摘要:
Systems and methods for communicating packets having a plurality of formats are described herein. In some aspects, a signal (SIG) field in the preamble of a packet may indicate whether an extension field, such as an extension SIG field or SIG-B field, is included in the packet. In another aspect, one or more detectors may be used to auto-detect packets formatted as one of at least two different formats based on a short training field (STF) of a received packet. In some aspects, along training field (LTF) in the preamble of a packet may indicate whether the payload is repetition coded.
摘要:
A method and Bridge in a Provider Backbone Bridge Network, PBBN, for enabling frames from a Higher Layer Entity attached alternatively to a Provider Instance Port on an I-Component of a Backbone Edge Bridge or to a Customer Backbone Port on a B-Component of the Backbone Edge Bridge, to reach an intended entity in the PBBN. A Virtual Instance Port Service Access Point, VIP SAP, is configured for every VIP and every Higher Layer Entity configured on the I-Component. An Enhanced VIP Port Connectivity function utilizes the VIP SAP to tunnel customer-initiated Layer 2 Control Protocols, L2CPs. A Special Multiplexed SAP handles the frames of the Higher Layer Entity, and is assigned an I-SID value that is universally recognized to identify the L2CPs. A Service Instance Multiplex Entity utilizes the Special Multiplexed SAP to transfer frames between the Provider Instance Port or the Customer Backbone Port and the entity inside the PBBN.
摘要:
Systems and methods for communicating packets having a plurality of formats are described herein. In some aspects, a signal (SIG) field in the preamble of a packet may indicate whether an extension field, such as an extension SIG field or SIG-B field, is included in the packet. In another aspect, one or more detectors may be used to auto-detect packets formatted as one of at least two different formats based on a short training field (STF) of a received packet. In some aspects, along training field (LTF) in the preamble of a packet may indicate whether the payload is repetition coded.
摘要:
A wireless power system includes a wireless power transmit and receive units. The wireless power transmit unit includes a wireless power transmit circuit that generates a wireless power magnetic field and a transmit unit transceiver that transceives a communication regarding the wireless power magnetic field in accordance with a control channel protocol. The wireless power receive unit includes a wireless power receive circuit, a transceiver, and a processing module. The wireless power receive circuit converts the wireless power magnetic field into a voltage. The receive unit processing module is operable to: identify the control channel protocol; determine whether the receive unit transceiver is capable of communication using the control channel protocol; and, when the receive unit transceiver is capable of communication using the control channel protocol, coordinate configuration of the receive unit transceiver to transceive the communication regarding the wireless power magnetic field via the control channel.
摘要:
Systems, methods, and software for operating communication systems and wireless communication devices are provided herein. In one example, a method is provided that includes transferring an access request for delivery to a remote data system, receiving a security challenge transferred by the remote data system, and in response, transferring a security answer for delivery to the remote data system that includes at least one hash result generated in the security portion using at least one of the security keys. The method also includes receiving a security grant transferred by the remote data system indicating one of the hash results, selecting at least one of the transceivers based on an association of the transceivers with one of the security keys used to generate the hash result indicated in the security grant, and transferring the data for delivery to the remote data system over a wireless network associated with the selected transceiver.
摘要:
Systems and methods for communicating packets having a plurality of formats are described herein. In some aspects, a signal (SIG) field in the preamble of a packet may indicate whether an extension field, such as an extension SIG field or SIG-B field, is included in the packet. In another aspect, one or more detectors may be used to auto-detect packets formatted as one of at least two different formats based on a short training field (STF) of a received packet. In some aspects, along training field (LTF) in the preamble of a packet may indicate whether the payload is repetition coded.
摘要:
A method to interact with a remote USB device is disclosed. An identifying message is received from a remote client associated with the remote USB device. The remote USB device is identified based at least in part on the identifying message from the remote client. A security policy is determined for the remote USB device. A policy message is transmitted to the remote client for selectively implementing the security policy of the remote USB device. A method to interact with a local USB device is disclosed. An identifying message is determined by performing a host controller service for the local USB device. The identifying message is transmitted to a server. A policy message is received from the server for selectively implementing a security policy on the local USB device. The security policy is regarded and configuring the host controller service.
摘要:
Systems and methods for delivering social network updates from popular entities to receiver devices via broadcast or multicast networks obtain updates from highly popular entities. Updates may be assembled by a server crawling social network sites. To enable selective reception, the obtained updates may be broadcast/multicast according to a schedule that is communicated to receiver devices in advance, such as a catalog file. Receiver devices receive the catalog file and use the included information to selectively receive updates that are relevant to a user of the receiver device. Updates received from broadcasts or multicasts are cached in memory of the receiver device. When a user requests to access a particular social network entity on the receiver device, that request may be satisfied by accessing social network updates cached on the receiver device. Broadcasting and/or multicasting highly popular social network updates may relieve burdens on unicast networks.
摘要:
In certain embodiments, a system comprises a connection to a network and an application server providing a cross cluster extension mobility (CCEM) service configured to receive a request from a user to log into the CCEM service from a telephony device connected to the network, prompt the user via the telephony device to provide a user ID, determine whether the user is logging in from a home cluster or a remote cluster, and perform a local extension mobility login for the user.
摘要:
A traffic management device or other intermediate network device is configured to enable the device to support connection splitting and/or connection aggregation or to otherwise process network transactions for an arbitrary transaction-oriented protocol. The configuration may be accomplished by providing one or more traffic management rules defined by way of a scripting language and provided to an interpreter. The traffic management rule may follow a basic approach common to many protocols and is adapted to the particular protocol being supported. The rule may configure the network device to inspect incoming data, extract length and record type specifiers, buffer an appropriate amount of data to determine transactions or transaction boundaries, and perform other operations. Transaction processing may be enabled for various kinds of protocols, including application-level, proprietary, quasi-proprietary, and special-purpose protocols, protocols for which limited information is available, and protocols not natively supported by the network device.