Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

51 results about "Symmetric network" patented technology

Traversal of symmetric network address translator for multiple simultaneous connections

Handling of multiple connections during NAT traversal for a node behind a symmetric NAT is disclosed. The likelihood of connection failure during symmetric NAT traversal may be reduced by serializing critical time windows after port prediction. Once port prediction has begun for a first connection, port prediction for a subsequent connection may be delayed until a connectivity check has begun for the first connection. This process may be repeated to handle NAT traversal for multiple simultaneous connections to different nodes.
Owner:SONY COMPUTER ENTERTAINMENT INC

Construction method of time-delay-constrained energy consumption balance data acquisition tree in WSN (Wireless Sensor Network)

The invention relates to a construction method of a time-delay-constrained energy consumption balance data acquisition tree in a WSN (Wireless Sensor Network). The construction method comprises the following steps: a data sink node calculates a weight of a node pair subjected to symmetrical network communication according to network topology information; the data sink node calculates shortest weighted paths from all nodes in the network to the data sink node, wherein a set of the shortest weighted paths forms a minimum weighted energy consumption generation tree; finding out the nodes in the minimum weighted energy consumption generation tree, which do not meet network time-delay limit, and calculating a corresponding topology adjusting scheme for each node as a candidate topology adjusting scheme; finding out one scheme with minimum adjustment on node transmission power from all the candidate topology adjusting schemes, and reconstructing the generation tree; and judging whether the nodes which do not meet hop count limit exist in the network, if so, continuously adjusting, and if not, ending the algorithm, wherein the generated generation tree is the final network topology result. According to the construction method disclosed by the invention, data effectiveness requirement is met, and energy consumptions of the nodes in the network are balanced.
Owner:SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI

Method of reducing media relay of a network address translation apparatus

A method of reducing media relay of a network address translation (NAT) apparatus involves detecting a network type of a user agent (such as a network address port translator) to determine whether the user agent is a symmetric network type; if it is, a transmitting server is still required to relay a media stream; if it is not, a SIP standard structure and its communication protocol are utilized for changing a network address and its connecting port of an ‘invite’ packet via a proxy server so that the caller and the callee will send the media stream according to the changed network address and its connecting port.
Owner:INSTITUTE FOR INFORMATION INDUSTRY

Method for realizing intranet penetration by using Internet group management protocol (IGMP) and intranet penetration system

The invention discloses a method for realizing intranet penetration by using an Internet group management protocol (IGMP), and aims to overcome the shortcoming that a system using a Symmetric network address translator (NAT) cannot actively access another terminal by using one terminal. The method mainly comprises the following steps that: a first terminal transmits a request to a server, and is kept to be connected with the server; a second terminal transmits an IGMP message, establishes a multicast domain, is classified into a group, locally establishes a user datagram protocol (UDP) socket and performs snooping on a port; the second terminal transmits a multicast domain value and a port value to the server, and initiates an access request; the server forwards the access request to the first terminal; and the first terminal transmits data to a second router, and the second router forwards the data to the second terminal. The invention also discloses an intranet penetration system, which comprises at least two terminals, a router and the server. The method is applied to various systems of which each accesses another terminal by using one terminal, particularly to the system using the Symmetric NAT.
Owner:SHENZHEN GONGJIN ELECTRONICS CO LTD

Communicating using the port-preserving nature of symmetric network address translators

Methods for establishing connections between computing devices when the computing devices are behind Network Address Translators (NATs). Embodiments of the present invention are directed to enabling a first client computer to communicate with a second client computer when both client computers are positioned behind NATs, wherein at least one of the NATs is a port-preserving NAT.
Owner:MICROSOFT TECH LICENSING LLC

Network crossing method, device and system

An embodiment of the invention provides a network crossing method, device and system to achieve effective network crossing, particularly the network crossing of symmetric network address transmission (NAT) under the condition that network deployments are not changed. The network crossing method comprises that an NAT device receives a real time protocol (RTP) interaction message from a first terminal, the destination internet protocol (IP) address of the RTP interaction message is the public network IP address of a second terminal, and the destination port of the RTP interaction message is the private network port number of the second terminal; the NAT device searches a license rule corresponding to the destination port number according to the destination port number and forwards the RTP interaction message to the second terminal.
Owner:GUIYANG LONGMASTER INFORMATION & TECHNOLOGY CO LTD

Network and Method for the Configuration Thereof

A method and corresponding apparatus is provided for determining the location of a configuration server being connected to a totally symmetric network infrastructure that does not exhibit any symmetry breakers on network level. The configuration server reaches a decision to determine its network-wide unique configuration in order to be able to serve controllers. This decision depends on the plug position of the configuration server under consideration and the assumption of plugging rules governing a “good” network infrastructure. The controllers periodically send network packets that will be marked if they traverse specific connection elements in the network. The origin and the path of a network packet can be determined. The decision making is based on a majority function based on the packets received by the configuration server. If a decision cannot be made, then errors in the cabling structure can be detected.
Owner:LENOVO GLOBAL TECH INT LTD

Micro differential filter based on T-shaped branch line structure

The invention discloses a novel patch topological structure, particularly relates to a micro differential filter based on the T-shaped branch line structure and belongs to the microwave communicationfield. The differential filter comprises four T-shaped resonators and the input and output of the feeder. The micro differential filter of the T-shaped branch line structure mainly employs a one-endshort circuit T branch and an open circuit T branch to design a filter microstrip line. According to the micro differential filter, the complementary symmetric network is utilized to analyze the differential filter, not only because the complementary symmetric network has characteristics of low loss and no mode power conversion, but also because any four-port networks can be seen as two-port differential mode signals and two-port common-mode signals. The micro differential filter is advantaged in that a tap-type feeding mode is employed, firstly, insertion loss can be reduced, impact of external factors on filter performance is reduced, and signal transmission capabilities are enhanced; and secondly, a feed line and a transmission line form a stepped impedance resonator, frequency responsecan be improved through adjusting the impedance ratio, and realization of miniaturization requirements is facilitated.
Owner:SHANGHAI MARITIME UNIVERSITY

Method for realizing intranet penetration by using Internet group management protocol (IGMP) and intranet penetration system

ActiveCN102420774BRealize intranet penetrationGood effectTransmissionComputer terminalUser Datagram Protocol
The invention discloses a method for realizing intranet penetration by using an Internet group management protocol (IGMP), and aims to overcome the shortcoming that a system using a Symmetric network address translator (NAT) cannot actively access another terminal by using one terminal. The method mainly comprises the following steps that: a first terminal transmits a request to a server, and is kept to be connected with the server; a second terminal transmits an IGMP message, establishes a multicast domain, is classified into a group, locally establishes a user datagram protocol (UDP) socket and performs snooping on a port; the second terminal transmits a multicast domain value and a port value to the server, and initiates an access request; the server forwards the access request to the first terminal; and the first terminal transmits data to a second router, and the second router forwards the data to the second terminal. The invention also discloses an intranet penetration system, which comprises at least two terminals, a router and the server. The method is applied to various systems of which each accesses another terminal by using one terminal, particularly to the system using the Symmetric NAT.
Owner:SHENZHEN GONGJIN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products