Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

284 results about "Network size" patented technology

The network provides limits. For IP, the minimum size is 20 bytes. The maximum size is 65535, but almost all media limit that further, typically to 1500 bytes.

Method and apparatus for communication network cluster formation and transmission of node link status messages with reduced protocol overhead traffic

The present invention facilitates cluster formation within a communications network by utilizing network topology information to designate network nodes that are crucial for relaying traffic as cluster head nodes, while remaining network nodes are designated as member nodes. A beacon packet transmission rate of a network node or the interval between successive beacon packet transmissions by that node is adjusted by the present invention to facilitate cluster formation independent of network size and varying initial start times of network nodes. In addition, the present invention utilizes the above described cluster formation technique to form a three tier architecture for transmission or flooding of routing information from head node databases throughout the network. The cluster formation technique is applied to cluster head nodes to form an additional network tier of super nodes that distribute routing information, while cluster head nodes route network data traffic. The databases of cluster head nodes are examined subsequent to flooding of head node database information by super nodes, where data missing from a head node database is requested from a corresponding super node, thereby eliminating transmissions of acknowledgment messages.
Owner:STINGRAY IP SOLUTIONS LLC

Directional two-dimensional router and interconnection network for field programmable gate arrays, and other circuits and applications of the router and network

A configurable directional 2D router for Networks on Chips (NOCs) is disclosed. The router, which may be bufferless, is designed for implementation in programmable logic in FPGAs, and achieves theoretical lower bounds on FPGA resource consumption for various applications. The router employs an FPGA router switch design that consumes only one 6-LUT or 8-input ALM logic cell per router per bit of router link width. A NOC comprising a plurality of routers may be configured as a directional 2D torus, or in diverse ways, network sizes and topologies, data widths, routing functions, performance-energy tradeoffs, and other options. System on chip designs may employ a plurality of NOCs with different configuration parameters to customize the system to the application or workload characteristics. A great diversity of NOC client cores, for communication amongst various external interfaces and devices, and on-chip interfaces and resources, may be coupled to a router in order to efficiently communicate with other NOC client cores. The router and NOC enable feasible FPGA implementation of large integrated systems on chips, interconnecting hundreds of client cores over high bandwidth links, including compute and accelerator cores, industry standard IP cores, DRAM / HBM / HMC channels, PCI Express channels, and 10G / 25G / 40G / 100G / 400G networks.
Owner:GRAY RES LLC

RFID devices for verification of correctness, reliability, functionality and security

The present invention differs from the prior art in that the present invention provides one or a network of passive or active radio frequency identification (RFID) transceivers and antenna elements in different numbers, in various network sizes, in different configurations and on various substrates. The RFID transceiver can be co-located with standard semiconductor devices, for cost-effective circuit design and non-destructive fabrication test and analysis of integrated circuits and printed circuit boards after fabrication, and to locate, track and identify the integrated circuit, printed circuit boards and products in which they are implemented. The RFID transceivers can be coupled to substrates containing matter in gas, liquid, or solid form, such as medical devices like breast implants, for effective monitoring of the substrates to ensure that the substrate is in an unaltered state and the matter is still contained securely within. The RFID transceivers can be coupled to secure tapes of various lengths and widths and mesh bags or sheets of various sizes and they can be applied at the carton-level using them to locate, track and identify the integrated circuit, printed circuit boards and products in which they are implemented and/or the cartons in which they were placed.
Owner:EIGENT TECH

Mobile AD Hoc network self-adapting secure routing method based on reliability

The invention discloses a mobile AD Hoc network self-adapting secure routing method based on reliability. The method comprises the following four major steps: step I, a source node transmits data packets; step II, an intermediate node forwards the data packets; step III, a destination node receives the data packets; and step IV, the data packets are transmitted and confirmed and reliability is updated. The method integrates route discovery and data transmission into a whole process, each node evaluates the reliability of adjacent nodes reaching the destination node through a response feedbackmechanism, and independently makes a route decision according to reliability evaluation level, so that unreliable nodes are avoided and a reliable path is selected from a plurality of alternative paths, the method solves secure and reliable data transmission and symmetrical secret key transmission while solving secure routing discovery problem, and improves the security and the adaptability of the network. Compared with an existing AD Hoc network routing method, the method can resist attack to a greater extent on the basis that higher expense is not needed, still has good restorability when anetwork size is changed, nodes rapidly moves and even attack in a large scope exists and error of nodes exists, and is applicable to large-scale network with rapidly moving nodes. The method has a higher practical value and a wide application prospect in the technical field of mobile AD Hoc network security.
Owner:BEIHANG UNIV

Data center network topology system based on module expansion

InactiveCN102394782AMeet application development needsAchieving dynamic selectivityData switching networksFault toleranceNetwork size
The invention discloses a data center network topology system based on module expansion. And therefore, a problem that an expansion capability of tree topology of a data center is limited to the number of ports of a switch device and insufficiency of dynamic selectivity of a downlink can be solved. The implementation steps of system are as follows: an intermediate layer is introduced between a core layer and a convergence layer of a fat tree structure; a small network that is formed by connection of switches and servers of each of the layer is recorded as a basic module, so that a plurality of basic modules are constructed; four additional ports of switches of the core layer are utilized to connect all the basic modules to form a large whole network, so that a demand of construction of a data center network can be met and dynamic selection of a down link can be satisfied as well as a high halving bandwidth is provided; and lateral expanding, vertical expanding or mixing expanding is carried out on the network topology system as well as expansion of the network scale is supported flexibly. According to the invention, the system has a high network fault tolerance performance; more server devices can be accommodated; and a demand of application expansion in the future can be met; therefore, the system can be applied to construction of a data center network and high bandwidth data transmission can be provided.
Owner:XIDIAN UNIV

Cloud platform distributed system and method based on Internet and wifi mode

The invention discloses a cloud platform distributed system and method based on Internet and a wifi (Wireless Fidelity) mode. The system comprises an AP (Access Point) access layer, an access control management platform layer and a centralized management cloud service platform layer from top to bottom in sequence. Through adopting a layered management technology based on the cloud service, a wlan (Wireless Local Area Network) is taken as a wireless access technology and the Internet is taken as a carrier to implement a new cloud management system of the wlan. After a user terminal is connected to an AP access point, the centralized management cloud service platform layer pushes a webpage which is customized by a merchant so as to achieve an advertising effect. According to the distributed three-layer cloud structure, the flexibility of a wlan application is implemented, and plug and play of the AP access point can be implemented, so that the expansion capability and the flexibility of the system can be greatly improved, and the system can accomplish with ease under the modes of public cloud, private cloud and mixed cloud; owing to virtual sharing of a storage of a controller, the system can support a larger network scale as a representative of a latest generation of wireless networking technology.
Owner:WUHAN HONGXIN TELECOMM TECH CO LTD

Satellite wide-area quantum communication network system and communication method

The present invention provides a satellite wide-area quantum communication network system and a communication method. The invention aims to solve the technical problem of small network scales and short communication distances in the prior art. The network system includes a plurality of quantum trusted relays, a plurality of ground stations, a plurality of quantum terminals, a plurality of optical fiber quantum key distribution links and a plurality of free space quantum key distribution links, wherein the quantum trusted relays comprise quantum routers, satellites and quantum gateways, the optical fiber quantum key distribution links are used for realizing connections between the quantum gateways and the quantum routers and connections between the ground stations and the quantum routers, and the free space quantum key distribution links are used for realizing connections between the satellites and the ground stations and connections between the satellites. The communication method includes the following steps that: the quantum trusted relays negotiate with each other to obtain keys and store the keys, and the satellites and the ground stations negotiate with each other to obtain keys and store the keys; and the quantum terminals establish connections between each other and transmit information; a current node judges whether the information needs to be encrypted; the current node encrypts the information and transmits the encrypted information; and the quantum terminals release the connections therebetween.
Owner:XIDIAN UNIV

Medium access control (MAC) layer node scheduling method based on beacon frame synchronization and communication asynchronization

The embodiment of the invention discloses a listening period dynamic adjustment medium access control (MAC) layer node scheduling method based on the combination of beacon frame synchronization and communication asynchronization and relates to the technical field of wireless communication. According to the method, a coordinator periodically sends beacon frames to nodes and establishes a novel superframe and entire network synchronization, in the novel superframe period, each node is switched between sleeping / listening states in different periods respectively, and the coordinator and the nodes perform data communication and control transceiving of command frames in an asynchronous wake-up mode. The method is applicable to intelligent meter reading and intelligent housing system based on wireless sensor network. By means of the method, when the wireless sensor network is applied to a real-time monitoring scene in which the communication times are few, the data flow is low and the network size is small, the network communication and control energy consumption is reduced, the communication conflict rate is lowered, and the management capability of the network to the nodes is improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Clustering-wireless-sensor-network-orientated two-stage adaptive frequency-hopping method

The invention relates to a clustering-wireless-sensor-network-orientated two-stage adaptive frequency-hopping method. The method comprises the following steps of: constructing the clustering wireless sensor network; defining a super-frame structure based on institute of electrical and electronic engineer (IEEE) 802.15.4 according to the topological structure of the clustering wireless sensor network; accessing a format of a beacon frame of a control layer based on a medium of the original IEEE 802.15.4, and extending a content of a beacon frame load; and accessing the beacon frame of the control layer based on the super-frame structure and the extended medium of the IEEE 802.15.4 so as to realize a two-stage adaptive frequency-hopping process of a node in the network. By the clustering wireless sensor network, the network size is expanded, the difficulty in maintenance and management is lowered, and the system flexibility is improved; as the two-stage frequency-hopping method is designed, the compatibility with the IEEE 802.15.4 and the system reliability are guaranteed; and based on the beacon frame load of the IEEE 802.15.4, no special frame is not needed to be designed for a broadcast channel distribution result during a channel switching process, so that the network design is simplified, the number of the frames for controlling is reduced, and the network throughput is increased.
Owner:SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI

System and method for estimating network security situation based on index logarithm analysis

InactiveCN102148820AIntuitive calculation processEasy to understandData switching networksNetwork sizeConfidentiality
The invention discloses a system and method for estimating network security situation based on index logarithm analysis. The system is characterized by comprising a data acquisition sub-system, a network security situation understanding sub-system, a network security situation estimation sub-system and a security reinforcement scheme sub-system. The method comprises the following steps: A, carrying out statistical data fusion and correlation analysis on data of a network system in the aspects of asset, threat and vulnerability so as to obtain standardized data, wherein the data is acquired by a transducer; and B, carrying out the network security situation estimation on the fused standardized data in the step A based on the index logarithm analysis. The confidentiality, the integrity and the availability of the network security situation are estimated in the aspects of the asset, the threat and the vulnerability, and the estimation result is output. The system and method provided by the invention can be applied to the situation estimation and risk estimation. According to the system and method provided by the invention, the linear increment of the security situation can be avoided with the increment of network size, thus not only highlighting influences on security incidents with high hazard and significant assets, but also considering influences on security incidents with low hazard and nonsignificant assets, thereby complying with practical situations.
Owner:UNIV OF SCI & TECH OF CHINA

Statistical priority multiple access method for a high time-sensitive service

The invention discloses a statistical priority multiple access method for a high time-sensitive service. According to the method, it is assumed that a physical layer adopts frequency hopping and timehopping communication technologies, and frequency hopping and time hopping patterns are distributed to nodes firstly according to the network scale and service transmission requirements; The service load value of the logic channel corresponding to the frequency hopping and time hopping pattern is obtained by detecting the occupation condition of the pulse time slot, and the transmission thresholdvalues of various priority services are calculated by adopting a filling test method. And at the beginning of each network time frame, the sending node sequentially checks whether to-be-sent data packets exist in the network layer queue according to the priority order, and compares the service load values of the frequency hopping and time hopping patterns of the receiving nodes of the data packetswith the sending threshold value of the priority service. And if the service load value is smaller than the sending threshold value, the node can send the data packet with the priority according to the frequency hopping and time hopping pattern of the receiving node. A simulation result in an EXata network simulation environment proves that the method can reliably support transmission of the high-time-sensitivity service.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

System for automatically analyzing computer network connectivity

The invention discloses a system for automatically analyzing computer network connectivity, wherein the system acquires the connectivity of any two hosts alive in a network by analyzing configuration files of a device (which is mainly a firewall) influencing the connectivity in the network, and comprises a human-machine interaction part, an information acquisition part, an information preprocessing part, a core analysis part and a connected graph drawing part. The human-machine interaction part is used for realizing the interaction between a user and system information; the information acquisition part is used for completing the acquisition of the configuration files of the firewall and the detection of hosts alive in the network; the information preprocessing part is used for preprocessing information acquired by the information acquisition part; the core analysis part is used for analyzing a result generated by the information preprocessing part and acquiring the connectivity information between any two hosts alive; and the connected graph drawing part is used for drawing a network connected graph. The system disclosed by the invention is high in operating speed and basically free from network scale, can be applied to large-scale networks and further has the advantages of high automation degree, wide application range and strong expandability.
Owner:SHANGHAI JIAO TONG UNIV

Large-scale interconnected power grid spinning reserve risk assessment method based on state space division method

The invention provides a large-scale interconnected power grid spinning reserve risk assessment method based on a state space division method Along with the appearance of a large-scale interconnected power grid, the quantity of elements of a power grid system is sharply increased, and the network scale is further complicated, thus the traditional reserve risk assessment method cannot meet the development requirements of the large-scale interconnected power grid, has the problems of curse of dimensionality in the aspect of state selection and inability of assessment in the aspect of state analysis, and can be influenced by transmission capacity restraint of area connecting lines. In the invention, the system state is selected by using a state space division method and analyzed by using a load reduction technology based on linear programming, thus the method better solves the problems of huge system scale and transmission capacity restraint of the area connecting lines in the spinning reserve risk assessment, realizes the quick and precise calculation of a spinning reserve risk index of the large-scale interconnected power grid, can provide real-time system spinning reserve information for personnel of a dispatching system, is beneficial for the dispatching personnel to taking effective measures in time, improves the reliability level of the system, and reduces the power-off risk of the system.
Owner:CHINA ELECTRIC POWER RES INST +1

Fault early warning method of gearbox of wind turbine generator set

The invention discloses a fault early warning method of a gearbox of a wind turbine generator. The early warning method mainly includes the following steps of data acquisition, wherein a terminal acquires the historical data of wind turbine generator power, environment temperature and wind speed through a hard contact temperature sensor, a soft contact temperature sensor and a temperature acquisition card arranged in the gearbox or calls the historical data of wind turbine generator power, environment temperature and wind speed from wind power plant recorded data, and the time span of the datacovers the whole fault evolution section; data processing, wherein input data is normalized, the integrity of the input data is verified, abnormal data and incomplete data are deleted from the inputdata, a BP neural network including an AIS-SA hybrid network prediction algorithm is established, and then the network size and various initial connection weights and thresholds are determined; earlywarning calculation, wherein the acquired temperature data is predicted through the optimized network, the wind speed is subjected to approximate substitution in combination with numerical weather prediction, a temperature prediction conversion curve in a certain future time is obtained, the residual of predicted temperature and actual temperature is calculated, and with several recording points as an early warning section, the residual mean and standard deviation of the two temperatures in the section are worked out.
Owner:SHANGHAI DIANJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products