Abstract:
A communication application server for supporting converged communications in a communication system. The communication application server is responsive to communication service requests from external endpoints, applications or other requesting entities, and in one embodiment comprises at least first and second components. The first component is operative: (i) to process a given one of the communication service requests to identify at least one corresponding communication service supported by the communication application server; (ii) to determine one or more executable communication tasks associated with the identified communication service; and (iii) to establish communication with one or more external servers to carry out execution of at least a subset of the one or more executable communication taks associated with the communication service. The second component is coupled between the first component and the one or more external servers, and provides, for each of the external servers, a corresponding interface for connecting the communication application server to the external server.
Abstract:
A system for discovering a topology of a distributed processing network that includes a first topology Management Information Base discovery agent 308 configured to contact a first set of routers to obtain a first type of information stored in each router in the first set of routers a second topology Open Shortest Path First discovery agent 312 and/or 316 configured to contact a second set of routers to obtain a second type of information stored in each router in the second set of routers, and a phase controller 304 configured to select between the first 308 and second 312 and/ or 316 topology discovery agents. The first and second sets of routers are different, and the first and second types of information are different. In one configuration, the first type of information is defined by a network management protocol, and the second type of information is defined by a routing protocol.
Abstract:
A communications system featuring a remote security server is provided. The system allows the validation of requests for access to a communications network to be performed in a centralized security server. The use of a security server allows security features to be implemented, without the need to distribute a security algorithm to individual client devices. In addition, changes to the security algorithm can easily be made, because such changes need only be made in the security server itself, and in the communications server to which access is desired. The present invention is particularly useful in connection with communication services provided as part of a private branch exchange.
Abstract:
A method, apparatus and computer program product for preventing occurrences of the hidden mode problem are presented. A transmission request (CC-RTS 62) is received from a source node, the CC-RTS (62) frame including a reservation duration value indicating the length of time needed for a transmission reservation. A timer is adjusted for the period other nodes must refrain from transmitting on the channel (NAV) equal to a duration of a transmission request/transmission response (CC-RTS 62/CC-CTS 68) handshake. When the CC-RTS (62) has been denied, then a second CC-RTS (69) is received having a reservation duration value of zero, and when the CC-RTS (62) is accepted then the NAV is extended to remainder of the reservation duration value of the original CC-RTS (62) frame. The CC-RTS (62, 69) and CC-CTS (68) are sent at a more robust PHY mode than traffic frames.
Abstract:
A classification mechanism (202) automatically aligns time-sensitive data streams to sequences (schedules), according to information in the packets or other information and classification criteria specified by a human network administrator, a sequence agent, an application program or otherwise. When a packet arrives at a first sequence-aware switch (212) along a path, the packet is aligned to a new or existing sequence (208 or 214). When a new sequence is established, appointments are reserved at sequence-aware switches along the path. The packet is placed in a queue (208 or 214), based on its classification. When the packet reaches the head of the queue, at that queue'' appointment time, the switch forwards the packet along the path. If possible, appointments have been reserved at subsequent switches (204 or 206) along the packet's path, so the packet can be forwarded through the subsequent switches without delay.
Abstract:
A wireless local area network (LAN), and a method of operating the same, prevents unauthorizedusers from accessing the wireless LAN. A signal strength of a station attempting to access the wirelessLAN is measured. If the signal strength is less than a predetermined threshold value, the systemconcludes that the station is outside of an authorized geographical area. Such a station attempting toestablish a connection is characterized as an unauthorized station, and access to the wireless LAN isdenied. The system may also periodically verify that authorized stations remain within the authorizedgeographical area. A station that has moved outside of the authorized geographical area can be notifiedor denied further access to the wireless LAN.
Abstract:
The present invention is directed to a presence and availability system including: (a) an input (e.g., an interface) operable to receive an agent report from a context sensing agent in a host entity associated with a person, the agent report comprising presence information and the person having an address in an associated name space; (b) a tracking agent (154) operable to tag at least some of the presence information with at least one classification tag; and (c) a policy agent (158) operable to determine presence information to be provided to a requestor based on the at least one classification tag.
Abstract:
A method and apparatus are disclosed for managing components of a secret key according to a secret sharing scheme. The disclosed secret sharing scheme divides a secret value, R , into n secret components ( R l , R 2 , ..., R n ) and one super component, S , in such a way that R can be computed from (i) any k or more R i components (k R i . The secret components ( R l, R 2 , ..., R n ) are distributed to a number of authorized users. A multiple threshold secret sharing scheme assigns various users in a group into one of a number of classes. Each user class has a corresponding threshold level that indicates the number of users that must come together with their assigned components to obtain access to the shared secret. The multiple threshold scheme divides the secret into n components each having an assigned threshold level (i.e., the number of such components that are required to obtain the secret). Any component having a lower threshold level can satisfy the role of a component having a higher threshold level. The multiple threshold scheme provides a hierarchical scheme that allows the secret, R , to be shared among different groups of people with different thresholds.
Abstract:
A system for determining a topology associated with a network such as an enterprise network (100). The system includes a data collection agent (204) configured to (a) identify a first set of routers (104c) from among a larger, second set of routers (104a-g) in an enterprise network (100), (b) contact each of the routers in the first set of routers (104c) but not each of the routers in the second set of routers (104a-g), and (c) load network information maintained by at least some of the contacted routers in the first set of routers (104c). The loaded network information can then be used to form a network or routing topology of the enterprise network (100).
Abstract:
A system for discovering a topology if a distributed processing network that includes a first topology discovery agent (308) configured to contact a first set of routers to obtain a first type of information stored in each router in the first set of routers; a second topology discovery agent (312) and/or (316) configured to contact a second set of routers to obtain a second type of information stored in each router in the second set of routers, and a phase controller (304) configured to select between the first and second topology discovery agents. The first and second sets of routers are different, and the first and second types of information are different. In one configuration, the first type of information is defined by a network management protocol, and the second type of information is defined by a routing protocol.