Abstract:
In the method, scheduling of a plurality of users for receiving transmitted data is prioritized within a communications system. A next data transmission among the plurality of users is allocated based on the prioritized scheduling.
Abstract:
A method, architecture and service of providing a multiple tiered pricing structure for providing a first service level to priority traffic where the priority traffic is protected via a 1:1 protection system, and a second service level for non-priority or extra traffic, wherein the extra traffic is normally propagated via the protection path, and is protected using a mesh restoration technique in the event of failure of the protection path or use of the protection path by the priority traffic.
Abstract:
A method of providing network intelligence between an intelligent end-user gateway (IEUG) device and a plurality of intelligent network layers. The method includes generating an end-user diary including goals, goal-related plans, and tasks to fulfill the plans. The end-user diary is sent to at least one of the plurality of intelligent network layers, where the at least one of the plurality of intelligent network layers update a user profile from the end-user diary and send goal related information to the IEUG device. The IEUG performs the tasks and plans to fulfill the goals based on the goal related information.
Abstract:
A method and apparatus for modifying the extinction ratio of a modulated optical signal by adapting a modulator driver signal in response to differences in spectral regions of the modulated optical signal. In another embodiment for modifying the extinction ratio of a modulated optical signal, a modulator signal is adapted in response to differences between a profile of the modulated optical signal and a desired profile.
Abstract:
A wire bond comprising an intentionally introduced ends offset wherein the ends offset reduces stress from axial displacement as compared to the same axial displacement on a wire bond without an intentionally introduced ends offset. Further disclosed are a semiconductor device comprising at least one wire bond having an intentionally introduced stress reducing ends offset, and methods for fabricating a wire bond and semiconductor device.
Abstract:
A method and apparatus implementing a null1null1null protection scheme using two interface cards (transmitter and receiver) having a mathematically provable uptime rate.
Abstract:
The present invention provides a process for forming electrical contacts to a molecular layer in a nanoscale device, the nanoscale device, and a method of manufacturing an integrated circuit comprise such devices. The process includes coating a surface of a stamp with a metal layer and forming an attached layer of anchored molecules by coupling first ends of the anchored molecules to a conductive or semiconductive substrate. The process also includes placing the metal layer in contact with the attached layer of anchored molecules such that the metal layer chemically bonds to free ends of the anchored molecules. The resulting devices produced have superior reliability as compared to conventional prepared devices.
Abstract:
A low-loss integrated optical coupler includes at least three substantially similar optical couplers, adjacent ones of the optical couplers interconnected via at least one set of waveguides, each of the sets of waveguides comprising a path-length difference between the waveguides therein. In one embodiment of the present invention, the multi-section optical coupler comprises at least two arms and the path-length differences are adjustable such that signals traversing the at least two arms undergo a relative phase shift, such that a desired output power splitting ratio for the multi-section optical coupler is achieved. Alternatively, the optical coupler is implemented in an inventive optical device that functions at least, as an optical switch or an optical splitter.
Abstract:
Method and apparatus for synchronizing two different types of modulators in an optical transmission system includes a first modulator generating an optical pulse train, a second modulator encoding data onto the optical pulse train, an optical filter resolving upper and lower modulation sidebands of the optical data and an analyzer measuring the optical power of modulation sidebands and converting the received optical power of the sidebands into a control signal for synchronizing the two modulators. A wedged etalon is the filter element selecting the USB and LSB from the optical data spectrum. The analyzer contains photo-detectors measuring the optical power of the filtered USB and LSB and an electronic differential amplifier producing a control signal based upon photo-detector output. The phase shifter, in response to said control signal, adapts the temporal delay of the first modulator to reduce differences between the power levels of said upper and lower sidebands.
Abstract:
A method and apparatus are disclosed for managing a firewall. The disclosed firewall manager facilitates the generation of a security policy for a particular network environment, and automatically generates the firewall-specific configuration files from the security policy simultaneously for multiple gateways. The security policy is separated from the vendor-specific rule syntax and semantics and from the actual network topology. Thus, the security administrator can focus on designing an appropriate policy without worrying about firewall rule complexity, rule ordering, and other low-level configuration issues. In addition, the administrator can maintain a consistent policy in the presence of intranet topology changes. The disclosed firewall manager utilizes a model definition language (MDL) and an associated parser to produce an entity relationship model. A model compiler translates the entity-relationship model into the appropriate firewall configuration files. The entity-relationship model provides a framework for representing both the firewall-independent security policy, and the network topology. The security policy is expressed in terms of nullroles,null which are used to define network capabilities of sending and receiving services. A role may be assumed by different hosts or host-groups in the network. A visualization and debugging tool is provided to transform the firewall-specific configuration files into a graphical representation of the current policy on the actual topology, allowing the viability of a chosen policy to be evaluated. A role-group may be closed to prevent the inheritance of roles.