会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明专利
    • DE69919011D1
    • 2004-09-02
    • DE69919011
    • 1999-10-01
    • ENTERASYS NETWORKS INC
    • KEMP HMCCANN E
    • H04L1/18H04L12/46H04L29/06H04L29/08
    • A new type of communication protocol provides semi-reliable transport of data over a data channel, such as over the Internet. The new type of protocol limits the number of retransmissions of unsuccessfully delivered data and may eventually "give up" on successfully delivering particular data and go on sending subsequent data to the destination. When a reliable communication protocol, such as TCP/IP is tunneled between two computers over a virtual connection which uses the new type of semi-reliable protocol, overall error control of data passing between the two computers involves elements of error control implemented by both the semi-reliable protocol and the reliable protocol. This overall error control can provide higher throughput than provided by using either a completely reliable protocol (e.g., TCP) for the virtual connection, or a completely unreliable protocol (e.g., UDP) for the virtual connection. This advantage can be even more pronounced if the data stream is compressed or encrypted before being passed over the virtual connection using a technique which maintains state from one data packet to another.
    • 5. 发明专利
    • METHOD AND APPARATUS FOR DETERMINING A SPANNING TREE
    • CA2511011A1
    • 2004-07-15
    • CA2511011
    • 2003-12-22
    • ENTERASYS NETWORKS INC
    • TSILLAS DEMETRIOS
    • H04L12/56
    • It is realized that the use of a spanning tree protocol in particular portio ns of a network may not necessarily be desired due to performance and stability reasons. A method and system is provided for executing a revised spanning tr ee algorithm that performs more optimally in particular network topologies. In one aspect, a spanning tree protocol is executed over a first and second network connected by a third network, wherein the spanning tree network is disabled in the third network. The third network may be, for example, a core network through which first and second Layer 2 networks are bridged. The fir st and second networks may be coupled by another network or network connection, and it may be preferable to allow the operation of the spanning tree network between the first and second coupled networks for the purpose of fail over t o redundant paths. In network forwarding devices positioned at edges of the co re network, the operation of the STP over interfaces where network tunnels of each network forwarding device attached to the core network may be inhibitie d (e.g., turned off). A phantom root bridge may be created that does not correspond to an actual network forwarding node, and this phantom root bridg e may have a bridge identifier which is used by network forwarding nodes as th e rootbridge. In this manner, STP protocols may work as intended in peripheral networks, while STP does not need to be executed in the core.
    • 6. 发明专利
    • DE69917602D1
    • 2004-07-01
    • DE69917602
    • 1999-01-13
    • ENTERASYS NETWORKS INC
    • RIJHSINGHANI G
    • H04L12/18H04L12/46
    • A switch for use in a virtual communications system having multiple local area networks interconnected by multiple switches that are connected by a trunk, having one or more trunk stations connected directly thereto. The switch comprises a first communications port to connect to a first local area network, the first local area network being within a virtual local area network that includes one or more of the trunk stations and one or more other local area network, a second communications port to connect to the trunk, and a control console to detect a unicast communication from the first local area network, to append a VLAN header to the unicast communication if the unicast communication is addressed to one of the other local area networks of the virtual local area network, to refrain from appending a VLAN header of the unicast communication is addressed to one of the trunk stations of the virtual local area network and to direct transmission of the unicast communication to the second communications port and on to the trunk.
    • 10. 发明专利
    • Controlling concurrent usage of network resources by multiple users at an entry point to a communications network based on identities of the users
    • AU2003216136A8
    • 2003-09-02
    • AU2003216136
    • 2003-01-31
    • ENTERASYS NETWORKS INC
    • KJENDAL DAVIDRICHMOND JAMES
    • H04L12/46H04L29/06G06F11/30G06F12/14H04L9/00H04L9/32
    • Controlling a user's usage of network resources, after the user has been authenticated, without using any network resources beyond the user's entry point to the network. A plurality of users may be connected to an entry point of a network of a network device by a shared transmission medium. Each users' usage of network resources is controlled, after such user has been authenticated, without using any network resources beyond such user's entry point to the network. For each one or more users, packet rules may be provisioned to the user's entry point to the network, where such entry point may be shared with other users. The packet rules may be applied to each packet received from the user before any network resources beyond the entry point are used. These packet rules may be associated with an identity of the user and then provisioned to the user's entry point in response to the user being authenticated. If a plurality of users are connected to an entry point by a shared transmission medium, packet rules associated with the users may be provisioned to the entry point and applied to packets received from the users before any network resources beyond the entry point are used. Such packet rules may be provisioned to a number of network entry devices and may serve as a distributed firewall for users of a network, as opposed to a centralized firewall. An entry port module of a network entry device may be configured based on an identity of one or more users as a result of the authentication of the one or more users, respectively, and each packet received from each user may be examined to control usage of network resources by the user.