摘要:
A method is provided in one example and includes receiving a request to initiate a communication flow associated with a subscriber and identifying one or more parameters to be monitored for the communication flow. The method further includes extracting one or more bits from packets associated with the communication flow; the bits are used to determine an operating system associated with the communication flow. A policy decision can be executed for the communication flow based on the operating system associated with the communication flow. In more specific examples, the bits are sent to a next destination in response to a threshold being reached for at least one of the parameters. The parameters can be associated a volume parameter or a time parameter. The policy decision could include blocking traffic associated with the subscriber, initiating billing, redirecting the communication, managing a quality of service level for the communication flow, etc.
摘要:
A method is provided in one example and includes receiving a request to initiate a communication flow associated with a subscriber and identifying one or more parameters to be monitored for the communication flow. The method further includes extracting one or more bits from packets associated with the communication flow; the bits are used to determine an operating system associated with the communication flow. A policy decision can be executed for the communication flow based on the operating system associated with the communication flow. In more specific examples, the bits are sent to a next destination in response to a threshold being reached for at least one of the parameters. The parameters can be associated a volume parameter or a time parameter. The policy decision could include blocking traffic associated with the subscriber, initiating billing, redirecting the communication, managing a quality of service level for the communication flow, etc.
摘要:
Apparatus and method for thermally controlled processing of microelectronic workpieces with liquids. An apparatus in accordance with and embodiment of the invention includes a process vessel configured to carry a processing liquid, such as an electroless processing liquid. The vessel has a thermally transmissive wall for transferring heat to and/or from the processing liquid within. A heat transfer device, such as a reservoir that receives processing liquid spilling over from the process vessel, transfers heat to or from the processing liquid within the process vessel. The heat transfer device can also transfer heat to or from an internal or external heat source, such as a conduit carrying a heat transfer fluid, or an electrical resistance heater. The interaction between the microelectronic workpiece and the processing liquid can be further controlled by controlling the rate at which the microelectronic workpiece rotates and/or the manner in which the microelectronic workpiece is introduced to and/or withdrawn from the processing liquid.
摘要:
Processes and systems for electrolytically processing a microfeature workpiece with a first processing fluid and an anode are described. Microfeature workpieces are electrolytically processed using a first processing fluid, an anode, a second processing fluid, and an anion permeable barrier layer. The anion permeable barrier layer separates the first processing fluid from the second processing fluid while allowing certain anionic species to transfer between the two fluids. The described processes produce deposits over repeated plating cycles that exhibit resistivity values within desired ranges.
摘要:
Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access server and a content server. The user data includes subscriber identifier data that indicates a unique identifier for a particular user, network address data that indicates a network address for a host used by the particular user, NAS data that indicates an identifier for the network access server, flow list data that indicates one or more open data packet flows, and suspicious activity data. The suspicious activity data indicates a value for a property of the open data packet flows that indicates suspicious activity. It is determined whether an intrusion condition is satisfied based on the suspicious activity data. If the intrusion condition is satisfied, then the gateway responds based at least in part on user data other than the network address data.
摘要:
Techniques and systems for server farm load balancing and resource allocation are disclosed. In one embodiment, a method of load balancing can include: arranging servers into service groups; receiving an access request with information related to a differentiation between the service groups; selecting one of the service groups based on a mapping comparison to the information; and selecting one of the servers within the selected service group based on a hardware utilization comparison. The servers can include GPRS (General Packet Radio Service) Gateway Support Node (GGSN) or Remote Authentication Dial In User Service (RADIUS) servers, for example. The information can include an Access Point Name (APN) or Calling Station ID, for example.
摘要:
In one embodiment, a method for providing an ACK packet while queuing data is provided. One or more packets in a series of packets may be received from a client at a gateway. The gateway determines that a packet in the series of packets has not been received. The one or more packets are then queued. The queued packets may have included an ACK for one or more previously sent packets. Thus, if the gateway had forwarded the one or more packets that are queued, then the ACK would have been received by the server. However, the one or more packets are queued and thus the ACK included in the packets is not sent with the queued packets. Even though the plurality of packets are queued, an acknowledgement packet is generated and then sent for the previously sent packets. The acknowledgement packet acknowledges to the server that the one or more previously sent packets were received by the client. The server may then continue transmitting packets to the client and knows it does not need to retransmit the one or more previously sent packets.
摘要:
In one embodiment, a method includes receiving, at a local node of a network, a sequenced data packet of a flow made up of multiple sequenced data packets from a source node directed toward a destination node. The flow is to be parsed by the local node to describe the flow for administration of the network. Based on sequence data in the sequenced data packet, it is determined whether the sequenced data packet is out of order in the flow. If it is determined that the sequenced data packet is out of order, then the sequenced data packet is forwarded toward the destination node before parsing the sequenced data packet. The out of order sequenced data packet is also stored for subsequent parsing at the local node.
摘要:
Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access server and a content server. The user data includes subscriber identifier data that indicates a unique identifier for a particular user, network address data that indicates a network address for a host used by the particular user, NAS data that indicates an identifier for the network access server, flow list data that indicates one or more open data packet flows, and suspicious activity data. The suspicious activity data indicates a value for a property of the open data packet flows that indicates suspicious activity. It is determined whether an intrusion condition is satisfied based on the suspicious activity data. If the intrusion condition is satisfied, then the gateway responds based at least in part on user data other than the network address data.
摘要:
A method for communicating in a wireless application protocol (WAP) network environment is provided that includes receiving a request packet at a WAP gateway and positioning an identifier into the request packet. A content switch then identifies the identifier and correlates the identifier to a source that generated the request packet. An internet protocol (IP) address associated with the source is positioned in the request packet before communicating the request packet to a next destination.