会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Method for data traffic policing, a data traffic policer realizing such a method and a telecommunication network including such a data traffic policer
    • 用于数据流量监管的方法,实现这种方法的数据流量监管器和包括这种数据流量监管器的电信网络
    • US07403478B2
    • 2008-07-22
    • US10682404
    • 2003-10-10
    • Olivier Bonaventure
    • Olivier Bonaventure
    • H04L1/00H04L12/26
    • H04L12/5602H04L2012/5636H04L2012/5653H04Q11/0478
    • The present invention concerns a method for use in a telecommunication network by a data traffic policer for data traffic policing on a data communication link. The data traffic includes data cells that are grouped into frames. For each data cell of a frame, upon reception of the data cell, the method checks a conformance of the data cell and provides a conformance result of the data cell being any one of conforming and non-conforming. The method further stores the data cell into a buffer and treats the frame as conforming in the event when for each data cell of the frame that is stored in the buffer the conformance result is conforming; and in the event when the frame is treated as conforming and upon reception of a predefined data cell of the frame, the method starts transmission of a predefined number of data cells of the frame by the traffic policer.
    • 本发明涉及一种在数据通信链路上进行数据流量监管的数据流量监管器在电信网络中使用的方法。 数据流量包括被分组成帧的数据单元。 对于帧的每个数据单元,在接收到数据单元时,该方法检查数据单元的一致性,并提供数据单元的符合性和符合性的一致性结果。 该方法进一步将数据单元存储到缓冲器中,并且对于在缓冲器中存储的一致性结果符合的帧的每个数据单元的情况下,将帧视为合格; 并且在帧被视为符合条件并且在接收到帧的预定义数据信元时,该方法开始由流量监管器传输该帧的预定数量的数据信元。
    • 4. 发明授权
    • Shaping method, a shaper realizing such a shaping method and communication network including such a shaper
    • 成形方法,实现这种成型方法的整形器和包括这种整形器的通信网络
    • US06680907B1
    • 2004-01-20
    • US09392336
    • 1999-09-08
    • Olivier Bonaventure
    • Olivier Bonaventure
    • H04J314
    • H04L12/5602H04L2012/5632H04L2012/568H04L2012/5684H04Q11/0478
    • A shaping method for use by a shaper in a communication network for converting an incoming data flow with an incoming data packet rate into an outgoing data flow with an outgoing data packet rate. The shaper includes a buffer which is leaked at the outgoing data packet rate in order to provide the outgoing data flow. The shaping method determines a value of a future incoming data packet rate of the incoming data packet rate, and determines a buffer occupancy value related to the number of data packets of the incoming data flow received by the buffer included in the shaper. The buffer is leaked at the outgoing data packet rate in order to provide the outgoing data flow. The shaping method also determines the value of the outgoing data packet rate as a function of the value of the future incoming data packet rate, the value of the buffer occupancy, the value of a predetermined peak data packet rate and the value of a predetermined minimum data packet rate. This determination enables the shaper to support a service category with a predetermined minimum guaranteed bandwidth according to the predetermined minimum data packet rate. This also allows the shaper to use excess bandwidth over the predetermined minimum guaranteed bandwidth up to the predetermined peak data packet rate.
    • 一种用于通信网络中整形器的成形方法,用于将具有输入数据分组速率的输入数据流转换成具有输出数据分组速率的输出数据流。 整形器包括以输出数据分组速率泄漏以便提供输出数据流的缓冲器。 成形方法确定输入数据分组速率的未来输入数据分组速率的值,并且确定与由整形器中包括的缓冲器接收的输入数据流的数据分组数相关的缓冲器占用值。 缓冲器以输出数据分组速率泄漏,以提供输出数据流。 整形方法还根据未来输入数据分组速率的值,缓冲器占用的值,预定的峰值数据分组速率的值和预定的最小值的值确定输出数据分组速率的值 数据包速率。 该确定使得成形器能够根据预定的最小数据分组速率支持具有预定最小保证带宽的服务类别。 这也允许成形器在预定的最小保证带宽之上使用超过预定的峰值数据分组速率的超过带宽。
    • 6. 发明授权
    • Method for policing data traffic, a data traffic policer realizing such a method and a telecommunication network including such a policer
    • US06618356B1
    • 2003-09-09
    • US09505196
    • 2000-02-16
    • Olivier Bonaventure
    • Olivier Bonaventure
    • H04J314
    • H04L12/5602H04L2012/5619H04L2012/5636H04Q11/0478
    • A data traffic policer (POL) included in a telecommunication network, to police data traffic which includes data packets that are part of a lower order data flow that is on its turn part of a higher order data flow. Each data packet is associated to a lower order identifier (LOI) that identifies the lower order data flow and to a higher order identifier that (HOI) identifies the higher order data flow. The policer (POL) includes first determiner (DET1) coupled to an input of the policer (POL) to determine, upon reception of a data packet, its lower order identifier (LOI). A first controller (CTRL1) coupled to the first determiner (DET1) checks a conformance of the data packet according to predefined lower order conformance rules (LOC(LOI)) associated to its lower order identifier (LOI) and provides thereby a lower order conformance result (LOCR) that is lower order conforming or lower order non-conforming. Furthermore the policer (POL) includes second determiner (DET2) coupled to the input to determine the higher order identifier (HOI) that is associated to the data packet and forwards the higher order identifier (HOI) to a second controller (CTRL2). The second controller (CTRL2) checks a conformance of the data packet according to predefined higher order conformance rules (HOC(HOI)) associated to the higher order identifier (HOI) and provides a higher order conformance result (HOCR) that is higher order conforming or higher order non-conforming. The policer (POL) includes declarer (DECL) coupled between the first controller (CTRL1), the second controller (CTRL2) and an output (OUT) of the policer (POL). The declarer (DECL) declares, in the event when the lower order conformance result (LOCR) is lower order non-conforming, and the higher order conformance result (HOCR) is higher order conforming, the data packet as conforming. As a result, when being transmitted, the data packet uses some leftover bandwidth from another lower order data flow within the higher order data flow. After the heading, delete the title in its entirety.