Abstract:
This invention provides a method and a system to deposit a thin layer of very reactive elemental metals by plasma enhanced atomic layer deposition (PEALD). The very reactive metals, selected from the highly electropositive elements include alkaline earth metals, group III metals, and some transition and rare earth metals. The thin metal layers are formed by sequentially pulsing one of above mentioned metal containing organometallic precursors and a hydrogen plasma as a reducing agent into a reaction chamber containing a substrate surface with pulsed or continuous flow of an inert purge gas between each pulsing step. A robust high vacuum reactor chamber equipped with an anti-corrosion turbo pump and a high vacuum load lock are required for reducing contaminant gases such as O2, H2O, and CO2, and for increasing hydrogen plasma efficiency.
Abstract:
In accordance with embodiments disclosed herein, there are provided methods, systems, mechanisms, techniques, and apparatuses for traffic aggregation on multiple WAN backhauls and multiple distinct LAN networks; for traffic load balancing on multiple WAN backhauls and multiple distinct LAN networks; and for performing self-healing operations utilizing multiple WAN backhauls serving multiple distinct LAN networks. For example, in one embodiment, a first Local Area Network (LAN) access device is to establish a first LAN; a second LAN access device is to establish a second LAN; a first Wide Area Network (WAN) backhaul connection is to provide the first LAN access device with WAN connectivity; a second WAN backhaul connection is to provide the second LAN access device with WAN connectivity; and a traffic aggregation unit is to form a logically bonded WAN interface over the first WAN backhaul and the second WAN backhaul. In some embodiments an optional traffic de-aggregation unit may be used.
Abstract:
An embodiment of the present invention improves the fabrication and operational characteristics of a type-II superlattice material. Layers of indium arsenide and gallium antimonide comprise the bulk of the superlattice structure. One or more layers of indium antimonide are added to unit cells of the superlattice to provide a further degree of freedom in the design for adjusting the effective bandgap energy of the superlattice. One or more layers of gallium arsenide are added to unit cells of the superlattice to counterbalance the crystal lattice strain forces introduced by the aforementioned indium antimonide layers.
Abstract:
The application describes various techniques for improving the accuracy and numerical stability of computer-implemented simulations which employ subgridding techniques. In particular, techniques are described in which information is transferred across a common interface between two neighboring fine-grids. Furthermore, techniques are also described in which, during the update of a grid in regions where there exists an embedded fine-grid, the field values at co-located edges at which fine-grid solution points exist on the grid, are summed and used in an approximation of the gradient term required for the FD-TD updating stencils to perform an electromagnetic simulation.
Abstract:
Methods and devices for adaptively changing a parameter (such as sub-carrier bit allocation and/or gain) in a multi-carrier communication signal are described. In a method aspect, a unit that determines a need for a change sends an express change request to a second unit. The change request identifies one or more specific sub-carrier carrier to be altered and a desired value for the parameter to be changed for each identified sub-carrier. The requesting unit then monitors the communication signal it receives to determine whether the requested change has been implemented. The determination of whether the requested change has been implemented is based at least in part upon an analysis of a portion of the received communication signal that was intended to be changed. In another aspect of the invention, the change request command includes a header, a control field, at least one sub-carrier identifier, at least one desired parameter value indicator, and an error field. The header identifies the command as a change request command. The control field includes a tone count that indicates the number of tones to be altered. Each sub-carrier identifier identifies a specific sub-carrier to be altered and each desired parameter value indicator identifies a desired parameter value for its associated sub-carrier. The error field permits the unit receiving the change request to detect whether there is an error in its interpretation of the change request command.
Abstract:
A network switch having switch ports for communication of data packets with respective computer network nodes according to CSMA/CD protocol that resets a retry counter for counting data packet transmission attempts within any one of the respective switch ports if backpressure is asserted by that port. A retry limit value for the retry counter is modified to ensure that the total number of retrys does not exceed a maximum total number of allowable retrys. The resetting of the retry counter within a port after assertion of backpressure affords the port a greater probability of transmitting earlier under the CSMA/CD protocol, thus more quickly relieving congestion which may occur in the network switch. The modification of the retry limit value ensures that the number of retrys for the port does not exceed industry standards.
Abstract:
In accordance with embodiments disclosed herein, there are provided methods, systems, mechanisms, techniques, and apparatuses for traffic aggregation on multiple WAN backhauls and multiple distinct LAN networks; for traffic load balancing on multiple WAN backhauls and multiple distinct LAN networks; and for performing self-healing operations utilizing multiple WAN backhauls serving multiple distinct LAN networks. For example, in one embodiment, a first Local Area Network (LAN) access device is to establish a first LAN; a second LAN access device is to establish a second LAN; a first Wide Area Network (WAN) backhaul connection is to provide the first LAN access device with WAN connectivity; a second WAN backhaul connection is to provide the second LAN access device with WAN connectivity; and a traffic aggregation unit is to form a logically bonded WAN interface over the first WAN backhaul and the second WAN backhaul. In some embodiments an optional traffic de-aggregation unit may be used.
Abstract:
A method and system for protecting a packet switched network from compromised communications due to a physical intrusion in the network are disclosed. The network includes at least one network element having a detection device operable to detect a possible physical intrusion in a data communication path connected to the network element. The method includes receiving a notification from the detection device that the detection device has identified a physical intrusion in the data communication path, generating an alert, and transmitting the alert over the packet switched network. The alert may include instructions on how to remediate the physical intrusion that can be automatically implemented by a given network-connected device or manually addressed by a network user or network administrator.
Abstract:
A method for assessing wave propagation arising in a physical system by obtaining a numerical approximation of the physical system to be simulated, the method comprisingdefining a computational domain comprising a first grid having a plurality of first-grid cells and a first-grid time step, a second grid being a refinement of the first grid and having a plurality of second-grid cells and a second-grid time step, and an intermediate grid having a plurality of intermediate-grid cells of equal size to the first-grid cells and having the second-grid time step, wherein each cell has one or more solution points at which values representing a physical quantity of the physical system to be simulated may be obtained;performing a first update procedure to obtain values representing the physical quantity after a said first-grid time step, the values being obtained for at least one solution point of at least one first-grid cell;performing a coupling procedure using values from the first grid to obtain values at a perimeter of the second grid; andperforming a second update procedure, using the values at the perimeter of the second grid, to obtain values representing the physical quantity after a said second-grid time step, the values being obtained for at least one solution point of at least one second-grid cell;wherein the coupling procedure comprises performing temporal coupling by using values from the first grid to obtain values at a perimeter of the intermediate grid; performing an intermediate update procedure to obtain values representing the physical quantity after the said second-grid time step of the second update procedure, the values being obtained for at least one solution point of at least one intermediate-grid cell; and performing spatial coupling by using values from the intermediate grid to obtain the values at the perimeter of the second grid used in the second update procedure; wherein defining the computational domain comprises defining the perimeter of the intermediate grid to be wider than the perimeter of the second grid on at least one side of the second grid by a distance equal to at least two times the size of one of the first-grid cells in that dimension.
Abstract:
A method and system for protecting a packet switched network from compromised communications due to a physical intrusion in the network are disclosed. The network includes at least one network element having a detection device operable to detect a possible physical intrusion in a data communication path connected to the network element. The method includes receiving a notification from the detection device that the detection device has identified a physical intrusion in the data communication path, generating an alert, and transmitting the alert over the packet switched network. The alert may include instructions on how to remediate the physical intrusion that can be automatically implemented by a given network-connected device or manually addressed by a network user or network administrator.