners in which a user can interact with visualization data, the innovation enables a specialized set of controls to be identified and provided to a user thereby reducing overwhelming effects of a large number of controls.
摘要:
The adaptive bandwidth throttling system implements a graceful diminution of services to the clients by delaying a first class of services provided by a network server in response to the effective bandwidth utilized by this network server exceeding a first threshold. If the demand for the bandwidth by this network server exceeds a second threshold, the bandwidth throttling system escalates the throttling response and blocks the first class of services from execution and can also concurrently delay execution of a second class of services. The implementation of the throttling process can be varied, to include additional levels of response or finer gradations of the response, to include subsets of a class of services. In addition, the threshold levels of bandwidth used to trigger the throttling response can be selected as desired by the system administrator.
摘要:
The adaptive bandwidth throttling system implements a graceful diminution of services to the clients by delaying a first class of services provided by a network server in response to the effective bandwidth utilized by this network server exceeding a first threshold. If the demand for the bandwidth by this network server exceeds a second threshold, the bandwidth throttling system escalates the throttling response and blocks the first class of services from execution and can also concurrently delay execution of a second class of services. The implementation of the throttling process can be varied, to include additional levels of response or finer gradations of the response, to include subsets of a class of services. In addition, the threshold levels of bandwidth used to trigger the throttling response can be selected as desired by the system administrator.
摘要:
A system (and corresponding methodology) by which a user can interact directly with visual data is provided. The system employs associations and relationships between visual data objects to automatically update objects based upon a change in other objects. The innovation also provides specialized controls (e.g., dashboard tools/controls) that facilitate manipulation of visual data. As there can be numerous manners in which a user can interact with visualization data, the innovation enables a specialized set of controls to be identified and provided to a user thereby reducing overwhelming effects of a large number of controls.
摘要:
Methods and apparatus for enhancing a search performance for timing includes a mobile station that detects a plurality of signals, each from one of a plurality of cells, wherein one of the plurality of cells is identified by the mobile station as a strong cell and the remaining cells are identified by the mobile station as weak cells. A first matched filter is applied to a signal from the strong cell to detect first parameters associated with the strong cell. A second matched filter is applied to at least one signal from one or more of the weak cells resulting in at least one second matched filter output. Interference is removed from the at least one second matched filter output to detect one or more second parameters associated with one of the weak cells and to establish a timing of one of the weak cells.
摘要:
Methods and apparatus for enhancing a search performance for timing includes a mobile station that detects a plurality of signals, each from one of a plurality of cells, wherein one of the plurality of cells is identified by the mobile station as a strong cell and the remaining cells are identified by the mobile station as weak cells. A first matched filter is applied to a signal from the strong cell to detect first parameters associated with the strong cell. A second matched filter is applied to at least one signal from one or more of the weak cells resulting in at least one second matched filter output. Interference is removed from the at least one second matched filter output to detect one or more second parameters associated with one of the weak cells and to establish a timing of one of the weak cells.
摘要:
A rake receiver in accordance with an exemplary embodiment of this invention is configurable by an external agent (e.g., microcontroller, DSP, or state machine) to suit the particular requirements of different spread spectrum systems. In an exemplary embodiment, the receiver includes multiple fingers. Each finger includes a plurality of generic despreaders/descramblers, a plurality of generic dechannelizers coupled to the despreaders/descramblers, and at least one timing estimation controller coupled to the despreaders/descramblers. The finger also includes at least one phase estimation controller, at least one frequency estimation controller, and at least one energy estimation controller all coupled to the generic dechannelizers.
摘要:
Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.