Abstract:
A method and system utilizing a mufti-level expedited forwarding per hop behavior (MLEF PHB) which manages buffer space to provide priority to calls based on a predefined priority scheme. The MLEF PHB defines a set of configurable parameters that define how much buffer space is available to each class or level of voice call. The MLEF PHB may optionally be implemented as programming statements in the SIP User Agent, SIP Proxy, and kernel of a LINUX-based PC muter. The MLEF PHB applies an algorithm for dropping packets exceeding a caller precedence level-specific buffer capacity, which variable buffer capacity is determined by the particular DSCP (and the particular MLEF PHB to which it relates).
Abstract:
An ATM switch having a plurality of input-ports and a plurality of output ports allowing a plurality of priority levels, which is highly modular allowing expansion of the number of cell buffers in a shared buffer pool (4), thus efficiently handling bursty traffic of one-to-one and one-to-many destination ports, using the bit slicing concept to reduce the operating speed of the switch, and decrease the cell buffer size requirement per slice along with reducing the number of shared queue memories per slice, aiding cost effective and efficient, very large scale integration (VLSI) implementation. It also allows configurability of input link speeds, taking care of the order of cell delivery to the output ports. The switch on receiving the input cell, searches for a free buffer in the shared pool, then routes the cell into this buffer and indexes the pointer into an output queue called the queue management module (5) which uses a shared pool of queue memories. The buffers are then read out in the order of priority and sequence of arrival at the input, by this queue management module. It provides initialization, control, and status monitoring features too, through a processor interface module (7).
Abstract:
A serial ATA interface (300) calibrates serially connected components of a computer system (320) linked by the interface to a negociated data transmission speed. The interface negociates the fastest data transmission speed supported by the serially connected components. Link parameters associated with the negociated data transmission speed are cablirated and implemented in a Physical layer of the interface data before data is transmitted accross the interface. The cablirated link parameters include signal settings for amplitude, pre-emphasis, equalization and timing. Default settings of the link parameters correspond to the slowest data transmissio speed supported by the serially connected components. The serially connected components are calibrated each time system power is initialized, the serially connected components can be a host computer (310) linked to a data storage device such as a backplane-base storage subsystem (320).
Abstract:
A system for scheduling multirate unicast packets through an interconnection network having a plurality of input ports and a plurality of output ports, the packets each having a designated output port and rate weight. The system comprises a plurality of input queues at each input port, wherein input queues have multirate unicast packets; a method for each input port to request service from designated output ports for at most as many multirate packets equal to the number of input queues at each input port; a method for each output port to grant a plurality of requests; a method for each input port to accept at most as many grants equal to the number of input queues; and a method for scheduling at most as many multirate packets equal to the number of input queues from each input port having accepted grants and to each output port associated with accepted grants.
Abstract:
A method is disclosed to operate a wireless network (20) with a MS (100) and includes, registering the MS with a correspondent node CN (99); sending data from the CN to a Content Proxy Server (95) identified by the MS; and determining a current location of the MS with the Content Proxy Server, setting up a Point to Point Protocol PPP between the MS at its current location and the wireless network, and routing the data from the Content Proxy Server to the MS at its current location. Registering includes sending a Network Access Identifier NAI of the MS and an Internet Protocol IP address of the Content Proxy Server to the CN from the MS, where the data sent from the CN to the Content Proxy Server includes the NAI, and where the Content Proxy Server determines the current location of the MS by sending a query to a home Authentication, Authorization and Accounting AAA server (80), the query comprising the NAI.
Abstract:
A sync-seeking system comprises a central server and a portable server that include control programs to maintain the equivalency of their stored data and to accumulate additional data from outside sources. The portable server establishes a wireless connection with at least one wireless network, e.g., a wireless wide area network (WWAN) or a wireless local area network (WLAN), and the central server and portable server establish a logical connection via the at least one wireless network. In order to maintain logical equivalency, the central server and portable server intermittently engage in peer-to-peer communication via the logical connection to exchange the additional data they have accumulated. The portable server can be interconnected, via wireless links, to display devices, such as laptop computers, PDAs, set-top boxes, and cell phones.
Abstract:
The invention is directed to implementing a trust rating subscription model for email addresses and/or domains in a trust-oriented email network that is supported by a deployment of a trusted email database (TED) system. The TED maintains the trust rating for individual email addresses relative to the recipients. Also, the subscription model enables the email end users and inbox service providers to register with the TED to obtain the trust rating of a specific email sender relative to the recipient. This trust rating may then be used by the email end user or an inbox service provider to filter spam, if the sender is untrusted, or deliver the message to an inbox, if the sender is trusted. A sender (individual email address, domain, and the like) can also subscribe and obtain limited rights to email subscribers of the TED system.
Abstract:
Disclosed is a method for configuring an uplink frame in an OFDMA based wireless communication system. The total band of the uplink frame is divided into a predetermined number of subcarrier groups. Subcarriers within the respective allocated subcarrier groups are allocated to the subchannel defined for a predetermined number of consecutive symbols defined by slots in the uplink frame. Pilot subcarriers are allocated by the unit of the predetermined number of symbols so as to allow channel estimation from among the allocated subcarriers. Accordingly, data subcarriers are allocated by minimizing collision with specific users of adjacent cells so as to enable channel estimation using preambles in a cellular system, and some positions of the data subcarriers are allocated for pilots, thereby allowing synchronous demodulation and improving frequency reuse rates.
Abstract:
The present disclosure relates to a system, apparatus, and method for providing services usable by a mobile terminal. In one embodiment, a method involves initiating a device startup sequence (828) of a mobile computing arrangement (204). A capability descriptor (202) of the mobile computing arrangement is communicated to a service provider entity (206) as part of the startup sequence (828). A data service targeted for the mobile device (204) based on the capability descriptor (202) is communicated to the service provider (206), and the data service is then initiated with the mobile computing arrangement (204).
Abstract:
A communication network manages key material. A method generates and provides session keys from a security node to an access node for further propagation during handoff procedures, without requiring the security node to take part in the handoff procedures.