摘要:
Systems and methods are disclosed for controlling medium access. In one embodiment, the method includes receiving a first message including a first integer and a first sequence number; sending a second message including a second integer and the first sequence number; determining a first encryption key based on the first sequence number; and receiving a third message including a second sequence number and data, the second sequence number identifying a second encryption key capable of decoding the third message.
摘要:
A hybrid communications link includes a slow, reliable communications link and a fast unreliable communications link. Communication via the hybrid communications link selectively uses both the slow, reliable communications link and the fast, unreliable communications link.
摘要:
A wireless network (100) includes a communications node (120) configured to periodically generate and transmit at least one reception definition. Each reception definition indicates a time and manner in which the node will operate to receive information messages.
摘要:
An uncompressed packet header can be compressed in size to form a smaller, compressed packet header, such that the compressed header can include values that can be used to reproduce the uncompressed header. A compressed header can include at least two such values. A first value of the at least two values can be computed based on a second uncompressed header and can be used to derive the uncompressed header. Similarly, a second value of the at least two values can be computed based on a third uncompressed header and can be used to derive the same uncompressed header. Accordingly, the uncompressed header can be derived based on the first value and the second uncompressed header, or based on the second value and the third uncompressed header. The uncompressed header, second uncompressed header, and third uncompressed header can be associated with different packets.
摘要:
Systems and a methods are provided for reserving a rate at which cryptographic material is provided. A reservation request [700] for reserving the rate is sent from a secret bits consuming application [410] to a secret bit producing application [405]. The secret bits producing application [405] determines whether the reservation request can be satisfied. When the secret bits producing application determines that the reservation can be satisfied, the rate is reserved for the secret bits consuming application [410].
摘要:
The present invention performs “flow control” based on the remaining encryption capacity of an encrypted outbound network interface link of a network routing device, such as a router or switch. As the encrypted link begins to run low on encryption key material, this invention begins to discard datagrams queued for transit across that link, in order to signal distant host computers that they should slow down the rate at which they are sending datagrams. The invention, which is particularly useful in cryptographically protected networks that run the TCP/IP protocol stack, allows fine-grained flow control of individual traffic classes because it can determine, for example, how various classes of data traffic (e.g., voice, video, TCP) should be ordered and transmitted through a network. Thus, the invention can be used to implement sophisticated flow control rules so as to give preferential treatment to certain people, departments or computers.
摘要:
A quantum cryptography system [100] may include a transmitter [110] configured to generate entangled first and second photons, modulate and detect the first photon, and transmit detection information and the second photon. The system [100] may also include a receiver [160] configured to modulate the second photon. The receiver [160] may also be configured to detect the second photon based on the detection information.
摘要:
A system establishes a path for distributing data through an optical network (115). The system includes an optical switch (205a) and a data distribution endpoint (105a). The optical switch (205a) establishes a first encryption key distribution path through the optical network (115), the first encryption key distribution path including multiple optical switches and optical links. The data distribution endpoint (105a) determines whether eavesdropping has occurred on the first encryption key distribution path using quantum cryptography. The optical switch (205a) further establishes a second data distribution path through the optical network (115) responsive to the eavesdropping determination. The second encryption key distribution path includes multiple optical switches and optical links.
摘要:
A system for conserving energy in a multi-node network (110) includes nodes (205) configured to organize themselves into tiers (305, 310, 315). The nodes (205) are further configured to produce a transmit/receive schedule at a first tier (310) in the network (110) and control the powering-on and powering-off of transmitters and receivers in nodes (205) in a tier adjacent (315) to the first tier (310) according to the transmit/receive schedule.
摘要:
The present invention helps increase the reliability, throughput, and ease-of-configuration for data networks. The invention sets “time-to-live” (“TTL”) values for packets which may be routed through a network within a router based on a selected route, rather than by a host computer or using a fixed pre-configured value. Upon receiving an incoming data packet from a host computer, a TTL value is set which tailored to network conditions and the route selected. The data packet is then routed within the network using the tailored TTL and is discarded more quickly than if a large default value were used.