会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明申请
    • NETWORK ADDRESS LOOKUP BASED ON BLOOM FILTERS
    • 基于BLOOM过滤器的网络地址查找
    • US20100040066A1
    • 2010-02-18
    • US12190633
    • 2008-08-13
    • Fang HaoMuralidharan S. KodialamTirunell V. LakshmanHaoyu Song
    • Fang HaoMuralidharan S. KodialamTirunell V. LakshmanHaoyu Song
    • H04L12/56
    • H04L45/00H04L45/745H04L45/7457
    • In one embodiment, IP lookup into a routing table having prefixes of different prefix lengths is performed using a Bloom filter that was programmed with the prefixes corresponding to all of the different prefix lengths without having to expand any of the prefixes programmed into the Bloom filter. Membership probes are performed into the Bloom filter using candidate prefix values of a given network address. The Bloom filter can be implemented in a distributed manner using Bloom sub-filters, where each Bloom sub-filter is hashed based on a set of hash functions, where each different hash function in the set corresponds to a different prefix length in the routing table. Each Bloom sub-filter can in turn be implemented using a plurality of practically realizable multi-port memory devices controlled by a port scheduler. False-positive matches can be detected and next-hop information for true-positive matches retrieved using an off-chip, hash-based prefix table.
    • 在一个实施例中,使用具有与所有不同前缀长度相对应的前缀编程的布隆过滤器来执行具有不同前缀长度的前缀的路由表的IP查找,而不必将编程到布隆过滤器中的任何前缀扩展。 使用给定网络地址的候选前缀值对Bloom过滤器进行成员资格探测。 Bloom过滤器可以使用Bloom子过滤器以Bloom子过滤器实现,其中每个Bloom子过滤器基于一组散列函数进行散列,其中集合中的每个不同的散列函数对应于路由表中的不同的前缀长度 。 可以使用由端口调度器控制的多个实际可实现的多端口存储器件来实现每个Bloom子滤波器。 可以检测到假阳性匹配,并使用片外基于散列的前缀表检索真正匹配的下一跳信息。
    • 55. 发明授权
    • Apparatus and method for protection in a data center
    • 数据中心保护装置及方法
    • US09066160B2
    • 2015-06-23
    • US13350457
    • 2012-01-13
    • Fang HaoMuralidharam S. KodialamTirunell V. LakshmanHaoyu SongMartin Zimgibl
    • Fang HaoMuralidharam S. KodialamTirunell V. LakshmanHaoyu SongMartin Zimgibl
    • H04B10/00H04Q11/00
    • H04B10/032H04B10/038H04B10/27H04L1/22H04Q11/00
    • A manner of providing redundancy protection for a data center network that is both reliable and low-cost. In a data center network where the data traffic between numerous access nodes and a network core layer via primary aggregation nodes, an optical network device such as and OLT (optical line terminal) is provided as a backup aggregation node for one or more of the primary aggregation nodes. When a communication path through a primary aggregation node fails, traffic is routed through the optical network device. In a preferred embodiment, a communication link is formed from a plurality of access nodes to a single port of the OLT or other optical network device via an optical splitter that combines upstream transmissions and distributes downstream transmissions. The upstream transmissions from the plurality of access nodes may occur according to an allocation schedule generated when the backup aggregation node is needed.
    • 为可靠和低成本的数据中心网络提供冗余保护的方式。 在通过主聚合节点在多个接入节点和网络核心层之间的数据业务的数据中心网络中,提供诸如OLT(光线路终端)之类的光网络设备作为主要的一个或多个的备份聚合节点 聚合节点。 当通过主聚合节点的通信路径发生故障时,流量将通过光网络设备进行路由。 在优选实施例中,通过组合上行传输并分发下行传输的光分路器,从多个接入节点到OLT或其他光网络设备的单个端口形成通信链路。 来自多个接入节点的上行传输可以根据需要备份聚合节点时生成的分配调度进行。
    • 56. 发明授权
    • Method and apparatus for generating a shape graph from a binary trie
    • 用于从二进制trie生成形状图的方法和装置
    • US08631043B2
    • 2014-01-14
    • US12633845
    • 2009-12-09
    • Fang HaoMuralidharan KodialamTirunell V. LakshmanHaoyu Song
    • Fang HaoMuralidharan KodialamTirunell V. LakshmanHaoyu Song
    • G06F17/30
    • G06F17/30958
    • A capability is provided for representing a set of data values using data structures, including converting a binary trie data structure representing the set of data values to a shape graph data structure representing the set of data values. The shape graph data structure is generated from the binary trie data structure based on the shapes of the sub-trees rooted at the nodes of the binary trie data structure. The shape graph includes vertices representing shapes of the sub-trees of the binary trie data structure. A shape graph data structure permits operations similar to the operations that may be performed on the binary trie data structure for performing lookups for data values from the set of data values, while at the same time reducing the structural redundancy of the binary trie data structure such that the shape graph data structure provides significant improvements in memory usage over the binary trie data structure.
    • 提供了一种用于使用数据结构表示一组数据值的能力,包括将表示该组数据值的二进制特里数据结构转换为表示数据值集合的形状图数据结构。 形状图数据结构是从二进制trie数据结构生成的基于二叉树数据结构的节点的子树的形状。 形状图包括表示二进制trie数据结构的子树形状的顶点。 形状图数据结构允许类似于可以对二进制特里数据结构执行的操作的操作,以执行来自该组数据值的数据值的查找,同时减少二进制特里数据结构的结构冗余, 形状图数据结构在二进制数据结构中提供了对存储器使用的显着改进。
    • 57. 发明申请
    • APPARATUS AND METHOD FOR PROVIDING A FLUID SECURITY LAYER
    • 提供流体安全层的装置和方法
    • US20130305311A1
    • 2013-11-14
    • US13469176
    • 2012-05-11
    • Krishna P. Puttaswamy NagaFang HaoAntony Martin
    • Krishna P. Puttaswamy NagaFang HaoAntony Martin
    • G06F21/00
    • H04L63/0263H04L63/20
    • A security management capability enables migration of individual security rules between storage/application locations. The migration of a security rule may include selection of a location at which the security rule is to be applied and migration of the security rule to the selected location at which the security rule is to be applied. The selection of the location at which the security rule is to be applied may be performed based on security rule policies and/or security rule location selection information. The security rule is migrated from a current location (e.g., a location at which the security rule is currently applied, a management system, or the like) to the selected location at which the security rule is to be applied. In this manner, a fluid security layer may be provided. The fluid security layer may be optimized for one or more of security level, performance, cost, or the like.
    • 安全管理功能可以在存储/应用程序位置之间迁移各个安全规则。 安全规则的迁移可以包括选择要应用安全规则的位置,以及将安全规则迁移到要应用安全规则的所选择的位置。 可以基于安全规则策略和/或安全规则位置选择信息来执行对应用安全规则的位置的选择。 安全规则从当前位置(例如,当前应用安全规则的位置,管理系统等)迁移到要应用安全规则的所选择的位置。 以这种方式,可以提供流体安全层。 可以针对安全级别,性能,成本等中的一个或多个优化流体安全层。