摘要:
The system and method of the present invention provide a mechanism, for the purpose of efficiently interconnecting local area networks (LANs) across a frame relay network, by which LAN stations provide data flow control when the frame relay network becomes congested. The system of the invention comprises a Station Manager at the network end point internetworking unit (IWU) for managing the IWU, a LAN Manager for managing one or more LANs connected to the end point IWU, and Station Managers at each of the LAN stations managing the respective LAN station. In operation, the IWU receives from the frame relay network a congestion notification and the IWU Station Manager broadcasts this notification to its managed LAN station Station Managers. The LAN station Station Managers each examine the notification against its outstanding data to be transmitted and slows down data traffic that is destined for the congested portion of the frame relay network.
摘要:
The system and method of the present invention provide a seamless approach for providing ATM connectivity for a Frame Relay DTE using an intelligent Terminal Adapter (TA). Using the system and method of the present invention, an enhanced Frame Relay protocol runs between the DTE and the ATM TA, the Frame Relay DTE is provided with not only the connectivity to the ATM network but also the full advantages of ATM transport mechanism. For instance, the FR DTE can choose to transmit its data using ATM Adaptation Layer (AAL) 1,3/4 or 5. Using the system and method of the present invention, a FR DTE may communicate with another FR DTE or to an ATM DTE through wide area or local area ATM network. The Frame Relay DTE can send data, image, voice, or video traffics across the ATM network via the FR/ATM terminal adapter.
摘要:
A method and apparatus for protecting the integrity of data in a multi-loop communication network is disclosed. A source station generates and forwards a frame with a unique format and a frame check sequence (FCS). At each bridge, an algorithm is provided to process the frame. If the frame is at a source bridge and not discarded, the FCS is preserved by encapsulating it in the Information field. The source bridge generates a new FCS, appends it to the frame and forwards the frame. Thereafter, each intermediate bridge generates its own FCS, appends it to the frame and forwards the frame. At the target bridge, no FCS is generated. The preserved FCS is forwarded as the FCS of the frame.
摘要:
The present invention is directed to a time-based licensing scheme for software deployment. According to an aspect of the present invention, lime-based software can be disseminated through various channels, for example, a network, CD's, floppy disks, etc., but before the time-based software can be launched, a user needs to supply account information as well as an amount of time requested for using the time-based software.In another aspect, the time-based software communicates with an authentication server preferably over a network to ascertain if the user is authorized and if the amount of time requested is approved. If the user is approved, the time-based software will be activated for the amount of time requested. If there is no time credit left in the user account, the user will not be approved and a rejection message will be sent to the user. Advantageously, the present invention allows for no restriction on where, when, or how many copies of the time-based software are used, as long as the user maintains sufficient time credit in the authentication server.
摘要:
To efficiently diagnose local and remote adapters without using dedicated hardware in a communication network to which a plurality of terminals are connected through associated adapters, a local logical address which is different from logical addresses reserved for communication between the terminals, is assigned to communication with a local adapter, and a frame including the local logical address and a diagnostic command is transmitted to the local adapter. When a remote adapter is to be diagnosed, a frame including a logical address assigned to communication with a remote terminal associated with that remote adapter, a diagnostic command, and at least one invalid character, is sent out from the local adapter to the network.
摘要:
A network has a plurality of devices connected together in pairs. When a physical connection between a pair of devices is initiated, the devices exchange information regarding a unique device identifier, and details of the physical connection. This information is provided in a report to a network manager. When a failure occurs on the network, the connection information is used to locate the failure.
摘要:
The described embodiment provides storage control (PSCF) for overlapping the handling of processor store requests between their generation by an instruction execution means (IPPF) and their presentation to system main storage (MS).The embodiment uses a store counter, an inpointer counter, an outpointer counter, a translator pointer register, an output counter and a plurality of registers sets to process and control the sequencing of all store requests so that the PSCF can output them to MS in the order received from the IPPF. The embodiment uses the counters to coordinate the varying delays in PSCF processing of plural store request contained in different register sets and the translator.The store counter obtains independence between plural IPPF operand address (OA) registers which send the store requests and plural PSCF register sets which handle the store request. The number of OA registers is made independent of the number of register sets. The store counter is also used for serializing instruction control.
摘要:
Disclosed in this specification is a method and program storage device for comparing two sets of private data without revealing those private data. If the comparison deems the two data sets sufficiently similar, helper data may be provided to permit reconstruction of one of the private data sets without transmission of that private data set.
摘要:
A method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment. The method allows peers using their own personal agents to obtain reputation information of each other through a pair of trustworthy mediator proxies. A mediator proxy is considered trustworthy if even when it is compromised it can guarantee three conditions: (1) the anonymity of the identity of the responders and the target being inquired; (2) the privacy of the content in an inquiry and a response; and (3) the boundary limit of the reputation summary with no possibility of combining the response of multiple inquiries to reverse engineer the reputation rating of an individual responder.
摘要:
A method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment. The method allows peers using their own personal agents to obtain reputation information of each other through a pair of trustworthy mediator proxies. A mediator proxy is considered trustworthy if even when it is compromised it can guarantee three conditions: (1) the anonymity of the identity of the responders and the target being inquired; (2) the privacy of the content in an inquiry and a response; and (3) the boundary limit of the reputation summary with no possibility of combining the response of multiple inquiries to reverse engineer the reputation rating of an individual responder.