Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40 results about "Hop (networking)" patented technology

In computer networking, including the Internet, a hop occurs when a packet is passed from one network segment to the next. Data packets pass through routers as they travel between source and destination. The hop count refers to the number of intermediate devices through which data must pass between source and destination.

Devices and methods for forwarding information base aggregation

Networking devices and methods for forwarding information base (FIB) aggregation are provided. A networking device includes a processor operable to access entries in a FIB, and aggregate the FIB entries to produce an aggregated FIB with strong forward correctness. In aggregating the FIB entries, the processor is operable to: (a) associate the FIB entries with nodes (n) in a patricia trie; (b) traverse the patricia trie depth-first in post-order and determine for each node a next-hop set, without expanding the trie, by merging what would be the next-hop sets of its imaginary children nodes if there is a complete binary tree; and (c) traverse the patricia trie depth-first in pre-order, select for the root node a next-hop from its next-hop set and include the FIB entry associated with the root node in the aggregated FIB, for each node having a selected next-hop that appears in its child's next-hop set, select that next-hop for the child as its next-hop and exclude the FIB entry associated with the child node from the aggregated FIB, and for each child node which does not have in its next-hop set the selected next-hop of its parent, select a next-hop from its next-hop set and include the FIB entry associated with the child node in the aggregated FIB.
Owner:UNIVERSITY OF MEMPHIS RESEARCH FOUNDATION +1

Method and system of CCN trusted addressing based on DNS and extension protocol thereof

The invention relates to a method and a system of CCN (Content-Centric Networking) trusted addressing based on a DNS (Domain Name System) and an extension protocol thereof. The method comprises the steps of deploying content management anchor points in every regions of the content-centric networking (CCN) and registering the content management anchor points in the DNS based on the content prefixes of all the regions, next, carrying out addressing in a hop-by-hop addressing manner and a centralized DNS addressing manner in the content-centric networking, establishing a complete trust chain by virtue of a DNSSEC (Domain Name System Security Extensions) protocol to provide security guarantee in the name resolution process, providing public key information verification by virtue of a DANE (DNA-Based Authentication of Named Entities) protocol and then realizing trusted verification on contents and finally obtaining the desired contents. The method and the system have the advantages that the existing base facilities of the current internet are well combined and a data management model capable of supporting future mass services is provided, and especially for the deployment of the future CCN in the mobile internet, the dynamic content management can be effectively supported and the flexible and efficient mass content addressing process can be realized.
Owner:CHINA INTERNET NETWORK INFORMATION CENTER

Seismic data transmission system based on UWB multi-hop network architecture

PendingCN110716229ALess likely to be disturbedShort pulse durationSeismic signal receiversSeismic signal transmissionData transmissionHop (networking)
The invention relates to a seismic data transmission system based on a UWB multi-hop network architecture. The system comprises three parts of a UWB seismic acquisition station acquisition system, a multi-hop networking system and a data center supervision system. The UWB seismic acquisition station acquisition system is used for acquiring seismic information; the collected seismic information issent to the data center supervision system through the multi-hop networking system, the multi-hop networking system is based on an ultra-wideband technology and adopts a network architecture with peer-to-peer network serial access, the link benefit is maximized by using an improved AODV routing algorithm, the collected information can be transmitted to the data center supervision system in the most efficient manner, and the data center supervision system is used for recovering and processing data in real time and monitoring the whole network system in real time. The system has the outstandingcharacteristics of low power consumption, real-time data recovery, wide monitoring range, labor saving and the like.
Owner:JILIN UNIV

Next hop determining method and device

InactiveCN106506367AAvoid long-term traffic interruptionsEasy to chooseData switching networksComputer networkReal-time computing
The embodiment of the invention provides a next hop determining method and device. The method is applied to a first ASBR in a first autonomous system. A first autonomous system and a second autonomous system carry out cross-domain networking in an Option B mode. The second autonomous system comprises at least two second ASBRs. The method comprises the steps of detecting whether a preselection next hop currently corresponding to a target address is reachable or not, wherein the target address is the address of a target CE in the second autonomous system, the preselection next hop is the second ASBR with target identification information in a target forwarding table, and the target forwarding table is the forwarding table which is stored by the first ASBR and corresponds to the target address; if the preselection next hop is unreachable, selecting the identification information with the highest priority except the target identification information from the target forwarding table, wherein corresponding relationships between the identification information and the priorities are stored in the target forwarding table; and updating the preselection next hop corresponding to the target address to be the second ASBR with the selected identification information. Visibly, according to the scheme, the condition that traffic is interrupted for a long time among the autonomous systems which carry out cross-domain networking in the Option B mode can be avoided well.
Owner:NEW H3C TECH CO LTD

Internet-of-Things communication system and construction method thereof

The invention relates to the field of Internet of Things, and provides an Internet-of-Things communication system and a construction method thereof. The Internet-of-Things communication system comprises a first-layer network and a second-layer network, wherein the first-layer network is a multi-hop network which is constructed by a central gateway and a cluster head node and takes the central gateway as a root node; the second-layer network is a point-to-multipoint single-hop cellular network constructed by the cluster head node and the terminal node; and the cluster head node is generated byelecting from the terminal node according to a preset rule and is used for converging and forwarding data sent by the terminal node. In the networking initialization process of the terminal nodes, thecluster head node is elected according to the preset rule, it is guaranteed that the number of multi-hop levels from the center gateway of the first-layer network to the cluster head node is as smallas possible, the end-to-end time delay is reduced, and the throughput and the network transmission efficiency of the network are improved. The second-layer network is a point-to-multipoint single-hopcellular network, so that the communication requirement of low time delay during high-frequency concurrent data transmission of a large number of terminal nodes can be met.
Owner:SMART SHINE MICROELECTRONICS TECH CO LTD

MAC layer transmission protocol design method with limited control overhead

ActiveCN109348492AApplicable networking requirementsAvoid congestion or even paralysisNetwork topologiesWireless network protocolsTransmission protocolClear to send
The invention belongs to the field of communication and specifically relates to a MAC layer transmission protocol design method with limited control overhead. The method comprises the steps of initializing to generate a DATA message, sending an RTS (Request to Send) message, receiving the RTS message, sending a CTS (Clear to Send) message, receiving the CTS message, sending the DATA message, receiving the DATA message, sending a REQ message, receiving the REQ message, sending an SRQ (Selective Automatic Repeat Request) message, receiving the SRQ message, sending an ACK (Acknowledgement) message, receiving the ACK message and so on. By monitoring a channel reservation request RTS message sent by the next hop node and the REQ message of the next second hop node, the MAC layer transmission protocol design method with limited control overhead can judge correctness of the message transmission thereof, and accordingly can adjust and modify path information in time to solve problems of circumvention of invalid relay nodes and restoration of an interrupted transmission link. Network congestion, even network paralysis, caused by invalidity of transmission links, is avoided efficiently without adding any extra control message field within the limited control overhead, robustness of message transmission links is accordingly enhanced, the network lifecycle is prolonged and the MAC layer transmission protocol design method with limited control overhead is enabled to be more applicable to wireless sensor networking demands.
Owner:HARBIN ENG UNIV

A design method of mac layer transmission protocol with limited control overhead

ActiveCN109348492BApplicable networking requirementsAvoid congestion or even paralysisNetwork topologiesWireless network protocolsTransmission protocolPathPing
The invention belongs to the communication field, and in particular relates to a design method of a MAC layer transmission protocol with limited control overhead. The present invention includes initializing and generating DATA message, sending RTS message, receiving RTS message, sending CTS message, receiving CTS message, sending DATA message, receiving DATA message, sending REQ message, receiving REQ message, sending SRQ message, receiving SRQ message, sending ACK message, receiving ACK message and other processing processes, the present invention judges its own report by monitoring the channel reservation request RTS message sent by the next-hop node and the REQ message of the next-hop node. The correctness of the text transmission, so as to adjust and change the path information in time to solve the problem of avoiding the failure of the relay node and the repair of the interrupted transmission link; within the limited control overhead, no additional control message field is added, effectively avoiding the problem caused by the transmission link. Network congestion or even paralysis caused by road failure, thereby enhancing the robustness of message transmission links, improving the network life cycle, and making it more suitable for wireless sensor networking requirements.
Owner:HARBIN ENG UNIV

Mobile ad hoc network communication method, device and system and storage medium

The invention discloses a mobile ad hoc network communication method, device and system and a storage medium. The method comprises the following steps: receiving a networking signaling sent by an adjacent node of a receiving node; the networking signaling comprises a stable routing mark and hop count information, the stable routing mark represents a first path transmission state that the adjacent node reaches a certain appointed node in the ad hoc network, and the hop count information represents the forwarding times that the adjacent node reaches the certain appointed node in the ad hoc network; obtaining a second path transmission state from the receiving node to the specified node based on the received networking signaling; and updating the routing table of the receiving node according to the first path transmission state or the second path transmission state. According to the embodiment of the invention, the stable routing mark is introduced, during networking, each node broadcasts and transmits the own stable routing mark and constructs/updates the routing table, and the routing table of each node can obtain the most stable next-hop node which arrives at the appointed node, so that the connectivity rate between two long-distance nodes is improved.
Owner:GUANGZHOU HUIRUI SITONG INFORMATION SCI & TECH CO LTD

Energy-equalized workflow

The invention provides a workflow of an energy balancing method, which comprises the following steps that: 01, after a node finishes deployment and networking initialization, the node starts to collect original data and transmits the processed data to a Sink hop by hop, which is uplink communication and finishes the first round of data communication; 02, acquiring related information from an application layer by an energy balancing module; step 03, according to the related information provided by the application layer, the energy balance module acquiring an algorithm level in a preset compression algorithm set; 04, acquiring related information from the network transmission layer and the lower layer of the network transmission layer by the energy balancing module; step 05, the energy balance module calculates the energy consumption of the local node in the first round of data communication according to the known parameters; step 06, the energy balance module transmits the calculated total node energy consumption of the current round to a physical layer in a downlink manner, and communicates to a back node in a downlink manner through a message frame; the method has the advantages that saving and balancing of energy consumption are considered simultaneously, so that the network service life is prolonged.
Owner:ZHEJIANG BUSINESS TECH INST

A state-aware software-defined networking method

The invention relates to a software definition networking method of state sensing. The software definition networking method comprises steps of: step 1: inputting a data level network parameter, an adjacent matrix AN*N, an end-to-end flow request matrix gammaN*N, link capacity Ce, a maximum link utilization rate alpha and a low request transmission rate lower limit beta; step 2: calculating a data level network path set, and solving all path sets P between two points in a directed connected graph according to a depth-first traversal method of the graph; step 3: calculating a link state matrix Ukpe; step 4: establishing a multi-source multi-sink maximum flow model based on a path hop count; and step 5: solving a model constructed in the step 4 by use of the CPLEX, and outputting the end-to-end maximum flow based on energy efficiency priority. According to the invention, the maximum flow solution based on a path is adopted; in order to improving energy efficiency of a data level network, the path hop count is used as a restriction condition, and a flow transmission path with lowest bit energy consumption is established for an end-to-end request every time, so an objective of division of high energy efficiency data level network is met.
Owner:ANSHAN POWER SUPPLY COMPANY OF STATE GRID LIAONING ELECTRIC POWER COMPANY +3

A network topology control method in cognitive vehicle networking

The invention discloses a network topology control method in a cognitive vehicle networking, which mainly solves the problems of network topology splitting and mutual interference of cognitive vehicles caused by any channel being occupied in the prior art. The implementation process of the method is as follows: 1. Each vehicle node in the network first uses the directional information transmission mechanism in the present invention to obtain one-hop neighbor information; 2. Based on the one-hop neighbor information, each vehicle node uses the two-hop neighbor information in the present invention. The hop neighbor discrimination mechanism obtains a local two-hop topology map; 3. Each vehicle node constructs a local generated subgraph that can ensure the connectivity of the topology structure according to the link weight proposed in the present invention; 4. All vehicle nodes in the network are based on the optimized The locally generated subgraph of the channel is requested and used to avoid interference in the network. The method of the invention can ensure the network connectivity after any channel in the network in the cognitive vehicle networking is occupied, and improve the fault tolerance and robustness of the network topology structure.
Owner:EAST CHINA JIAOTONG UNIVERSITY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products