Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

70results about How to "Reduce bandwidth overhead" patented technology

Named data network comprehensive routing method based on position information and content pushing

The invention relates to a named data network comprehensive routing method based on position information and content pushing, and belongs to the technical field of computer network routing optimization. The method comprises: arranging a network management server, determining the link state of each node and starting a link state timer; establishing an NDN whole network topological structure chart and starting a network topological timer; establishing a network topology application record table; establishing a matching list of the whole network data name and the content source name and startinga statistical interval timer; the user sending a position request interest packet and the network management server replying the position data packet; a user calculating a forwarding path and sendinga data request interest packet and a content source reply content data packet, a network management server evaluating data popularity and a content source pushing data name to supplement an FIB tableof an NDN node, and regularly detecting a link state to update a network topology and pushing a high popularity data name. The method is relatively low in complexity and relatively low in bandwidth overhead, and can realize rapid establishment of the FIB table and efficient forwarding of the interest packet.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Method for control delay in interactive multiple vision point video stream media service

The invention relates to a method for controlling relay in alternative multi-view-point video flow media service, which belongs to the technical field of multimedia data transmission. The method mainly comprises the following steps: firstly, carrying out the time synchronization between users and a server, wherein the server enables the users who watch the same view-point to build a view-point inner overlay network, all the view-point inner overlay networks together build an overlay network between the view-points, when the users watch multi-view-point video programs, the equal overlay networks are added on the two levels, key frame data in the multi-view-point programs is averagely divided into a plurality of key frame data segments and are respectively transferred to audiences who watch the different view-points, all the audiences mutually exchanges the key frame segments of their own, and the bandwidth spending of the server during the transmission process is reduced according to the transmission condition of the current data. The method reduces the dependence to the bandwidth resource of the server during the view-point switching process according to the neighbor node bandwidth resources, reduces the intermediate section during the view-point switching process, speeds up the switching speed of the view-points, improves the service quality and increases the watching experience of users.
Owner:TSINGHUA UNIV

Hop-by-hop reliable transmission control method for underwater wireless sensor network

The invention discloses a hop-by-hop reliable transmission control method for an underwater wireless sensor network. Based on a digital fountain code technology irrelevant to a code rate, optimized degree distribution and recursive coding ideas are adopted, and an RLT (recursive LT) coding scheme is designed, so that rapid and efficient coding and decoding are realized; packet collision and end-to-end delay are reduced; and the network throughput is increased. Through collection of feedback information of a receiving node, the packet corruption probability of an underwater acoustic channel is accurately estimated, and the coding packet quantity of next transmission is further computed, so that the transmission overhead of extra packets is reduced. The fourth-layer reliable transmission mechanism and the second-layer medium access control mechanism of a conventional TCP/IP (Transmission Control Protocol/Internet Protocol) protocol stack are organically fused, so that block-by-block and hop-by-hop reliable transmission of the underwater wireless sensor network is realized on the basis of RLT coding, and transmission-reception conflicts, multi-transmission-single-reception conflicts and data-ACK conflicts caused by simplex communication of an underwater Modem are reduced. As an effective and practicable technical scheme, the method has a good application prospect.
Owner:杜秀娟

Method and system for accessing distributed block storage system in user mode

The invention discloses a method and system for accessing a distributed block storage system in a user mode, an access module is arranged in an LIO TCMU of a computing node, and the method comprises the following steps: after the LIO TCMU is connected with an iSCSI initiator, receiving a data reading request from a data access party sent by the iSCSI initiator through the access module; determining whether target data corresponding to the data reading request exists in a cache of the access module or not; if so, returning the target data to the data access party; and otherwise, generating a corresponding thread in a pre-configured thread pool in the access module, so as to execute the thread to request target data corresponding to the data reading request from the distributed block storagecluster and return the target data to the data access party. The functions of caching, pre-reading, writing merging and the like are added to a client, so that tasks originally processed by the server are moved to the client, the service capacity and the response speed of the whole cluster are improved, and while the access performance is improved, the bandwidth overhead of the cluster is reduced, and services can be provided for more computing nodes.
Owner:SUNING CLOUD COMPUTING CO LTD

Method for distributing and obtaining CORESET in idle state, base station, user equipment, and readable medium

The invention discloses a method for distributing and obtaining a CORESET in an idle state, a base station, user equipment, and a readable medium. The method comprises the steps: configuring time andposition information of the CORESET in the idle state, wherein the time and position information includes a number of symbols occupied by the CORESET in the idle state, or a number of symbols occupiedby the CORESET in the idle state and a start position of the CORESET in the idle state, and the symbol is a symbol in a parameter set used by the CORESET; configuring the location information of theidle state CORESET in the idle state in the system frame number; transmitting the configuration information to the UE, so that the UE can select the start position of the CORESET in the idle state inthe current configuration based on the received configuration information according to a preset relation table between the number of symbols occupied by the CORESET in the idle state and the start position of the CORESET in the idle state. According to the above scheme, the method does not need to directly indicate the CORESET in the idle state, so the bandwidth overhead of signaling indicating the CORESET in the idle state can be effectively reduced.
Owner:SPREADTRUM COMM (SHANGHAI) CO LTD

Storage device data integrity protection method, controller thereof and system on chip

The invention discloses a storage device data integrity protection method, a controller thereof and a system on chip, and the method comprises the steps: obtaining a safety memory access main body identifier contained in a memory access request based on the received memory access request; acquiring a memory access main body key corresponding to the security memory access main body identifier as afirst key according to a corresponding relationship between the stored security memory access main body identifier and the memory access main body key; carrying out nonlinear transformation on the first secret key to obtain a secret key related to a memory access address; the method comprises the steps of receiving a request type of a memory access request; and performing corresponding memory access operation on a first storage device, performing hash operation by adopting a preset operation mode on the basis of the second key and data corresponding to the memory access request, generating corresponding message authentication data, and storing the message authentication data for performing data integrity verification when the corresponding data stored in the first storage device is read. According to the scheme, integrity protection can be provided for the data in the first storage device.
Owner:HYGON INFORMATION TECH CO LTD

Panoramic video transmission method and system based on node calculation

The invention provides a panoramic video transmission method and system based on node calculation. The method comprises the following steps: obtaining feedback information of a user terminal in real time through an intermediate node, calculating a user visual field region according to the user visual field information, selecting a video stream accommodating the user visual field region for splicing, and obtaining a processed video stream; selecting a transmission scheme according to the user network condition information, extracting a transmission area for the processed video stream, and transmitting the transmission area code to a corresponding user terminal; wherein the transmission scheme comprises non-redundancy transmission and redundancy transmission, in the non-redundancy transmission, the transmission area is a user view area, in the redundancy transmission, the transmission area is a user view area plus a redundancy area, and the redundancy area is calculated according to usernetwork condition information and user terminal processing capability information. By combining the feedback information of the user terminal, the processing time delay can be effectively reduced, and the bandwidth overhead is reduced, so that the consumption experience of the user is integrally improved.
Owner:SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products