会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • Accessing data processing systems behind a NAT enabled network
    • 访问启用NAT的网络后面的数据处理系统
    • US20050086373A1
    • 2005-04-21
    • US10687266
    • 2003-10-16
    • Dwip BanerjeeVinit JainVasu Vallabhaneni
    • Dwip BanerjeeVinit JainVasu Vallabhaneni
    • G06F15/16H04L29/12
    • H04L29/12009H04L29/12066H04L29/1233H04L29/12509H04L61/1511H04L61/2567
    • A method, system, and program for accessing data processing systems behind a NAT enabled network are provided. According to one aspect of the present invention, a NAT data processing system is located behind a NAT enabled network with a NAT device as a gateway to the NAT enabled network. A client system located outside the NAT enabled network queries the NAT device for the address of the NAT data processing system located behind the NAT enabled network. The query is automatically routed through the NAT device to a DNS server. The DNS server then returns an address for the NAT data processing system and source routing for the NAT device. The NAT device forwards the address and source routing to the client system. Then, the client system sends packets to the NAT data processing system at the address with source routing through the NAT device, such that the NAT data processing system behind the NAT enabled network is directly accessed by the client system from outside the NAT enabled network.
    • 提供了一种用于访问NAT启用网络后面的数据处理系统的方法,系统和程序。 根据本发明的一个方面,NAT数据处理系统位于启用NAT的网络之后,其中NAT设备作为启用NAT的网络的网关。 位于NAT启用网络之外的客户端系统向NAT设备查询位于启用NAT的网络后面的NAT数据处理系统的地址。 该查询通过NAT设备自动路由到DNS服务器。 然后,DNS服务器返回NAT数据处理系统的地址和NAT设备的源路由。 NAT设备将地址和源路由转发到客户端系统。 然后,客户端系统通过NAT设备将数据包发送到具有源路由的地址的NAT数据处理系统,使NAT启用网络背后的NAT数据处理系统由NAT使能网络外部由客户端系统直接访问。
    • 12. 发明申请
    • Method, system and article for rapid detection and avoidance of high data corrupting routes within a network
    • 用于快速检测和避免网络内高数据损坏路由的方法,系统和文章
    • US20050036452A1
    • 2005-02-17
    • US10640819
    • 2003-08-14
    • Dwip BanerjeeVinit JainVasu VallabhaneniVenkat Venkatsubra
    • Dwip BanerjeeVinit JainVasu VallabhaneniVenkat Venkatsubra
    • H04J1/16H04L1/00H04L1/16H04L1/18H04L1/24H04L12/56H04L29/06H04L29/14
    • H04L1/0061H04L1/0072H04L1/08H04L1/16H04L1/1809H04L45/00H04L45/22H04L45/28H04L69/16H04L69/161H04L69/163H04L69/22H04L69/40
    • A receiving host in a TCP/IP network sends an acknowledgment indicating a received data packet is corrupt. The sending host will begin transmitting with a new field set in the IP header called a check-TCP-checksum bit, thereby requesting that all routers in the TCP/IP network perform a checksum on the entire received packet. Routers in the TCP/IP network will perform a complete checksum on an entire packet with the check-TCP-checksum bit set, and not just on the IP header. The routers continuously monitor the ratio of corrupt packets received on a particular port that fail the entire packet checksum to the total number of packets received on that port. If the ratio of corrupt-to-received packets exceeds a corruption threshold, the router assumes that the associated link is causing data corruption and issues a routing update indicating that the link is bad and should be avoided. Once the retransmission rate between the sender and receiver drops below a threshold level, the bad link has been detected and avoided within the TCP/IP network and the check-TCP-checksum option in the IP header is no longer set in data packets transmitted to the receiver host.
    • TCP / IP网络中的接收主机发送指示接收到的数据包已损坏的确认。 发送主机将开始使用称为检查TCP校验和位的IP报头中设置的新字段进行发送,从而请求TCP / IP网络中的所有路由器对整个接收到的数据包执行校验和。 TCP / IP网络中的路由器将对整个数据包执行完整的校验和,同时检查TCP-checksum位,而不仅仅是在IP报头上。 路由器连续监视在特定端口上接收的损坏数据包的总数与在该端口上接收的数据包的总数之间的比例。 如果损坏的数据包的比例超过了破坏阈值,则路由器假设相关联的链路导致数据损坏,并发出路由更新,指示链路不良,应该避免。 一旦发送方和接收方之间的重传速率下降到阈值以下,就会在TCP / IP网络内检测并避免不良链路,并且IP报头中的check-TCP-checksum选项不再被设置在发送到 接收主机。
    • 13. 发明申请
    • Method and apparatus for automatically activating standby shared Ethernet adapter in a Virtual I/O server of a logically-partitioned data processing system
    • 用于在逻辑分区数据处理系统的虚拟I / O服务器中自动激活备用共享以太网适配器的方法和装置
    • US20060250945A1
    • 2006-11-09
    • US11101619
    • 2005-04-07
    • Lilian FernandesVinit JainJorge NoguerasVasu Vallabhaneni
    • Lilian FernandesVinit JainJorge NoguerasVasu Vallabhaneni
    • H04L12/26
    • H04L41/0654H04L43/10
    • A method, an apparatus, and computer instructions are provided for automatically activating standby shared Ethernet adapter in a Virtual I/O server of a logically-partitioned data processing system. A standby shared Ethernet adapter (SEA) is set up with a virtual Ethernet adapter that belongs to the same network as the primary shared Ethernet adapter (SEA). The standby SEA monitors periodically for a failure of the primary SEA. If a failure occurs, the standby SEA is activated by connecting a path between its physical adapter and virtual trunk adapter, such that the virtual trunk adapter becomes the primary SEA for the client partitions. Responsive to detecting a recovery of the primary SEA, the primary SEA determines if external communications are received from the standby SEA. If no external communications are received, the primary SEA is reactivated by connecting a path between its physical adapter and virtual trunk adapter.
    • 提供了一种用于在逻辑分区数据处理系统的虚拟I / O服务器中自动激活备用共享以太网适配器的方法,装置和计算机指令。 备用共享以太网适配器(SEA)设置为与主共享以太网适配器(SEA)属于同一网络的虚拟以太网适配器。 待机SEA定期监视主要海事局的故障。 如果发生故障,则通过连接其物理适配器和虚拟中继适配器之间的路径来激活备用SEA,使得虚拟中继适配器成为客户端分区的主要SEA。 响应于检测主要SEA的恢复,主要SEA确定是否从待机SEA接收到外部通信。 如果没有接收到外部通信,则通过连接其物理适配器和虚拟中继适配器之间的路径来重新启用主要SEA。
    • 14. 发明授权
    • Tunneling IPv6 packets
    • 隧道IPv6报文
    • US07769878B2
    • 2010-08-03
    • US12183779
    • 2008-07-31
    • Lilian S. FernandesVinit JainVasu VallabhaneniPatrick T. Vo
    • Lilian S. FernandesVinit JainVasu VallabhaneniPatrick T. Vo
    • G06F15/16
    • H04L12/4633H04L29/12066H04L61/1511H04L69/16H04L69/161H04L69/167
    • Methods, systems, and products are provided for tunneling IPv6 packets. Embodiments include receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv6 packet having an IPv6 destination address; receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv4 address for a destination IPv6 border router retrieved from a data structure associating IPv6 destination addresses with IPv4 addresses for destination IPv6 border routers; encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet; and sending the encapsulated packet to a destination IPv6 border router at the IPv4 address. In many embodiments, encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet is carried out by adding an IPv4 header to the IPv6 packet.
    • 提供了IPv6隧道分组的方法,系统和产品。 实施例包括由原始IPv6主机从原始IPv6边界路由器接收具有IPv6目的地址的IPv6分组; 通过原始IPv6边界路由器从原始IPv6主机接收从将IPv6目的地址与目的IPv6边界路由器的IPv4地址相关联的数据结构检索的目的地IPv6边界路由器的IPv4地址; 由原始IPv6边界路由器封装IPv6分组中的IPv6分组; 并将封装的分组发送到IPv4地址的目的IPv6边界路由器。 在许多实施例中,由IPv6 IPv6边界路由器封装IPv4分组中的IPv6分组,通过向IPv6分组添加IPv4报头来实现。
    • 16. 发明授权
    • Method, system, and computer program product for reducing network copies by port-based routing to application-specific buffers
    • 方法,系统和计算机程序产品,用于通过基于端口的路由减少网络副本到特定于应用程序的缓冲区
    • US07606251B2
    • 2009-10-20
    • US10912497
    • 2004-08-05
    • Lilian Sylvia FernandesVinit JainJeffrey Paul MessingVasu Vallabhaneni
    • Lilian Sylvia FernandesVinit JainJeffrey Paul MessingVasu Vallabhaneni
    • H04L12/28H04L12/56G06F13/12G06F13/38
    • H04L69/16H04L47/19H04L49/90H04L49/901H04L49/9042H04L69/161
    • A method, system, and computer program product for delivering data, received from a network on a network adapter to a pre-assigned port, to a storage buffer assigned to an application are disclosed. An application designates an application-specific buffer within a local data processing system for buffering data communicated with the application. The local data processing system reports to a network interface of the local data processing system a memory address of the designated application-specific buffer, and the data processing system designates a port on which to receive packets addressed to the memory address. The data processing system then sends a port registration message to the local network interface, enabling the network interface to compare the port number of incoming traffic to a registered port number and route incoming traffic from a remote data processing system directly to the designated application-specific buffers in the event of a match. In one embodiment, the present invention includes receiving in the network interface a packet addressed to the specific port and delivering data from the packet to said application-specific buffer.
    • 公开了一种用于将从网络适配器上的网络接收的数据传送到预分配端口的方法,系统和计算机程序产品,分配给分配给应用的存储缓冲器。 应用程序在本地数据处理系统内指定特定于应用程序的缓冲器,用于缓冲与应用程序通信的数据。 本地数据处理系统向本地数据处理系统的网络接口报告指定应用特定缓冲器的存储器地址,并且数据处理系统指定在其上接收寻址到存储器地址的分组的端口。 数据处理系统然后向本地网络接口发送端口注册消息,使得网络接口能够将入局业务的端口号与已注册的端口号进行比较,并将来自远程数据处理系统的流量直接路由到指定的应用特定 在匹配的情况下缓冲。 在一个实施例中,本发明包括在网络接口中接收寻址到特定端口的分组,并将数据从分组传送到所述应用特定缓冲器。
    • 17. 发明授权
    • Protocol definition for software bridge failover
    • 软件桥故障转移的协议定义
    • US07492704B2
    • 2009-02-17
    • US11227033
    • 2005-09-15
    • Vinit JainJorge Rafael NoguerasVasu VallabhaneniPatrick Tam Vo
    • Vinit JainJorge Rafael NoguerasVasu VallabhaneniPatrick Tam Vo
    • H04J1/16
    • H04L12/462
    • A method, data processing system, and computer usable code are provided for protocol definition for software bridge failover. In a first aspect of the present invention, a first software bridge determines the proper working operation of a physical adapter. Limbo packets are sent to a second software bridge alerting the second software bridge that the first software bridge is no longer bridging traffic responsive to the physical adapter failure in the first software bridge. The second software bridge receives the limbo packets, and, in response to receiving the limbo packets, asserts primary control and initiates bridging of traffic. In an alternative aspect of the present invention a first software bridge sends keep-alive packets. A second software bridge monitors the keep-alive packets from the first software bridge and, in response to a failure to detect the keep-alive packets from the first software bridge, the second software bridge initiates bridging of traffic.
    • 为软件桥故障转移的协议定义提供了一种方法,数据处理系统和计算机可用代码。 在本发明的第一方面,第一软件桥接器确定物理适配器的适当的工作操作。 Limbo数据包被发送到第二个软件桥接器,提醒第二个软件桥接器,第一个软件桥接器不再桥接响应于第一个软件桥中的物理适配器故障的流量。 第二个软件桥接收到limbo数据包,并且响应于接收到limbo数据包,断言主要控制并启动流量桥接。 在本发明的另一方面,第一软件桥发送保持活动分组。 第二个软件桥接器监视来自第一软件桥的保持活动分组,并且响应于检测到来自第一软件桥的保持活动分组的故障,第二软件桥启动流量桥接。
    • 18. 发明授权
    • Accessing data processing systems behind a NAT enabled network
    • 访问启用NAT的网络后面的数据处理系统
    • US07478169B2
    • 2009-01-13
    • US10687266
    • 2003-10-16
    • Dwip N. BanerjeeVinit JainVasu Vallabhaneni
    • Dwip N. BanerjeeVinit JainVasu Vallabhaneni
    • G06F15/16G06F9/00
    • H04L29/12009H04L29/12066H04L29/1233H04L29/12509H04L61/1511H04L61/2567
    • A NAT data processing system is located behind a NAT enabled network with a NAT device as a gateway to the NAT enabled network. A client system located outside the NAT enabled network queries the NAT device for the address of the NAT data processing system located behind the NAT enabled network. The query is automatically routed through the NAT device to a DNS server. The DNS server returns an address for the NAT data processing system and source routing for the NAT device. The NAT device forwards the address and source routing to the client system. The client system sends packets to the NAT data processing system at the address with source routing through the NAT device, such that the NAT data processing system behind the NAT enabled network is directly accessed by the client system from outside the NAT enabled network.
    • NAT数据处理系统位于启用NAT的网络后面,NAT设备作为启用NAT的网络的网关。 位于NAT启用网络之外的客户端系统向NAT设备查询位于启用NAT的网络后面的NAT数据处理系统的地址。 该查询通过NAT设备自动路由到DNS服务器。 DNS服务器返回NAT数据处理系统的地址和NAT设备的源路由。 NAT设备将地址和源路由转发到客户端系统。 客户端系统通过NAT设备将数据包发送到具有源路由地址的NAT数据处理系统,使得NAT启用网络背后的NAT数据处理系统可以由NAT使能网络外部的客户端系统直接访问。
    • 19. 发明授权
    • Tunneling IPv6 packets
    • 隧道IPv6报文
    • US07437470B2
    • 2008-10-14
    • US10992380
    • 2004-11-18
    • Lilian Sylvia FernandesVinit JainVasu VallabhaneniPatrick Tam Vo
    • Lilian Sylvia FernandesVinit JainVasu VallabhaneniPatrick Tam Vo
    • G06F15/16
    • H04L12/4633H04L29/12066H04L61/1511H04L69/16H04L69/161H04L69/167
    • Methods, systems, and products are provided for tunneling IPv6 packets. Embodiments include receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv6 packet having an IPv6 destination address; receiving, by an origin IPv6 border router from an origin IPv6 host, an IPv4 address for a destination IPv6 border router retrieved from a data structure associating IPv6 destination addresses with IPv4 addresses for destination IPv6 border routers; encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet; and sending the encapsulated packet to a destination IPv6 border router at the IPv4 address. In many embodiments, encapsulating, by the origin IPv6 border router, the IPv6 packet in an IPv4 packet is carried out by adding an IPv4 header to the IPv6 packet.
    • 提供了IPv6隧道分组的方法,系统和产品。 实施例包括由原始IPv6主机从原始IPv6边界路由器接收具有IPv6目的地址的IPv6分组; 通过原始IPv6边界路由器从原始IPv6主机接收从将IPv6目的地址与目的地IPv6边界路由器的IPv4地址相关联的数据结构检索的目的地IPv6边界路由器的IPv4地址; 由原始IPv6边界路由器封装IPv6分组中的IPv6分组; 并将封装的分组发送到IPv4地址的目的IPv6边界路由器。 在许多实施例中,由IPv6 IPv6边界路由器封装IPv4分组中的IPv6分组,通过向IPv6分组添加IPv4报头来实现。
    • 20. 发明授权
    • Method, system and article for rapid detection and avoidance of high data corrupting routes within a network
    • 用于快速检测和避免网络内高数据损坏路由的方法,系统和文章
    • US07394769B2
    • 2008-07-01
    • US10640819
    • 2003-08-14
    • Dwip N. BanerjeeVinit JainVasu VallabhaneniVenkat Venkatsubra
    • Dwip N. BanerjeeVinit JainVasu VallabhaneniVenkat Venkatsubra
    • H04J1/16
    • H04L1/0061H04L1/0072H04L1/08H04L1/16H04L1/1809H04L45/00H04L45/22H04L45/28H04L69/16H04L69/161H04L69/163H04L69/22H04L69/40
    • A receiving host in a TCP/IP network sends an acknowledgment indicating a received data packet is corrupt. The sending host will begin transmitting with a new field set in the IP header called a check-TCP-checksum bit, thereby requesting that all routers in the TCP/IP network perform a checksum on the entire received packet. Routers in the TCP/IP network will perform a complete checksum on an entire packet with the check-TCP-checksum bit set, and not just on the IP header. The routers continuously monitor the ratio of corrupt packets received on a particular port that fail the entire packet checksum to the total number of packets received on that port. If the ratio of corrupt-to-received packets exceeds a corruption threshold, the router assumes that the associated link is causing data corruption and issues a routing update indicating that the link is bad and should be avoided. Once the retransmission rate between the sender and receiver drops below a threshold level, the bad link has been detected and avoided within the TCP/IP network and the check-TCP-checksum option in the IP header is no longer set in data packets transmitted to the receiver host.
    • TCP / IP网络中的接收主机发送指示接收到的数据包已损坏的确认。 发送主机将开始使用称为检查TCP校验和位的IP报头中设置的新字段进行发送,从而请求TCP / IP网络中的所有路由器对整个接收到的数据包执行校验和。 TCP / IP网络中的路由器将对整个数据包执行完整的校验和,同时检查TCP-checksum位,而不仅仅是在IP报头上。 路由器连续监视在特定端口上接收的损坏数据包的总数与在该端口上接收的数据包的总数之间的比例。 如果损坏的数据包的比例超过了破坏阈值,则路由器假设相关联的链路导致数据损坏,并发出路由更新,指示链路不良,应该避免。 一旦发送方和接收方之间的重传速率下降到阈值以下,就会在TCP / IP网络内检测并避免不良链路,并且IP报头中的check-TCP-checksum选项不再被设置在发送到 接收主机。