Message recombination method and network equipment
A network device and message technology, applied in the field of communication, can solve the problem of low efficiency of message fragmentation and recombination, achieve the effect of improving recombination efficiency and reducing transmission delay
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0071] Example 1: The serial numbers of the packet fragments received by the network device are 1, 2, and 3 respectively. According to the above method, the fragment receiving process is as follows figure 2 shown.
[0072] Specifically, as figure 2 As shown in the figure, after receiving the first packet with the sequence number 1, the network device stores the first packet in the storage unit R[1], and after receiving the packet with the sequence number 2, After fragmentation, append the message fragment to the tail of the fragmentation chain of the storage unit R[1], and record the reorganized fragmentation chain in the storage unit R[2]. After the packet is fragmented, the storage unit R[2] is not empty, and the packet fragment is appended to the end of the fragmentation chain of the storage unit R[2]. Since the packet with the sequence number of 3 is the tail fragment Packet fragmentation, because the fragmentation chain has the flags of the first packet fragment and t...
Example
[0073] Example 2: The serial numbers of the packet fragments received by the network device are 3, 2, and 1 respectively. According to the above method, the fragment receiving process is as follows image 3 shown.
[0074] Specifically, as image 3 As shown in the figure, after receiving the tail piece packet fragment with the sequence number 3, the network device stores the tail piece packet fragment in the storage unit R[3]. After fragmentation, append the message fragment to the header of the fragmentation chain of the storage unit R[3], and record the reorganized fragmentation chain in the storage unit R[3]. After the packet is fragmented, the packet fragment is added to the header of the fragmentation chain of the storage unit R[3]. Since the fragmentation chain has the flags of the first packet fragment and the last packet fragment, Then integrate and submit the shard chain.
Example
[0075] Example 3: The serial numbers of the packet fragments received by the network device are 2, 1, 4, 3, 6, and 5. According to the above method, the fragment receiving process is as follows Figure 4 shown.
[0076] Specifically, as Figure 4As shown, after receiving the packet fragment with the sequence number 2, the network device stores the packet fragment in the storage unit R[2], and after receiving the packet fragment with the sequence number 1, it stores the packet fragment in the storage unit R[2]. The message fragment is appended to the header of the fragment chain in the storage unit R[2], and the reorganized fragment chain is recorded in the storage unit R[2]. After receiving the message fragment with the sequence number 4 Then, the message fragment is stored in the storage unit R[4]. After receiving the message fragment with the sequence number 3, since the adjacent storage units before and after the storage unit R[3] are not empty, then Integrate the message...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap