会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Aggregating ports while allowing access to singleton ports
    • 聚合端口,同时允许访问单一端口
    • US08320386B2
    • 2012-11-27
    • US12578000
    • 2009-10-13
    • Qi BaoGeorge A. HarveyGerald R. JohnsonWhay C. LeeTed R. Michaud
    • Qi BaoGeorge A. HarveyGerald R. JohnsonWhay C. LeeTed R. Michaud
    • H04L12/56
    • H04L45/00H04L45/16H04L45/245H04L45/48Y02D50/30
    • Disclosed is a method for aggregating parallel data links connecting two end-point devices into a logical link. If one of the parallel data links is a multi-point link, then an end-point device can still access that link to route traffic to an end station on the link (that is, to a device other than the other end-point device of the logical data link). In the terminology of this disclosure, the logical aggregated link is accessed through an “aggregated port” on an end-point device, while the constituent multi-point link is accessed directly through a “singleton port.” By assigning a smaller cost to the aggregated port than to the singleton port, embodiments avoid creating routing loops. In some embodiments, the aggregation is performed at Layer 2 of the Open System Interconnection seven-layer protocol model. Then, the methods of the present invention work well with existing IEEE 802.1 bridging architectures and protocols.
    • 公开了一种用于将连接两个端点设备的并行数据链路聚合成逻辑链路的方法。 如果并行数据链路之一是多点链路,则端点设备仍然可以访问该链路以将流量路由到链路上的终端站(即,到另一端点设备之外的设备 的逻辑数据链接)。 在本公开的术语中,逻辑聚合链路通过端点设备上的聚合端口被访问,而组成的多点链路通过单一端口直接访问。 通过为聚合端口分配比单端口更小的成本,实施例避免创建路由环路。 在一些实施例中,聚合在开放系统互连七层协议模型的层2处执行。 然后,本发明的方法与现有的IEEE 802.1桥接架构和协议一起工作良好。
    • 2. 发明申请
    • AGGREGATING PORTS WHILE ALLOWING ACCESS TO SINGLETON PORTS
    • 在允许进入SINGLETON PORTS的聚会地点
    • US20110085562A1
    • 2011-04-14
    • US12578000
    • 2009-10-13
    • Qi BaoGeorge A. HarveyGerald R. JohnsonWhay C. LeeTed R. Michaud
    • Qi BaoGeorge A. HarveyGerald R. JohnsonWhay C. LeeTed R. Michaud
    • H04L12/56
    • H04L45/00H04L45/16H04L45/245H04L45/48Y02D50/30
    • Disclosed is a method for aggregating parallel data links connecting two end-point devices into a logical link. If one of the parallel data links is a multi-point link, then an end-point device can still access that link to route traffic to an end station on the link (that is, to a device other than the other end-point device of the logical data link). In the terminology of this disclosure, the logical aggregated link is accessed through an “aggregated port” on an end-point device, while the constituent multi-point link is accessed directly through a “singleton port.” By assigning a smaller cost to the aggregated port than to the singleton port, embodiments avoid creating routing loops. In some embodiments, the aggregation is performed at Layer 2 of the Open System Interconnection seven-layer protocol model. Then, the methods of the present invention work well with existing IEEE 802.1 bridging architectures and protocols.
    • 公开了一种用于聚合将两个端点设备连接成逻辑链路的并行数据链路的方法。 如果并行数据链路之一是多点链路,则端点设备仍然可以访问该链路以将流量路由到链路上的终端站(即,到另一端点设备之外的设备 的逻辑数据链接)。 在本公开的术语中,逻辑聚合链路通过端点设备上的“聚合端口”来访问,而组成的多点链路通过“单一端口”直接访问。通过将更小的成本分配给 聚合端口比单端口,实现避免创建路由环路。 在一些实施例中,聚合在开放系统互连七层协议模型的层2处执行。 然后,本发明的方法与现有的IEEE 802.1桥接架构和协议一起工作良好。
    • 3. 发明授权
    • Policy based intelligent data placement
    • 基于策略的智能数据放置
    • US09032061B1
    • 2015-05-12
    • US13398163
    • 2012-02-16
    • Qin XinFeng ZhangQi Bao
    • Qin XinFeng ZhangQi Bao
    • G06F15/173H04L12/28
    • H04L12/283H04L67/1097H04L69/40
    • A technique performs policy-based intelligent data placement in an electronic environment. The technique involves selecting, from a pool of candidate local area networks (LANs) of the electronic environment, a plurality of LANs within which to store the data based on a set of policy priority levels assigned to the data. The technique further involves generating a set of information elements (e.g., data fragments, erasure codes, etc.) from the data, and placing the set of information elements on storage nodes of the plurality of LANs. Such a method enables the data to be stored in a distributed manner and alleviates the need for a central storage facility. Since the data is distributed among the storage nodes of the plurality of LANs, system capacity and infrastructure is able to grow (i.e., scale) in a manner which does not create a problematic bottleneck.
    • 一种技术在电子环境中执行基于策略的智能数据放置。 该技术涉及从电子环境的候选局域网(LAN)池中选择多个LAN,其中基于分配给数据的一组策略优先级来存储数据。 该技术还包括从数据生成一组信息元素(例如,数据片段,擦除代码等),以及将该组信息元素放置在多个LAN的存储节点上。 这种方法能够以分散的方式存储数据,并且减轻对中央存储设施的需要。 由于数据分布在多个LAN的存储节点之间,所以系统能力和基础设施能够以不产生有问题的瓶颈的方式增长(即缩放)。
    • 4. 发明授权
    • Network-assisted routing for topology-aware overlay networks
    • 用于拓扑感知覆盖网络的网络辅助路由
    • US08861527B1
    • 2014-10-14
    • US13407980
    • 2012-02-29
    • Qi BaoFeng ZhangQin Xin
    • Qi BaoFeng ZhangQin Xin
    • H04L12/46H04L12/18H04W8/08H04L12/715
    • H04L12/1836H04L12/4633H04L45/64H04W8/085
    • An overlay network has a hierarchical cluster tree (HCT) structure on an underlying physical network, the HCT structure having clusters of local area networks (LANs) associated with respective sub-spaces of a hash key space. A cluster proxy node (CP) maintains a routing table and channels to both a parent cluster and member LANs, with routing information associating each LAN with a physical-network address (PA) of a corresponding LAN representative node (LR). Nodes sending routing request messages each containing a key value to the CP node, which returns routing response messages each including PA information from the routing table and/or the parent cluster. The PA information in the response for a given request includes a PA of an LR of a request-specific LAN whose sub-space contains the key value in the request message. A node uses the PA information to send a message to the LR node using the physical network.
    • 覆盖网络在底层物理网络上具有层次聚类树(HCT)结构,HCT结构具有与散列密钥空间的相应子空间相关联的局域网(LAN)簇。 集群代理节点(CP)将路由表和通道维护到父集群和成员LAN,路由信息将每个LAN与对应的LAN代表节点(LR)的物理网络地址(PA)相关联。 节点向CP节点发送每个包含密钥值的路由请求消息,其返回路由响应消息,每个路由响应消息包括来自路由表和/或父集群的PA信息。 针对给定请求的响应中的PA信息包括其请求消息中的子空间包含密钥值的请求特定LAN的LR的PA。 节点使用PA信息使用物理网络向LR节点发送消息。
    • 5. 发明授权
    • Method and device for dynamic deployment of trust bridges in an ad hoc wireless network
    • 用于在自组织无线网络中动态部署信任网桥的方法和设备
    • US08539225B2
    • 2013-09-17
    • US12112319
    • 2008-04-30
    • Liang GuoQi BaoDonald E. Eastlake, IIIWhay Chiou LeeAnthony R. Metke
    • Liang GuoQi BaoDonald E. Eastlake, IIIWhay Chiou LeeAnthony R. Metke
    • H04L29/06
    • H04L63/0823H04W84/12
    • A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).
    • 在自组织无线网络中部署信任网桥的方法可以为多机构认证提供互操作性。 该方法包括在来自不同组织的多个认证机构(CA)的接收认证机构(DCA)节点设备授权处理,其中授权授权DCA节点设备充当代表CA的DCA(步骤1105) 。 DCA节点设备然后处理从自组织无线网络接收的上下文信息(步骤1110)。 接下来,DCA节点设备基于上下文信息确定第二节点设备应该被启用为新的信任桥(步骤1115)。 DCA节点设备然后执行信任桥部署以使得第二节点设备能够用作新的信任桥(步骤1120)。
    • 6. 发明申请
    • Wireless relay device deployment methods and apparatus
    • 无线中继设备部署方法和装置
    • US20080101325A1
    • 2008-05-01
    • US11590359
    • 2006-10-31
    • Qi BaoWhay Chiou Lee
    • Qi BaoWhay Chiou Lee
    • H04J3/00
    • H04W24/02H04B7/2606H04W16/18H04W16/26
    • In an embodiment, an adaptively-augmentable wireless network (100, FIG. 1) may include at least one mobile device (110-115) and at least one relay device (104-109). During network setup, a mobile device associated with a first host user may determine (505, FIG. 5) that no relay device signal is receivable by the mobile device which has an adequate signal quality. When an undeployed relay device is not available to the first host user, he mobile device may transmit (508) a deployment request message (700, FIG. 7). Another mobile device associated with a second host user may receive (902, FIG. 9) the deployment request message, and may determine (908) whether to initiate deployment of an undeployed relay device associated with the second host user. When the other mobile device decides to initiate deployment, it may transmit (912) a responsive deployment announcement message (800, FIG. 8). Accordingly, collaborative relay device deployment is achievable.
    • 在一个实施例中,自适应增强的无线网络(100,图1)可以包括至少一个移动设备(110-1105)和至少一个中继设备(104-109)。 在网络建立期间,与第一主机用户相关联的移动设备可以确定(505,图5)没有中继设备信号可被具有足够信号质量的移动设备接收。 当未部署的中继设备对于第一主机用户不可用时,他的移动设备可以发送(508)部署请求消息(700,图7)。 与第二主机用户相关联的另一个移动设备可以接收(902,图9)部署请求消息,并且可以确定(908)是否启动与第二主机用户相关联的未部署的中继设备的部署。 当另一个移动设备决定启动部署时,它可以发送(912)响应部署通知消息(图8中的800)。 因此,可实现协同中继设备部署。
    • 9. 发明授权
    • Hierarchical cluster tree overlay network
    • 层次聚类树覆盖网络
    • US08675672B1
    • 2014-03-18
    • US13341663
    • 2011-12-30
    • Qi BaoFeng ZhangQin Xin
    • Qi BaoFeng ZhangQin Xin
    • H04L12/28
    • H04L45/64H04L45/46H04L45/7453
    • A Hierarchical Cluster Tree (HCT) overlay network reflects underlying physical network topology including inter-node distances (e.g., hop count), and an HCT structure groups nodes based on distance measurements. Local area networks (LANs) are basic building blocks. The network includes first and second level-1 clusters of LANs, each LAN including computerized data processing and/or storage nodes. A distance between LANs in the level-1 clusters is less than or equal to a predefined level-1 maximum distance. The LANs of the first and second level-1 clusters form a level-2 cluster of LANs in which a distance between cluster medoid nodes of the level-1 clusters is less than or equal to a predefined level-2 maximum distance greater than the level-1 maximum distance. Clustering can be extended to higher levels having successively greater maximum distances.
    • 分层聚簇树(HCT)覆盖网络反映了包括节点间距离(例如,跳数))的底层物理网络拓扑,并且HCT结构基于距离测量对节点进行分组。 局域网(LAN)是基本的组成部分。 该网络包括LAN的第一和第二一级集群,每个LAN包括计算机化的数据处理和/或存储节点。 第1级群集中的LAN之间的距离小于或等于预定义的1级最大距离。 第一级和第二级1集群的LAN形成一级的2级集群,其中级别1集群的集群中心节点之间的距离小于或等于大于等级的预定义的级别2最大距离 -1最大距离。 聚类可以扩展到具有连续更大的最大距离的较高级别。
    • 10. 发明申请
    • APPARATUS, METHOD AND SYSTEM FOR MANAGING SESSION ENCAPSULATION INFORMATION WITHIN AN INTERNET PROTOCOL CONTENT BYPASS ARCHITECTURE
    • 在互联网协议内容旁路建筑中管理会议信息的装置,方法和系统
    • US20090310480A1
    • 2009-12-17
    • US12140830
    • 2008-06-17
    • Qi BaoDavid FlanaganGerald R. JoyceMichael W. Patrick
    • Qi BaoDavid FlanaganGerald R. JoyceMichael W. Patrick
    • G06F11/00
    • H04L12/2801H04L41/5003H04L69/32
    • An apparatus, method and system for delivering Internet Protocol (IP) content within a system that includes a bypass architecture, using a Session Encapsulation Information Database (SEIDB). Within an existing PacketCable Multimedia (PCMM) framework used as a control plane for IP content bypass flow setup, the SEIDB system stores session bypass encapsulation information for IP content bypass flows within the system. Within the SEIDB, each entry of bypass encapsulation information has a flow classifier component that uniquely identifies a bypass flow in a manner that allows both a cable modem termination system (CMTS) and the IP content source to uniquely identify the bypass flow at the SEIDB. Initially, the CMTS gathers bypass encapsulation information and uploads it to the SEIDB. Before the bypass flow begins, the IP content source obtains the necessary bypass encapsulation information from the SEIDB, e.g., using a flow classifier as a search filter item.
    • 一种使用会话封装信息数据库(SEIDB)在包括旁路架构的系统内传送因特网协议(IP)内容的装置,方法和系统。 在用作IP内容旁路流设置的控制平面的现有PacketCable多媒体(PCMM)框架内,SEIDB系统存储用于系统内的IP内容旁路流的会话旁路封装信息。 在SEIDB中,旁路封装信息的每个条目都具有一个流分类器组件,其以允许电缆调制解调器终端系统(CMTS)和IP内容源唯一地标识旁路流的方式来唯一地标识SEIDB的旁路流。 最初,CMTS收集旁路封装信息,并将其上传到SEIDB。 在旁路流开始之前,IP内容源从SEIDB获得必要的旁路封装信息,例如使用流分类器作为搜索过滤项。