摘要:
The invention relates to a telecommunication network having IP packet-supporting capabilities, which includes a load distribution processing function, either centralized or distributed, by means of which a load distribution function may be applied to sets of paths between network nodes or sets of links of network trunks. The load distribution processing function handles different load distribution functions. Each of the different load distribution functions is associated to a different network input unit involved in the load distribution for a set of paths between network nodes or a set of trunk links. The invention also relates to a method of load distribution in a telecommunication network as summarized above.
摘要:
An instruction memory shared by a number of processing units has a plurality of individually accessible sections. A software program in the instruction memory is distributed among the memory sections. Sequential parts of the software program are in sequential sections. The software program may have a common portion which is repeated in each of the memory sections. Arbiter logic may control which of the processing units accesses which of the memory sections in each memory access cycle.
摘要:
A policing technique for a telecommunications traffic of variable length packets is described. The technique uses a plurality of police engines, grouped in pairs. A selection module selects a police engine pair to process a packet. Each police engine contains a conformance unit, credit unit and a debit unit, in which the credit update of one police engine influences the credit update of the other police engine in the pair. The technique also uses a combinatorial function to decide on a category of a processed packet and which police engines to update their debit units.
摘要:
In one embodiment, a method comprising receiving plural packets; and adaptively adjusting a pushtimer timeout value, packet aggregation threshold, or a combination of both based on a change in filtered rate of the received plural packets.
摘要:
Methods and systems for a plurality of physical layers for network connection may include coupling a MAC to one of a plurality of PHYs. The coupling to a specific PHY may be based on auto-detection of network activity, or network devices, via the PHYs. Also, one of the PHYs may be coupled to the MAC as a power-up default. The PHYs may be coupled to a same network, by, for example, cables. A first cable to a first PHY may couple it to a first network switch and a second cable to a second PHY may couple it to a second network switch. The first network switch may be rated to handle, for example, a greater data rate than the second network switch. The first cable may not be able to be used as a cable for the second PHY, and vice versa.
摘要:
The packet rate limiting method and system is used for detecting and blocking the effects of DoS attacks on IP networks. The method uses an ACL counter that stores an action parameter in the first 3 most significant bits and uses 13 bits as a packet counter. A rate limit is enforced by setting the packet counter to an initial value, and resetting this value at given intervals of time. The action parameter enables the ACL to accept or deny packets based on this rate limit. If the number of packets in the incoming flow saturates the packet counter before the reset time, the packets are denied access to the network until the counter is next reset. The denied packets may be just discarded or may be extracted for further examination.
摘要:
A STB resource sharing (RS) group of a home network comprises a plurality of STBs. In the STB RS group, a STB communicates with one or more other STBs to mutually share available device resources comprising hardware and software resources, and/or capabilities. The STB functions as an elected master (EM) or a STB RS client in the STB RS group. As an EM, the STB receives advertisements from other STBs to determine available resources. The determined available resources are announced to other STBs in the STB RS group. The STB manages the use of the determined available resources according to resource sharing requests received from other STBs. As a STB RS client, the STB advertises inherent resources to an EM of the STB RS group. The STB receives announcements from the EM for available resources in the STB RS group. The STB shares its available resources, accordingly.
摘要:
Methods and systems for a plurality of physical layers for network connection may include coupling a MAC to one of a plurality of PHYs. The coupling to a specific PHY may be based on auto-detection of network activity, or network devices, via the PHYs. Also, one of the PHYs may be coupled to the MAC as a power-up default. The PHYs may be coupled to a same network, by, for example, cables. A first cable to a first PHY may couple it to a first network switch and a second cable to a second PHY may couple it to a second network switch. The first network switch may be rated to handle, for example, a greater data rate than the second network switch. The first cable may not be able to be used as a cable for the second PHY, and vice versa.
摘要:
A STB resource sharing (RS) group of a home network comprises a plurality of STBs. In the STB RS group, a STB communicates with one or more other STBs to mutually share available device resources comprising hardware and software resources, and/or capabilities. The STB functions as an elected master (EM) or a STB RS client in the STB RS group. As an EM, the STB receives advertisements from other STBs to determine available resources. The determined available resources are announced to other STBs in the STB RS group. The STB manages the use of the determined available resources according to resource sharing requests received from other STBs. As a STB RS client, the STB advertises inherent resources to an EM of the STB RS group. The STB receives announcements from the EM for available resources in the STB RS group. The STB shares its available resources, accordingly.
摘要:
The packet rate limiting method and system is used for detecting and blocking the effects of DoS attacks on IP networks. The method uses an ACL counter that stores an action parameter in the first 3 most significant bits and uses 13 bits as a packet counter. A rate limit is enforced by setting the packet counter to an initial value, and resetting this value at given intervals of time. The action parameter enables the ACL to accept or deny packets based on this rate limit. If the number of packets in the incoming flow saturates the packet counter before the reset time, the packets are denied access to the network until the counter is next reset. The denied packets may be just discarded or may be extracted for further examination.