摘要:
A network system and associated operating methods manage event storms. The network system comprises an event analysis and control engine that detects and manages events occurring on a network. The event analysis and control engine receives events from a plurality of agents, and analyzes the events according to policies specified in a policies templates database. The event analysis and control engine processes raw network packets directly with less than full packet parsing to generate a filtered stream of events based on the analysis. The event analysis and control engine propagates the filtered stream of events to a monitoring system.
摘要:
Systems, methods, and computer-readable executable instructions are provided for implementing an energy proportional network architecture. Implementing an energy proportional network architecture can include determining a number of desired network criteria and a desired number of access ports. A number of switches for the energy proportional network architecture can be calculated from the desired number of access ports and the number of desired network criteria. Implementing an energy proportional network architecture can also include using the number of calculated switches to form the energy proportional network.
摘要:
The present teachings provide for a method and system for facilitating content download to one or more remote devices via an insecure communication channel. The method comprises the steps of receiving at least one shared secret from a device via an insecure communications channel, each shared secret encoded and functioning as an identifier for the device, transmitting an encrypted file, from a file server, to the device associated with the encoded shared secret, receiving the shared secret in a plaintext forma via a secure communications channel, receiving a confirmation authorizing the release of a decryption key, and sending a decryption key corresponding to the transmitted file, for which the authorization for the release of the decryption key has been received. The decryption key is encrypted using the shared secret if transmission is via the insecure channel.
摘要:
A heterogeneous network switch system includes heterogeneous network switches having a first network switch having a first functionality and a second network switch having a second functionality, where the first functionality differs from the second functionality. In addition, the first network switch and the second network switch are configured to forward data to at least one common server. The system also includes a controller configured to receive data from at least one client and to select one of the first network switch and the second network switch to employ in forwarding the data from the at least one client to the at least one common network equipment.
摘要:
A method includes sending signals from two nodes to a landmark, identifying common milestones along the routes, and determining distance information from the nodes to at least one of the common milestones. A system includes a program configured to send signals from two nodes to a landmark, identify common milestones along the routes, and provide distance information from each node to at least one of the common milestones, and a program configured to receive the distance information and provide a latency estimate based on the distance information.
摘要:
A switch (100) connected to a network is configured to have one or more components that can be placed in a deep sleep mode. The switch (100) includes a management circuit (150) that is configured to wake up the components in deep sleep mode. The management circuit (150) includes a port (151) that receives packets and a wake-up circuit (152) that determines whether a packet received via the port (151) is a magic packet including a unique ID for the port (151) or the switch (100). If the packet is the magic packet including the unique ID for the port (151) or the switch (100), the wake-up circuit (151) is configured to send a wake-up signal to components in the switch (100) to wake up from the deep sleep mode.
摘要:
A node is identified from a set of nodes in a peer-to-peer network having the highest workloads in the peer-to-peer network. The workload of the node is split with another node using a splitting algorithm.
摘要:
The present disclosure allows for the downloading of large digital media files in a progressive manner by allowing for a transfer of such digital media to occur over various sessions. A file server is described that receives a request to transmit a file whereupon the file server locates such requested file in its memory. For verification purposes a unique identifier is computed for the requested file such as an MD5 checksum of the digital file. Thereafter an encryption key, K1, is chosen. Using a second key, K2, the first key and the unique identifier are encrypted, and the requested file is encrypted using the first key. Both these encrypted values are then transmitted. Subsequently, for example, after payment is received, an unencrypted form of the first key is also transmitted. The first key can then be used to decrypt the requested file to unlock full functionality of the requested file.
摘要:
A controller receives information from congestion detectors in a network, the information indicating that points in the network are congested due to data flows in the network. The controller controls data rates of the data flows based on the information.
摘要:
Service nodes in a service overlay network are selected to provide a service path for a requested service by determining a reduced search space of service nodes in the service overlay network that are operable to provide service components for the requested service. From the reduced search space of service nodes, service nodes are selected to form a service path that satisfies all quality of service constraints for the service.