Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

83 results about "Link flow" patented technology

Characterizing achievable flow rates in multi-hop mesh networks with orthogonal channels

A method of routing data from a source node to a destination node in a multi-hop network of nodes interconnected by links comprises: (a) determining that a link-flow vector satisfies one or more necessary scheduling conditions for achievability, wherein the link-flow vector represents a set of flows to be routed on one or more links from the source node to the destination node; (b) generating a scheduling multi-graph for the network, wherein the scheduling multi-graph comprises a graph having at least one pair of nodes with multiple edges therebetween; (c) deriving one or more sufficient scheduling conditions for achievability of the link-flow vector by edge-coloring the scheduling multi-graph; (d) solving a linear optimization problem over the one or more necessary scheduling conditions to obtain an upper bound on the achievability of the link-flow vector; (e) generating, based on the scheduling multi-graph, a solution comprising a set of routes and an associated schedule for achieving the link-flow vector, the solution being a lower bound on the achievability of the link-flow vector; and (f) implementing a routing method using the set of routes and the associated schedule to route the link-flow vector from the source node to the destination node. At least one node v of the network is adapted to receive transmissions from a specified plurality Ω(v) of other nodes, and at least one of the scheduling conditions depends on Ω(v).
Owner:ALCATEL-LUCENT USA INC +1

System and method for regulating message flow in a digital data network

InactiveUS7283471B2Fairness among all virtual circuits for buffer resourcesStop transmissionError preventionFrequency-division multiplex detailsDigital dataPathPing
A system includes a plurality of computers interconnected by a network including one or more switching nodes. The computers transfer messages over virtual circuits established thereamong. A computer, as a source computer for one or more virtual circuit(s), schedules transmission of messages on a round-robin basis as among the virtual circuits for which it is source computer. Each switching node which forms part of a path for respective virtual circuits also forwards messages for virtual circuits in a round-robin manner, and, a computer, as a destination computer for one or more virtual circuit(s), schedules processing of received messages in a round-robin manner. Round-robin transmission, forwarding and processing at the destination provides a degree of fairness in message transmission as among the virtual circuits established over the network. In addition, messages are transmitted in one or more cells, with the round-robin transmission being on a cell basis, so as to reduce delays which may occur for short messages if a long messages were transmitted in full for one virtual circuit before beginning transmission of a short message for another virtual circuit. For each virtual circuit, the destination computer and each switching node along the path for the virtual circuit can generate a virtual circuit flow control message for transmission to the source computer to temporarily limit transmission over the virtual circuit if the amount of resources being taken up by messages for the virtual circuit exceeds predetermined thresholds, further providing fairness as among the virtual circuits. In addition, each switching node or computer can generate link flow control messages for transmission to neighboring devices in the network to temporarily limit transmission thereto if the amount of resources taken up by all virtual circuits exceeds predetermined thresholds, so as to reduce the likelihood of message loss.
Owner:AVAGO TECH INT SALES PTE LTD

Satellite MPLS (multi-protocol label switching) network flow rate balancing method based on SDN (software defined network) controller

The invention discloses a satellite MPLS (multi-protocol label switching) network flow rate balancing method based on an SDN (software defined network) controller. An SDN controller is put on a network edge; the control plane of network equipment is separated from the data plane; the functions of the control plane are concentrated onto a special controller, so that the equipment complexity in the network is reduced. The data plane and the control plane are decoupled, and an SDN obtains great flexibility, so that the network has the characteristics of high expandability, easy maintenance, programmable performance and open performance. According to the method, the SDN controller peripherally collects network topology and network state information from a router/interchanger in a data plane through an OpenFlow protocol of a southbound interface; through calculation, the available bandwidth condition of each link is obtained, so that whether the path jam occurs or not is judged; whether the flow rate dispatching is needed or not is judged; the goal of collecting and analyzing the whole network flow rate distribution condition in real time is achieved; the link flow rate is reasonably deployed, so that the flexible control of the network flow rate is realized; in addition, the bandwidth resource utilization rate can be better improved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Quality random inspection execution process supervision system

InactiveCN106408173ARaise the level of innovation and developmentSatisfies the requirement of "inverting the burden of proof" for the administrative act of evidence fixationResourcesCommerceTTEthernetNetwork connection
The invention relates to a quality random inspection execution process supervision system. With a B/S architecture adopted, a supervisor monitors and manages an execution process through adopting mobile Internet technologies and by means of a supervision server, namely, a supervision port, which is constructed through a browser, a server or the like, and a mobile phone or special execution terminal used by field execution staff, such as a mobile phone equipped with special application software; the supervision server of the system is provided with a recording database and a random inspection process supervision module; the execution terminal is in network connection with the supervision port so as to carry out sampling/sample purchase planning, task reception, download and information inputting of various steps of a random inspection execution process; the information acquisition of the solidified flow of the random inspection execution process can be obtained through the solidified sampling/sample purchase link flow module of the execution terminal; and the field random inspection staff carries out random inspection process execution and stores information and evidences of each step through using the application of the mobile phone or special execution terminal application.
Owner:邱霓 +1

Crossroad dynamic turning proportion two-step prediction method based on double Bayes

The invention discloses a crossroad dynamic turning proportion two-step prediction method based on double Bayes. According to the crossroad dynamic turning proportion two-step prediction method, a first Bayes combination method is designed by means of link flow detected by entries and exits at a crossroad and with combination of history flow data to predicate entry and exist flow in the next time period, an improved Kalman filtering algorithm and an improved counterpropagation neural network algorithm are designed based on the entry and exist flow in the next time period to predicate dynamic turning proportion of the next first time period and the next second time period, a second Bayes combination method is designed under the conditions that predication errors are corrected through history turning proportion data to calibrate and update weight dynamically, and dynamic turning proportion one-step and two-step prediction values of double Bayes combination methods can be obtained. By means of the existing method, dynamic turning proportion one-step value can be obtained only, and the existing method has advantages and disadvantages in precise and efficiency. The crossroad dynamic turning proportion two-step prediction method comprehensively has the advantages of all methods, avoids local overhigh deviation, is high in precision, and can obtain one-step and two-step prediction values simultaneously and provide basis supporting for an intelligent traffic control system.
Owner:BEIJING UNIVERSITY OF CIVIL ENGINEERING AND ARCHITECTURE

Trust management system based trusted reconstructing method of IP routing protocol

InactiveCN101888328AFusion of trust valueData switching networksPacket lossNetwork topology
The invention discloses a trust management system based trusted reconstructing method of an Open Shortest Path First (OSPF) routing protocol, which comprises the following steps of: (1) before each router is added into a network, registering to the trust management system, and sending corresponding trust certificates to the routers by the trust management system, the trust certificates including comprehensive trust values of the routers and each being calculated according to safe parameters and configuration parameters of the routers and all the subjective trust value of the neighbor router to the routers by the trust management system; (2) transferring the trust certificates among the routers through hello information, wherein an adjacency relation is not established for the router without the trust certificate, all the routers in the network are ensured to have own trust certificates; (3) each router calculating the subjective trust value of the neighbor router based on network real time parameters including link flow, packet loss probability, retardation, transmission rate of the packet and reliability of the packet, during an interactive work with the neighbor router, calculating a total trust value of the neighbor router by using the comprehensive trust value and the subjective trust value of the neighbor router, and modifying a metric field of a link-state announcement Router_LSA packet as the total trust value and synchronizing a link-state data base;(4) modifying a Dijkstra algorithm, using a reciprocal of the total trust value between the routers as the parameter for the arithmetic computation, selecting the router with higher trust value to generate a shortest path tree, and forming a trust routing list; (5) periodically reporting the subjective trust value of the neighbor routers to the trust management system by each router, simultaneously obtaining the parameter required for computing the subjective trust value, updating the trust certificate of each router at fixed time, and eliminating the router with the overdue trust certificate out of the network to maintain the topological structure of the whole network.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Route protection converting method and device

The invention relates to a route protection converting method and device. The route protection converting method comprises the following steps of: configuring a three-layer virtual interface bound with a two-layer VPN (Virtual Private Network) on device nodes of two ends of the two-layer VPN; establishing a protection group relation between a protection route and a protected route according to the binding relation of the two-layer VPN and the three-layer virtual interface; and converting a link flow rate from the protected route to the protection route through the three-layer virtual interface according to the protection group relation when a protected link has failure. According to the route protection converting method disclosed by the invention, through the three-layer virtual interface ARP (Address Resolution Protocol) protection policy, without changing an original network topology and two/three-layer domain partition, the protection of an over two-layer network domain on a three-layer network domain route is realized, a problem of flow interruption of the three-layer route at the two/three-layer network connection caused by DOWN (Direct Memory Access Controller) is solved, and additional devices and a hardware lookup operation do not need to be additionally arranged; and in addition, the expandability of a network structure is improved, the network complexity is reduced and the maintenance cost is saved when conversion performances are ensured.
Owner:ZTE CORP

Scheduling method of network-on-chip router based on network information

InactiveCN102546417AReduce latencyMitigate situations where multiple router nodes are blockedData switching networksNetworks on chipLink flow
The invention discloses a scheduling method of a network-on-chip router based on network information, and mainly solves the problem that the router has limited buffer space and longer grouping time so as to seriously block a network. The scheduling method is finished through two stages as follows: at the first stage, an input arbitration unit selects an input queue as a response queue according to the three parameters, namely hop count from a source node to a destination node, the hop count from a current node to the destination node and lock virtual channel number of a local input port; and at the second stage, an output arbitration unit selects according to the three parameters, namely, the lock virtual channel number of an output link, the hop count from the source node to the destination node and the hop count from the current node to the destination node, and a best transmission path is selected between an input port and an output port grouped on the network-on-chip router through the scheduling of two stages. The scheduling method provided by the invention has the advantages of low time delay, high throughput and balanced grouping link flow, and can optimize distribution of an inner path of the network-on-chip router.
Owner:陕西光电子先导院科技有限公司

Neural network-based low amplitude network flow anomaly detection method

InactiveCN102075383AAvoid the impact of the detection stepGood for concealing traffic anomaliesError preventionData switching networksNerve networkAlgorithm
The invention discloses a neural network-based low amplitude network flow anomaly detection method. In the method, a neural network module comprises a second multilayer recurrent neural network and a first multilayer recurrent neural network, the input of the second multilayer recurrent neural network is directly measurable link flow, and the output of the second multilayer recurrent neural network is the estimated flow of part of origin-destination (OD) flow; and the input of the first multilayer recurrent neural network is the link flow and the estimated flow of the part of OD flow, which is output by the second multilayer recurrent neural network and serves as supplementary constraint input, and the output of the first multilayer recurrent neural network is the estimated value of a characteristic parameter. In the invention, the step of inversion from a link to the OD flow is skipped, so the influences of errors generated in a prediction process on a detection step are avoided effectively, and the real-time prediction of the OD flow correlation at next moment can be provided. When the method is used, the detection of hidden flow anomaly is easier, the detection process does not completely rely on the estimation from the link to the OD flow any more, the problem that the inversion error influences the detection is solved, and the frame allows for estimation from link flow to multiple OD flow characteristic parameters.
Owner:SHENZHEN Y& D ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products