Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

500 results about "On-Protocol" patented technology

In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities.

Power saving via physical layer address filtering in WLANs

A system and method is described for saving power in a wireless network, using a physical layer address filtering protocol based on a partial address subset of the complete destination MAC address. The system comprises a PHY layer filtering protocol for generating the partial address and writing the partial address into a PHY layer header portion (e.g., PLCP header) of a sending station, or reading the partial address from the PHY layer header portion upon transmission of each frame. A receiving station receives and decodes these PHY layer header portion bits, in accordance with the protocol, and compares whether the subset of bits match that of the stations' own partial address. If a station finds a match, the station then continues further decoding the frame at PHY layer and send the complete frame to the MAC layer for further processing. The stations that do not have a match will not activate their MAC layer components. Thus, the stations of the network will avoid wasting power decoding a significant portion of the complete frame of other stations of the wireless local area networks and unnecessary MAC layer processing. When group addressed, control/management frames or other such frames are detected at the sending station, the address filtering protocol may be “disabled” using a partial address containing a predetermined value (e.g., all zeros).
Owner:TEXAS INSTR INC

Power saving via physical layer address filtering in WLANs

A system and method is described for saving power in a wireless network, using a physical layer address filtering protocol based on a partial address subset of the complete destination MAC address. The system comprises a PHY layer filtering protocol for generating the partial address and writing the partial address into a PHY layer header portion (e.g., PLCP header) of a sending station, or reading the partial address from the PHY layer header portion upon transmission of each frame. A receiving station receives and decodes these PHY layer header portion bits, in accordance with the protocol, and compares whether the subset of bits match that of the stations' own partial address. If a station finds a match, the station then continues further decoding the frame at PHY layer and send the complete frame to the MAC layer for further processing. The stations that do not have a match will not activate their MAC layer components. Thus, the stations of the network will avoid wasting power decoding a significant portion of the complete frame of other stations of the wireless local area networks and unnecessary MAC layer processing. When group addressed, control / management frames or other such frames are detected at the sending station, the address filtering protocol may be “disabled” using a partial address containing a predetermined value (e.g., all zeros).
Owner:TEXAS INSTR INC

Method of data reliable transmission with user datagram protocol (UDP) in communication network

The invention provides a method of data reliable transmission with a user datagram protocol (UDP) in a communication network. The method comprises that firstly, connecting handshake is carried out between a data packet sending end and a data packet receiving end, a communication layer of the data packet sending end informs an application layer that a reliable transmission channel is built; in a data packet transmission process, the communication layer of the data packet sending end detects a channel state of the transmission channel through a heartbeat mechanism, and if the channel state changes, the application layer is informed. The method has strong adaptability and can be used for the communication network which is large in transmission delay difference. A mutual-informing mode is used between the application layer and the communication layer of the sending end, the application layer and the communication layer are in mutual independence and also a unified whole, data reliable transmission is achieved, and meanwhile the problem that when the transmission channel is in fault, the uninformed application layer sends data to the communication layer continuously and resources are consumed is avoided. According to the method, the communication layer of the receiving end transmits a data packet to the application layer directly according to protocol header information to activate task scheduling, and the method has more advantages than a polling scheduling strategy and a callback scheduling strategy.
Owner:EASTERN COMM

Web-based enterprise management with multiple repository capability

A transport neutral technique allows an object manager to communicate with a CIM repository using any of a variety of protocols. The object manager software is independent of the transport mechanism used and need not be changed if the transport mechanism changes. A computer system to be managed includes a CIM object manager and any number of provider APIs that provide resource information about the computer system. A CIM repository stores classes and instances used by the object manager. A remote application computer runs a software management application that communicates with the object manager of the computer system using a local client API. A Repository API of the object manager includes an interface definition defining all methods called by the object manager. Also included is a protocol-specific class that implements the interface definition; there is a protocol-specific class for each protocol desired to be supported. Each class implements methods using a specific protocol. A factory class is executed when the object manager invokes a method call passing in a desired protocol parameter. The factory class creates a protocol-specific object of one of the protocol-specific classes depending on the protocol parameter. The object is returned to the object manager which executes one of its protocol-specific methods thus allowing communication to a repository using a protocol independent of the object manager.
Owner:ORACLE INT CORP

Network application encrypted traffic recognition method and device based on protocol attributes

The invention relates to a network application encrypted traffic recognition method and device based on protocol attributes, and belongs to the technical field of computer network service security. The device comprises an offline training module and an online identification module. The offline training module is composed of a data set obtaining module, a message type fingerprint establishment module based on a second order Markov chain and a certificate length clustering module. A training set is obtained through a data set obtaining module. Application fingerprints are obtained and stored according to the training set by the message type fingerprint establishment module based on the second order Markov chain; clustering results and application certificate cluster distribution probability are obtained and stored according to the training set by the certificate length clustering module. The offline training module is composed of a network traffic capturing module and a recognition module. The recognition module matches the network traffic obtained by the capturing module with a stored application fingerprint library one by one; moreover, the certificate clustering results are taken into consideration, thus obtaining a recognition probability; the recognition result is an application corresponding to the highest probability. Compared with the prior art, the method and the device have the advantage of improving the recognition accuracy and efficiency.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products