Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

83 results about "Link flow" patented technology

Characterizing achievable flow rates in multi-hop mesh networks with orthogonal channels

A method of routing data from a source node to a destination node in a multi-hop network of nodes interconnected by links comprises: (a) determining that a link-flow vector satisfies one or more necessary scheduling conditions for achievability, wherein the link-flow vector represents a set of flows to be routed on one or more links from the source node to the destination node; (b) generating a scheduling multi-graph for the network, wherein the scheduling multi-graph comprises a graph having at least one pair of nodes with multiple edges therebetween; (c) deriving one or more sufficient scheduling conditions for achievability of the link-flow vector by edge-coloring the scheduling multi-graph; (d) solving a linear optimization problem over the one or more necessary scheduling conditions to obtain an upper bound on the achievability of the link-flow vector; (e) generating, based on the scheduling multi-graph, a solution comprising a set of routes and an associated schedule for achieving the link-flow vector, the solution being a lower bound on the achievability of the link-flow vector; and (f) implementing a routing method using the set of routes and the associated schedule to route the link-flow vector from the source node to the destination node. At least one node v of the network is adapted to receive transmissions from a specified plurality Ω(v) of other nodes, and at least one of the scheduling conditions depends on Ω(v).
Owner:ALCATEL-LUCENT USA INC +1

System and method for regulating message flow in a digital data network

InactiveUS7283471B2Fairness among all virtual circuits for buffer resourcesStop transmissionError preventionFrequency-division multiplex detailsDigital dataPathPing
A system includes a plurality of computers interconnected by a network including one or more switching nodes. The computers transfer messages over virtual circuits established thereamong. A computer, as a source computer for one or more virtual circuit(s), schedules transmission of messages on a round-robin basis as among the virtual circuits for which it is source computer. Each switching node which forms part of a path for respective virtual circuits also forwards messages for virtual circuits in a round-robin manner, and, a computer, as a destination computer for one or more virtual circuit(s), schedules processing of received messages in a round-robin manner. Round-robin transmission, forwarding and processing at the destination provides a degree of fairness in message transmission as among the virtual circuits established over the network. In addition, messages are transmitted in one or more cells, with the round-robin transmission being on a cell basis, so as to reduce delays which may occur for short messages if a long messages were transmitted in full for one virtual circuit before beginning transmission of a short message for another virtual circuit. For each virtual circuit, the destination computer and each switching node along the path for the virtual circuit can generate a virtual circuit flow control message for transmission to the source computer to temporarily limit transmission over the virtual circuit if the amount of resources being taken up by messages for the virtual circuit exceeds predetermined thresholds, further providing fairness as among the virtual circuits. In addition, each switching node or computer can generate link flow control messages for transmission to neighboring devices in the network to temporarily limit transmission thereto if the amount of resources taken up by all virtual circuits exceeds predetermined thresholds, so as to reduce the likelihood of message loss.
Owner:AVAGO TECH INT SALES PTE LTD

Satellite MPLS (multi-protocol label switching) network flow rate balancing method based on SDN (software defined network) controller

The invention discloses a satellite MPLS (multi-protocol label switching) network flow rate balancing method based on an SDN (software defined network) controller. An SDN controller is put on a network edge; the control plane of network equipment is separated from the data plane; the functions of the control plane are concentrated onto a special controller, so that the equipment complexity in the network is reduced. The data plane and the control plane are decoupled, and an SDN obtains great flexibility, so that the network has the characteristics of high expandability, easy maintenance, programmable performance and open performance. According to the method, the SDN controller peripherally collects network topology and network state information from a router/interchanger in a data plane through an OpenFlow protocol of a southbound interface; through calculation, the available bandwidth condition of each link is obtained, so that whether the path jam occurs or not is judged; whether the flow rate dispatching is needed or not is judged; the goal of collecting and analyzing the whole network flow rate distribution condition in real time is achieved; the link flow rate is reasonably deployed, so that the flexible control of the network flow rate is realized; in addition, the bandwidth resource utilization rate can be better improved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Quality random inspection execution process supervision system

InactiveCN106408173ARaise the level of innovation and developmentSatisfies the requirement of "inverting the burden of proof" for the administrative act of evidence fixationResourcesCommerceTTEthernetNetwork connection
The invention relates to a quality random inspection execution process supervision system. With a B/S architecture adopted, a supervisor monitors and manages an execution process through adopting mobile Internet technologies and by means of a supervision server, namely, a supervision port, which is constructed through a browser, a server or the like, and a mobile phone or special execution terminal used by field execution staff, such as a mobile phone equipped with special application software; the supervision server of the system is provided with a recording database and a random inspection process supervision module; the execution terminal is in network connection with the supervision port so as to carry out sampling/sample purchase planning, task reception, download and information inputting of various steps of a random inspection execution process; the information acquisition of the solidified flow of the random inspection execution process can be obtained through the solidified sampling/sample purchase link flow module of the execution terminal; and the field random inspection staff carries out random inspection process execution and stores information and evidences of each step through using the application of the mobile phone or special execution terminal application.
Owner:邱霓 +1

Fast flow control methods for communication networks

Reverse link flow control in a high data rate network determines current reverse link data channel rates for access terminals served by a network sector to identify corresponding defined channel gains, which are used to rapidly and reliably estimate total sector interference on the reverse link. Total sector interference indicates reverse link capacity utilization, and when remaining capacity approaches a defined threshold, the sector sets an activity indicator to a busy state indicating reverse link congestion. This action causes at least some access terminals to reduce their reverse link data channel rate. Interference calculation techniques preferably involve baseband digital processing using defined channel gains, permitting rapid evaluation of reverse link capacity and quick, reliable activity indicator updating, which increases reverse link capacity utilization. These techniques may be applied to inter-sector control, wherein the reverse activity indicator status for one sector depends on interference in one or more other sectors.
Owner:OPTIS WIRELESS TECH LLC

Network anomaly flow detection and defense system based on SDN (software defined networking)

ActiveCN106357622AEasy to useNo usability issuesTransmissionAnomaly detectionNetwork control
The invention provides a network anomaly flow detection and defense system based on SDN (software defined networking). The SDN is quite different from a traditional network for detecting anomaly flow, a traditional detection method is enabled to be inapplicable, and with the application of the thought of separating a network control plane and a data plane, a new solution is provided for research and development of novel network applications and treatment of network security problems by the SDN. Based on the characteristics of centralized control and the like of an SDN structure, real-time flow monitoring is realized at the attack source, a multi-defense system is formed by adopting source IP anti-counterfeiting, access layer anomaly detection and link flow anomaly detection, anomaly flow is gradually filtered, and detection and defense for network layer DDoS (distributed denial of service) attacks at the source end are realized.
Owner:BEIJING UNIV OF TECH

Crossroad dynamic turning proportion two-step prediction method based on double Bayes

The invention discloses a crossroad dynamic turning proportion two-step prediction method based on double Bayes. According to the crossroad dynamic turning proportion two-step prediction method, a first Bayes combination method is designed by means of link flow detected by entries and exits at a crossroad and with combination of history flow data to predicate entry and exist flow in the next time period, an improved Kalman filtering algorithm and an improved counterpropagation neural network algorithm are designed based on the entry and exist flow in the next time period to predicate dynamic turning proportion of the next first time period and the next second time period, a second Bayes combination method is designed under the conditions that predication errors are corrected through history turning proportion data to calibrate and update weight dynamically, and dynamic turning proportion one-step and two-step prediction values of double Bayes combination methods can be obtained. By means of the existing method, dynamic turning proportion one-step value can be obtained only, and the existing method has advantages and disadvantages in precise and efficiency. The crossroad dynamic turning proportion two-step prediction method comprehensively has the advantages of all methods, avoids local overhigh deviation, is high in precision, and can obtain one-step and two-step prediction values simultaneously and provide basis supporting for an intelligent traffic control system.
Owner:BEIJING UNIVERSITY OF CIVIL ENGINEERING AND ARCHITECTURE

Positive feedback ethernet link flow control for promoting lossless ethernet

An Ethernet node includes a receiver and transmitter for coupling to an Ethernet link for transceiving Ethernet frames with a remote Ethernet node at a remote end of the Ethernet link. The Ethernet node sends to the remote Ethernet node credit information that enables the remote Ethernet node to know an amount of Ethernet frames the remote Ethernet node is allowed to send to the Ethernet node. The credit information may be specified on a VLAN priority basis and may be included in a header piggy-backed on a host Ethernet frame or may be included in an explicit frame. The credit information may incrementally replenish credits or may specify an absolute credit amount and may be sent in response to processing frames, detection of a frame error, receipt of a request from the remote node or other events.
Owner:AVAGO TECH INT SALES PTE LTD

Trust management system based trusted reconstructing method of IP routing protocol

InactiveCN101888328AFusion of trust valueData switching networksPacket lossNetwork topology
The invention discloses a trust management system based trusted reconstructing method of an Open Shortest Path First (OSPF) routing protocol, which comprises the following steps of: (1) before each router is added into a network, registering to the trust management system, and sending corresponding trust certificates to the routers by the trust management system, the trust certificates including comprehensive trust values of the routers and each being calculated according to safe parameters and configuration parameters of the routers and all the subjective trust value of the neighbor router to the routers by the trust management system; (2) transferring the trust certificates among the routers through hello information, wherein an adjacency relation is not established for the router without the trust certificate, all the routers in the network are ensured to have own trust certificates; (3) each router calculating the subjective trust value of the neighbor router based on network real time parameters including link flow, packet loss probability, retardation, transmission rate of the packet and reliability of the packet, during an interactive work with the neighbor router, calculating a total trust value of the neighbor router by using the comprehensive trust value and the subjective trust value of the neighbor router, and modifying a metric field of a link-state announcement Router_LSA packet as the total trust value and synchronizing a link-state data base;(4) modifying a Dijkstra algorithm, using a reciprocal of the total trust value between the routers as the parameter for the arithmetic computation, selecting the router with higher trust value to generate a shortest path tree, and forming a trust routing list; (5) periodically reporting the subjective trust value of the neighbor routers to the trust management system by each router, simultaneously obtaining the parameter required for computing the subjective trust value, updating the trust certificate of each router at fixed time, and eliminating the router with the overdue trust certificate out of the network to maintain the topological structure of the whole network.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Route protection converting method and device

The invention relates to a route protection converting method and device. The route protection converting method comprises the following steps of: configuring a three-layer virtual interface bound with a two-layer VPN (Virtual Private Network) on device nodes of two ends of the two-layer VPN; establishing a protection group relation between a protection route and a protected route according to the binding relation of the two-layer VPN and the three-layer virtual interface; and converting a link flow rate from the protected route to the protection route through the three-layer virtual interface according to the protection group relation when a protected link has failure. According to the route protection converting method disclosed by the invention, through the three-layer virtual interface ARP (Address Resolution Protocol) protection policy, without changing an original network topology and two/three-layer domain partition, the protection of an over two-layer network domain on a three-layer network domain route is realized, a problem of flow interruption of the three-layer route at the two/three-layer network connection caused by DOWN (Direct Memory Access Controller) is solved, and additional devices and a hardware lookup operation do not need to be additionally arranged; and in addition, the expandability of a network structure is improved, the network complexity is reduced and the maintenance cost is saved when conversion performances are ensured.
Owner:ZTE CORP

Method and system for cell dispatching

The invention discloses a method and a system for cell dispatching. The method comprises the following steps: for each cell link cache unit on each input interface of switching equipment, when flow rate of cells stored in the cell link cache unit is larger than or equal to the preset threshold of cell flow, the switching equipment performs link flow control operation to uplink switched access equipment, so as to control the switched access equipment to send cell flow to the switching equipment. The cell link cache unit comprises a unicast cell link cache unit for storing unicast cells and a multicast cell link cache unit for storing multicast cells. The switching equipment executes cell switching operation to the stored unicast and multicast cells, and sends the unicast and multicast cells which have received cell switching operation at each output port. By adopting the invention, congestion between unicast operation and multicast operation is avoided, the data switching efficiency is improved, and the system resource is saved.
Owner:SANECHIPS TECH CO LTD

Scheduling method of network-on-chip router based on network information

InactiveCN102546417AReduce latencyMitigate situations where multiple router nodes are blockedData switching networksNetworks on chipLink flow
The invention discloses a scheduling method of a network-on-chip router based on network information, and mainly solves the problem that the router has limited buffer space and longer grouping time so as to seriously block a network. The scheduling method is finished through two stages as follows: at the first stage, an input arbitration unit selects an input queue as a response queue according to the three parameters, namely hop count from a source node to a destination node, the hop count from a current node to the destination node and lock virtual channel number of a local input port; and at the second stage, an output arbitration unit selects according to the three parameters, namely, the lock virtual channel number of an output link, the hop count from the source node to the destination node and the hop count from the current node to the destination node, and a best transmission path is selected between an input port and an output port grouped on the network-on-chip router through the scheduling of two stages. The scheduling method provided by the invention has the advantages of low time delay, high throughput and balanced grouping link flow, and can optimize distribution of an inner path of the network-on-chip router.
Owner:陕西光电子先导院科技有限公司

Method for controlling up-link flow

The invention provides a of ascending flow control method, the key lies in that the establishment of a gradual factor, take the product of IUB residual flow of base stations nodes (NodeB) and gradual factor as a control to distribute IUB flow incremental value to user equipment (UE). NodeB first obtain the predistribute IUB flow incremental value according to the flow scheduling algorithm, and calculate the empty flux according to size information of data packet the UE uploaded; NodeB obtains the IUB flow incremental value distribute to UE according to empty flow, gradual factor and predistribute IUB flow incremental value, finally notice to UE the distributed IUB incremental flow value. Use the scheme of this invention can gradually release the remaining IUB flow resources, control the distribution of IUB incremental flow value to UE, balance empty flow and IUB flux, prevent obstruction of IUB interface and overflows the cache phenomenon.
Owner:XFUSION DIGITAL TECH CO LTD

Neural network-based low amplitude network flow anomaly detection method

InactiveCN102075383AAvoid the impact of the detection stepGood for concealing traffic anomaliesError preventionData switching networksNerve networkAlgorithm
The invention discloses a neural network-based low amplitude network flow anomaly detection method. In the method, a neural network module comprises a second multilayer recurrent neural network and a first multilayer recurrent neural network, the input of the second multilayer recurrent neural network is directly measurable link flow, and the output of the second multilayer recurrent neural network is the estimated flow of part of origin-destination (OD) flow; and the input of the first multilayer recurrent neural network is the link flow and the estimated flow of the part of OD flow, which is output by the second multilayer recurrent neural network and serves as supplementary constraint input, and the output of the first multilayer recurrent neural network is the estimated value of a characteristic parameter. In the invention, the step of inversion from a link to the OD flow is skipped, so the influences of errors generated in a prediction process on a detection step are avoided effectively, and the real-time prediction of the OD flow correlation at next moment can be provided. When the method is used, the detection of hidden flow anomaly is easier, the detection process does not completely rely on the estimation from the link to the OD flow any more, the problem that the inversion error influences the detection is solved, and the frame allows for estimation from link flow to multiple OD flow characteristic parameters.
Owner:SHENZHEN Y& D ELECTRONICS CO LTD

Road OD data reconstruction method

Provided is a road OD data reconstruction method. The method comprises: OD reconstruction basic data demand analysis, a priori OD matrix, a link flow distribution matrix obtained by traffic distribution, and link counting data obtained by traffic detection points being the OD reconstruction basic data; OD reconstruction model and algorithm, using a checking method of an inspection region and a maximum entropy principle as theoretical basis of model establishment, and using the predicted priori matrix, an updated distribution model, and link counting data of the traffic detection points as basic data, to establish a base year OD process model and provide a corresponding solution algorithm. The method corrects the predicted OD through traffic flow data obtained by simple traffic detection equipment or observation stations, to obtain brand new base year OD data, and realize OD reconstruction based on checking and a prediction model. The method provides real-time dynamic traffic basic datafor transportation planning, construction and management, improves traffic construction and management informationization level, provides basis for traffic detection point layout.
Owner:SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products