摘要:
A method for communicating in a wireless application protocol (WAP) network environment is provided that includes receiving a request packet at a WAP gateway and positioning an identifier into the request packet. A content switch then identifies the identifier and correlates the identifier to a source that generated the request packet. An internet protocol (IP) address associated with the source is positioned in the request packet before communicating the request packet to a next destination.
摘要:
Apparatus and method for thermally controlled processing of microelectronic workpieces with liquids. An apparatus in accordance with and embodiment of the invention includes a process vessel configured to carry a processing liquid, such as an electroless processing liquid. The vessel has a thermally transmissive wall for transferring heat to and/or from the processing liquid within. A heat transfer device, such as a reservoir that receives processing liquid spilling over from the process vessel, transfers heat to or from the processing liquid within the process vessel. The heat transfer device can also transfer heat to or from an internal or external heat source, such as a conduit carrying a heat transfer fluid, or an electrical resistance heater. The interaction between the microelectronic workpiece and the processing liquid can be further controlled by controlling the rate at which the microelectronic workpiece rotates and/or the manner in which the microelectronic workpiece is introduced to and/or withdrawn from the processing liquid.
摘要:
Processes and systems for electrolytically processing a microfeature workpiece with a first processing fluid and an anode are described. Microfeature workpieces are electrolytically processed using a first processing fluid, an anode, a second processing fluid, and an anion permeable barrier layer. The anion permeable barrier layer separates the first processing fluid from the second processing fluid while allowing certain anionic species to transfer between the two fluids. The described processes produce deposits over repeated plating cycles that exhibit resistivity values within desired ranges.
摘要:
Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access server and a content server. The user data includes subscriber identifier data that indicates a unique identifier for a particular user, network address data that indicates a network address for a host used by the particular user, NAS data that indicates an identifier for the network access server, flow list data that indicates one or more open data packet flows, and suspicious activity data. The suspicious activity data indicates a value for a property of the open data packet flows that indicates suspicious activity. It is determined whether an intrusion condition is satisfied based on the suspicious activity data. If the intrusion condition is satisfied, then the gateway responds based at least in part on user data other than the network address data.
摘要:
Techniques and systems for server farm load balancing and resource allocation are disclosed. In one embodiment, a method of load balancing can include: arranging servers into service groups; receiving an access request with information related to a differentiation between the service groups; selecting one of the service groups based on a mapping comparison to the information; and selecting one of the servers within the selected service group based on a hardware utilization comparison. The servers can include GPRS (General Packet Radio Service) Gateway Support Node (GGSN) or Remote Authentication Dial In User Service (RADIUS) servers, for example. The information can include an Access Point Name (APN) or Calling Station ID, for example.
摘要:
In one embodiment, a method for providing an ACK packet while queuing data is provided. One or more packets in a series of packets may be received from a client at a gateway. The gateway determines that a packet in the series of packets has not been received. The one or more packets are then queued. The queued packets may have included an ACK for one or more previously sent packets. Thus, if the gateway had forwarded the one or more packets that are queued, then the ACK would have been received by the server. However, the one or more packets are queued and thus the ACK included in the packets is not sent with the queued packets. Even though the plurality of packets are queued, an acknowledgement packet is generated and then sent for the previously sent packets. The acknowledgement packet acknowledges to the server that the one or more previously sent packets were received by the client. The server may then continue transmitting packets to the client and knows it does not need to retransmit the one or more previously sent packets.
摘要:
In one embodiment, a method includes receiving, at a local node of a network, a sequenced data packet of a flow made up of multiple sequenced data packets from a source node directed toward a destination node. The flow is to be parsed by the local node to describe the flow for administration of the network. Based on sequence data in the sequenced data packet, it is determined whether the sequenced data packet is out of order in the flow. If it is determined that the sequenced data packet is out of order, then the sequenced data packet is forwarded toward the destination node before parsing the sequenced data packet. The out of order sequenced data packet is also stored for subsequent parsing at the local node.
摘要:
Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access server and a content server. The user data includes subscriber identifier data that indicates a unique identifier for a particular user, network address data that indicates a network address for a host used by the particular user, NAS data that indicates an identifier for the network access server, flow list data that indicates one or more open data packet flows, and suspicious activity data. The suspicious activity data indicates a value for a property of the open data packet flows that indicates suspicious activity. It is determined whether an intrusion condition is satisfied based on the suspicious activity data. If the intrusion condition is satisfied, then the gateway responds based at least in part on user data other than the network address data.
摘要:
Methods and apparatuses for processing microfeature workpieces are disclosed herein. In one embodiment, a workpiece support carries a workpiece in a processing volume of a processing chamber. A first fluid delivery device directs an unsupported stream of a first fluid into the processing volume. A second fluid delivery device directs an unsupported stream of a second fluid into the processing volume. A first fluid collector receives at least a portion of the first fluid, and a second fluid collector receives at least a portion of the second fluid. Accordingly, embodiments of the apparatus support the use of multiple fluids in a single processing volume to control, restrict, and/or eliminate mixing between the two fluids while reducing and/or eliminating the need for purging and/or rinsing portions of the apparatus. The rotation rate and/or position of the workpiece can also be controlled to control the manner in which the fluids are collected.
摘要:
A network is disclosed that includes a first tier of forwarding agents connected to a first tier of network devices. A second tier of forwarding agents is connected to a second tier of network devices. A service manager is configured to receive a packet from one of the forwarding agents; determine the tier of the forwarding agent; and send an instruction to the forwarding agent directing the forwarding agent to forward the packet to a network device connected to the tier of forwarding agents that includes the forwarding agent.