摘要:
A method of determining an amount of bandwidth needed on a communication link is disclosed. According to one aspect of the method, instead of considering only user behavior or only traffic characteristics, the amount of bandwidth needed on the link is determined based on both user behavior and traffic characteristics. The determined amount is stored in memory. By accounting for both user behavior and traffic characteristics, the method determines the amount of bandwidth needed on a communication link more accurately.
摘要:
The present invention provides a servo-actuator capable of operating in both the Fail Safe and Fail Operate modes. In the Fail Safe mode, a pretensioned spring member moves a jet pipe in the servo-valve to cause said actuator rod to move in a first direction upon loss of electric power. A mechanical feedback means coupled to said spring member and said actuator rod opposes the force applied by the spring so that when a force equilibrium is reached the actuator rod will be at a predetermined position.
摘要:
A therapeutic ischemic and reperfusion device with an associated monitoring system for generally enhancing the vascular and metabolic environment and wellbeing of a subject. A method for the treatment and prophylaxis of various medical conditions including environmental induced oxidative stress using the therapeutic ischemic and reperfusion device and associated monitoring system is also contemplated herein. The method uses an inflatable cuff around the limb or torso of a subject operated by a controller configured to inflate and deflate the cuff. The monitoring system is used to monitor the physical and metabolic environments of the subject during and subsequent to the ischemia and reperfusion.
摘要:
A user interface for software applications enables the full use of graphical user interface (GUI) software, particularly engineering design software, by visually impaired individuals. The interface combines tactile representations of graphical elements, non-visual cues, and a hardware element to allow the effective placement and interconnection of graphic elements using design software.
摘要:
An isolation approach for network users associated with elevated risk is disclosed for protecting networks. In one approach a method comprises the computer-implemented steps of determining a user identifier associated with a network device that has caused a security event in a network; causing the network device to receive a network address that is selected from a subset of addresses within a specified pool associated with suspected malicious network users; and configuring one or more security restrictions with respect to the selected network address.
摘要:
A method is disclosed for preventing spoofing of network addresses. A binding is established between an Internet Protocol (IP) address, a Media Access Control (MAC) address, and a port. An Address Resolution Protocol (ARP) table is updated based on the binding.
摘要:
A method and a system for re-establishing the connection of a network device with a network, using viral communication, are provided. According to the various embodiments, a disconnected network device acts as a simple wireless device and contacts a neighboring network device to obtain configuration information. The request can be forwarded to a network management station (NMS) through one or more neighbors of the disconnected network device. Connectivity is obtained by executing the configuration instructions obtained from the NMS.
摘要:
A system, method and application for facilitating network support for an install-base network is provided. The method includes performing, at an access node of the install-base network, network discovery to discover one or more nodes of the install-base network. The method also includes collecting, at the nodes, their respective inventories (“network-node inventories”). The method further includes collecting the network-node inventories at the access node, and sending the network-node inventories from the access node to a back-office system external to the install-base network. The method may, optionally, include the access node aggregating the network-node inventories to form aggregate information, and sending the aggregate information to the back-office system in addition to or in lieu of the of network-node inventories.