Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

159 results about "Link Control Protocol" patented technology

In computer networking, the Link Control Protocol (LCP) forms part of the Point-to-Point Protocol (PPP), within the family of Internet protocols. In setting up PPP communications, both the sending and receiving devices send out LCP packets to determine the standards of the ensuing data transmission.

Fault tolerant automatic protection switching for distributed routers

A working router is coupled to a SONET add-drop multiplexor (ADM) through a working line and a protection router is coupled to the ADM through a protection line. The routers are coupled to each other by a separate side-band connection and comprise a virtual router from the perspective of the neighboring router, which communicates with the virtual router over the SONET network using the Point-to-Point Protocol (PPP). The protection router transmits a heartbeat message to the working router over the side-band connection. If the protection router does not receive a response thereto, it initiates a line switch within the add-drop multiplexor. Once the line switch is complete, the protection router exchanges datagrams with the neighboring router, via the ADM and SONET ring to which the ADM is coupled. The protection router establishes a PPP connection between itself and the neighboring router device coupled to the SONET ring, utilizing the Link Control Protocol (LCP). The protection router includes a predetermined identifier value that identifies the originator of the request, in the LCP Identifier field of LCP request datagrams. The neighboring router includes the Identifier value received in a request datagram in the corresponding response datagram transmitted over the SONET ring to the ADM. Because datagrams received by the ADM from the SONET link are transmitted over both the working and the protect lines, the working router receives the same response as the protection router. Thus, by examining the identifier field, and recognizing the identifier value as that assigned to the protection router, the working router determines that the line switch to the protection router has occurred.
Owner:EXTREME NETWORKS INC

Method for optimizing terminal control protocol (TCP) under wireless environment

The invention relates to the technical field of wireless communication. The invention discloses a method for optimizing a terminal control protocol (TCP) under a wireless environment. The invention comprises the following steps of: comprehensively analyzing physical layer (PHY) channel condition information and hybrid automatic requestor (HARQ) information, multi-access computer (MAC) layer scheduling information, radio link control (RLC) layer automatic repeat quest (ARQ) information, and packet data convergence protocol PDCP switching information through the cross-layer information, judging whether loss of a TCP layer message is caused by router congestion at a core network side or the loss of a data message of a wireless chain side, therefore, misleading of starting congestion of a TCP layer is avoided, user sending speed influenced by an algorithm is avoided, retransmission competition between the TCP and an ARQ/HARQ caused by misleading the TCP to start a quick retransmission algorithm is avoided simultaneously, and a performance of the TCP protocol under the wireless environment is optimized. A layer-cross structure provided by the invention keeps an interface and a port between middle layers of a long term evolution (LTE) layering protocol framework unchanged; furthermore, running efficiency of the TCP protocol under the wireless environment is improved on the basis of keeping interconnection and intercommunication with an original network.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Dynamic control protocol for frame relay fragmentation in support of real-time applications such as VOIP and VOFR

Frame Relay (FR) fragmentation control protocol for enabling FR access device and switches to support real-time traffic, such as VoIP and VOFR, enables communicating peers to negotiate dynamically for fragmentation operation and configuration parameters, as well as to terminate such an operation. Procedure is applicable to FR UNI or NNI fragmentation and end-to-end fragmentation, as well as to PPP fragmentation. Effectively, fragmentation is deployable on demand, and configuration negotiation is supportable across the network. Preferably, such control protocol allows systems with fragmentation to interoperate with older systems that do not support fragmentation.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP

Method and device for enabling third generation (3G) user to safely access to network

The invention discloses a method and a device for enabling a third generation (3G) user to safely access to network. When a link control protocol (LCP) attribute and a user name of a client, which are acquired by layer 2 tunneling protocol network server (LNS), are acceptable, an temporary internet protocol (IP) address is selected from an established temporary IP address pool and distributed to the client, fixed information which is sent by the client and can verify the client identity is received, when the fixed information is received, the fixed information is correspondingly recorded with the user name and a password, the point-to-point protocol (PPP) connection with the client is disconnected to trigger the client to initiate a second time virtual private dial-up network (VPDN) call, the client is informed of the specified IP address which is distributed by authentication, authorization and accounting (AAA) server to the client according to the recorded fixed information, the user name and the password, or when the fixed information is received, the fixed information, the user name and the password are directly sent to the AAA server to verify the client, and after the client passes the authentication, the client is informed of the specified IP address which is distributed by the AAA server to the client. By means of the method and the device, the client can access to network only when the client is subjected to safety authentication by the LNS, and the safety of network access is improved.
Owner:NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products