摘要:
When testing network management applications, it is desirable to show that they will work with large or very large networks, to determine the upper bounds of the applications capabilities, and improvements which might increase the upper bounds. A method of testing a network application is disclosed mapping a layer-3 addresses of a real subnetwork onto a plurality of mapped layer-3 subnetwork addresses for conversations with applications or devices. Packets are modified to change a destination layer-3 address in a mapped subnetwork, pointing to corresponding real IP address and forwarding the packets. The conversation to which a response from a reallayer-3 address relates is identified. The source layer-3 address and packet contents are changed into the appropriate mapped subnetwork and the packet is forwarded to the application or device. An existing test network of any size may be used as the basis for testing the network management application.
摘要:
A method for wirelessly connecting a computer network to a destination device located at an unknown location in response to a request from a requesting device. The method of the present invention creates a more versatile wireless computer network by enabling devices within the computer network to efficiently wirelessly connect to mobile devices that are not connected to the computer network but are in range of at least one wireless access point. Therefore, the network can efficiently dynamically adjust to the movement of particular wireless devices throughout the network. Likewise, the method effectively increases the capabilities of the network by enabling devices within the network to efficiently connect with devices that are not actively communicating with the network. The method includes a series of searching routines which are performed at each access point to locate the destination device.
摘要:
Methods are provided for identifying user-directory records that match input strings entered into a packet-based telephone. Each input string comprises symbols associated with character sets, and each record comprises multiple attributes. A record matches a set of input strings when, independent of the order of the input strings, there is a one-to-one correspondence matching the input strings with an equal number of attributes of the record. An input string matches an attribute when, on a character-by-character, symbol-by-symbol basis, the characters of at least a portion of the attribute are elements of the character sets associated with the symbols of the input string. Subsets of matching records are dynamically sent to the packet-based telephone for display.
摘要:
A method is shown for deterministically selecting an endpoint for multiple links through a network for a client device. When a first network device establishes a connection for a client device to an endpoint device, it causes a database entry to be created that is keyed by a client identifier value for the client device and includes an endpoint address field with the network address of the endpoint device. When a second network device receives a call request from the client device, it queries the database using the client identifier value for the client device and waits a predetermined period for a database reply. A database device storing the database entry receives the query from the second network device, searches for the database entry matching the client identifier value, and sends a database reply that includes the client identifier value and the network address of the endpoint device from the database entry. The second network device receives the database reply and uses the network address from the database reply to establish a second connection to the endpoint device for the client.
摘要:
A network management apparatus and method processes network management data received during the monitoring of a network and generates events for presentation in an event list to a user when certain event conditions are detected. Network management data received in relation to an event condition is processed to determine whether it represents a recurring event condition. A recurring event condition is determined if a predetermined number of equivalent events have been generated, and appear in the event list, in an immediately preceding time period. In the described embodiment, if a recurring event condition occurs, a recurring event is generated, and subsequent occurrences of the event condition are not included in the event list presented to the user.
摘要:
A deterministic finite state machine is operated to detect any one of a plurality of digital signatures each corresponding to a succession of characters and each defined by a sequence of states in the state machine. The machine is organized such that for each state after the first in any sequence there are not more than two allowed exit transitions of which one is to a default state. Input characters are examined to determine a transition from a current state of the machine to a next state. When the machine responds to an input character to perform a transition to the default state, the input character is re-examined to determine the next state of the state machine. The reduction in transitions saves considerable space in memory.
摘要:
Secure communications on a network. An unauthenticated client on an network sends start packets to locate other clients. The unauthenticated client receives responses to the start packets from other clients on the network. The responses may be advertise packets that are from advertising clients that may be authenticated clients or other unauthenticated clients in authenticated mode. The unauthenticated client prioritizes the received packets so that authentication can be performed with the most desirable advertising client. Authentication packets are sent and received between the unauthenticated client and the advertising client in an attempt to authenticate.
摘要:
Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information.
摘要:
The present invention is directed to an electron beam crossbar switch for interconnection between communication units. The crossbar switch includes an array of electrically charged particle emitter source devices with an input connected to a slow wave structure coupled to the emitter source. An array of detectors is positioned relative to the array of emitter devices for receiving charged particles from various of the emitter devices. X and y deflection means are positioned adjacent each of the emitters for directing the charged particles from each of the emitters to at least one of the detectors to provide more signal output and a reduction in deflection accuracy.
摘要:
A system includes application software that issues voice function requests to one or more web services server. A web services server receives the requests from the application software. In response to the voice function request, the web services server selects at least one to perform one or more actions to provide the voice function request and issues implementation specific messages to the selected device or devices to perform the actions.