Empty identifying method, device and receiving equipment for MLPPP link

An identification method and identification device technology, applied in the field of communication, can solve problems such as poor fault tolerance, increased equipment hardware costs, increased hardware costs, etc., and achieve the effects of small delay, improved fault tolerance, and saving cache resources

Inactive Publication Date: 2012-01-04
吴中区横泾博尔机械厂
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] During the research and practice of the above-mentioned prior art, the inventors of the present invention found that the above-mentioned prior art requires the receiving end to wait for a certain period of time when judging whether a waiting unarrived packet fragment is empty. The time is usually a time greater than the maximum delay of the link, so that the receiving end cannot identify the hole as soon as possible, resulting in a delay in packet reassembly processing; and when an unarrived packet fragment is indeed empty, the waiting end of the receiving end The time makes the reframed message unable to reach the next node in time, so it also increases the delay of the entire MLPPP link out of thin air
[0007] Further, the message fragments that arrive at the receiving end within the time period and have not been reassembled into frames can only be stored in the cache device, which leads to the problem that the receiving end needs to configure a large storage space, and the large storage space will bring Increase in equipment hardware costs (such as adding configuration storage media, etc.)
[0008] In fact, in addition to the increase in equipment hardware cost caused by configuring a large storage space, due to the long waiting time for the receiving end, the unsorted and reorganized packet fragments in the cache device continue to increase, resulting in the sequence number of packet fragments in the When this long waiting time reaches the maximum value, the sequence numbers of the packet fragments after the maximum value overlap with the sequence numbers of some packet fragments before the maximum value. This overlap is obvious when the packet fragments are reorganized into frames. A large number of errors will be caused, which shows that the method for identifying or detecting holes in the prior art has poor fault tolerance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Empty identifying method, device and receiving equipment for MLPPP link
  • Empty identifying method, device and receiving equipment for MLPPP link
  • Empty identifying method, device and receiving equipment for MLPPP link

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] Although the existing technology can finally identify the hole, because the hole should be quickly skipped, the unnecessary waiting time at the receiving end is obviously too long, which increases the delay of link transmission and requires considerable storage during the waiting process. The resource caches the packet fragments arriving one after another for subsequent reorganization into frames. Moreover, once the number of cached packet fragments reach...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiment of the invention discloses an empty identifying method, a device and a receiving equipment capable of identifying empty of a MLPPP link, which is used for quickly identifying empty in the MLPPP link and performing packet fragment reassembling. The method comprises generating MLPPP link binding relation configuration parameter list; generating a serial number recording list which records serial numbers of received point-to-point link latest packet fragment; obtaining the serial numbers of latest packet fragment in the serial number recording list through the MLPPP link binding relation configuration parameter list, determining whether the current packet fragment is empty according to logical size relationship of serial number of the latest packet fragment and the current required packet fragment. The invention can quickly determine whether a packet fragment is empty, prevent pointless waiting when meeting an empty, therefore the time delay of the MLPPP link is small, cache resource is saved, and fault-tolerant capability is improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, a device and a receiving device for identifying a hole in an MLPPP link. Background technique [0002] The Multilink Point-to-Point Protocol (MLPPP, PPP Multilink Protocol) is developed from the Point-to-Point Protocol (PPP, Point-to-Point Protocol). The difference from PPP is that MLPPP can bundle multiple links from the same source address to the same destination address and meet "certain" conditions to form a virtual link (called a link bundle Bundle) . The user or network layer treats the Bundle as an ordinary link and sends or receives data packets to it. A Bundle can actually be bundled by multiple physical links, and how data is subcontracted / integrated between links is transparent to the upper layer. After multiple links are bundled together to form a bundle, the available bandwidth between the sender and receiver is the sum of the bandwidth of all lin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L12/56H04L29/08H04L12/70
Inventor 杨伟国雷春涂君
Owner 吴中区横泾博尔机械厂
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products