会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and apparatus for use in a network of the ethernet type, to
improve performance by reducing the occurrence of collisions in the
event of channel capture
    • 在以太网类型的网络中使用的方法和装置,通过减少在通道捕获的情况下发生碰撞来提高性能
    • US5526355A
    • 1996-06-11
    • US447283
    • 1995-05-22
    • Henry S. YangKadangode K. RamakrishnanWilliam R. HaweAnthony G. Lauck
    • Henry S. YangKadangode K. RamakrishnanWilliam R. HaweAnthony G. Lauck
    • H04L12/413H04J3/14
    • H04L12/413
    • A technique for modifying the IEEE 802.3 standard for selecting transmit-to-transmit interpacket gap (IPG) intervals in a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) network, to provide fairness and good channel utilization in the event that a node has captured the network communication channel. If there is a small number of active nodes on the network, one node may capture the channel and the standard backoff algorithm makes it increasingly unlikely for another node to transmit. The new technique provides for use of a longer interpacket gap (IPG) interval to be used by a node that has been initially unsuccessful in contention for the channel, thereby ensuring that the other node may continue to transmit back-to-back data packets without interruption or collision. After a preselected time interval, the nodes reverse their roles by selecting the opposite IPG intervals. The initial receiver now selects the shorter IPG interval and captures the channel for the preselected time interval.
    • 一种用于在具有冲突检测(CSMA / CD)网络的载波侦听多路访问(CSMA / CD)网络中修改IEEE 802.3标准以选择发射到发送分组间隙(IPG)间隔的技术,以在节点 已经捕获了网络通信通道。 如果网络上存在少量活动节点,则一个节点可以捕获该信道,并且标准退避算法使得另一节点不太可能传输。 新技术提供了使用较早的间隔间隔(IPG)间隔来使用,该节点最初不成功地用于信道的争用,从而确保其他节点可以继续传送背对背数据分组而不用 中断或碰撞。 在预选的时间间隔之后,节点通过选择相反的IPG间隔来反转其角色。 初始接收机现在选择较短的IPG间隔,并捕获预选时间间隔的通道。
    • 3. 发明授权
    • Method and apparatus for use in a network of the ethernet type, to
improve fairness by controlling collision backoff times in the event of
channel capture
    • 在以太网类型的网络中使用的方法和装置,通过在通道捕获的情况下控制冲突回退时间来提高公平性
    • US5650997A
    • 1997-07-22
    • US735155
    • 1996-10-24
    • Henry Sho-Che YangAnthony G. LauckKadangode K. RamakrishnanWilliam R. Hawe
    • Henry Sho-Che YangAnthony G. LauckKadangode K. RamakrishnanWilliam R. Hawe
    • H04L12/413
    • H04L12/413
    • A technique for modifying the IEEE 802.3 standard for selecting backoff times in a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) network, in the event that a collision is sensed by a node that has captured the network communication channel. If there is a small number of active nodes on the network, one node may capture the channel and the standard backoff algorithm makes it increasingly unlikely for another node to transmit. The new technique provides for less aggressive, i.e. longer, backoff times before at least the first retransmission attempt made by a node that has captured the channel. Three specific examples of the technique are disclosed. Even though the invention represents a departure from the standard CSMA/CD backoff algorithm, the overall average backoff times provided by the invention can be selected to be consistent with the average times provided by the standard. Moreover, nodes using the invention interoperate successfully with nodes that do not.
    • 在捕获网络通信信道的节点感测到冲突的情况下,修改用于在具有冲突检测(CSMA / CD)网络的载波侦听多路访问中选择退避时间的IEEE 802.3标准的技术。 如果网络上存在少量活动节点,则一个节点可以捕获该信道,并且标准退避算法使得另一节点不太可能传输。 新技术在至少已经捕获了信道的节点进行的第一次重传尝试之前提供较少的侵略性,即更长的退避时间。 公开了该技术的三个具体实例。 即使本发明代表与标准CSMA / CD退避算法的偏离,本发明提供的整体平均退避时间可以被选择为与标准提供的平均时间一致。 此外,使用本发明的节点与没有的节点成功地相互操作。
    • 4. 再颁专利
    • Methods and apparatus for use in a network of the ethernet type, to
improve fairness by controlling collision backoff times and using
stopped backoff timing in the event of channel capture
    • 在以太网类型的网络中使用的方法和装置,通过控制冲突回退时间来提高公平性,并在通道捕获的情况下使用停止的退避时间
    • USRE36353E
    • 1999-10-26
    • US899511
    • 1997-07-24
    • Henry Sho-Che YangKadangode K. RamakrishnanAnthony G. LauckWilliam R. Hawe
    • Henry Sho-Che YangKadangode K. RamakrishnanAnthony G. LauckWilliam R. Hawe
    • H04L12/413
    • H04L12/413
    • A technique for modifying the IEEE 802.3 standard for selecting backoff times in a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) network, in the event that a collision is sensed by a node that has captured the network communication channel. If there is a small number of active nodes on the network, one node may capture the channel and the standard backoff algorithm makes it increasingly unlikely for another node to transmit. The new technique provides for less aggressive, i.e. longer, backoff times before at least the first retransmission attempt made by a node that has captured the channel, and in addition provides for the use of a stopped backoff algorithm. Three specific examples of methods to choose a backoff time and two methods of using a stopped backoff algorithm are disclosed. Even though the invention represents a departure from the standard CSMA/CD backoff algorithm, the overall average backoff times provided by the invention can be selected to be consistent with the average times provided by the standard. Moreover, nodes using the invention interoperate successfully with nodes that do not use the invention.
    • 在捕获网络通信信道的节点感测到冲突的情况下,修改用于在具有冲突检测(CSMA / CD)网络的载波侦听多路访问中选择退避时间的IEEE 802.3标准的技术。 如果网络上存在少量活动节点,则一个节点可以捕获该信道,并且标准退避算法使得另一节点不太可能传输。 该新技术在至少捕获了该信道的节点进行的第一次重传尝试之前提供较少的侵略性,即更长的退避时间,并且还提供了使用停止的退避算法。 公开了选择退避时间的方法的三个具体示例和使用停止退避算法的两种方法。 即使本发明代表与标准CSMA / CD退避算法的偏离,本发明提供的整体平均退避时间可以被选择为与标准提供的平均时间一致。 此外,使用本发明的节点与不使用本发明的节点成功地相互操作。
    • 5. 发明授权
    • Station-to-station full duplex communication in a token ring local area
network
    • 站点到站在一个丁香环本地区网络的全双工通信
    • US5155726A
    • 1992-10-13
    • US468480
    • 1990-01-22
    • Barry A. SpinneyHenry S. YangWilliam R. Hawe
    • Barry A. SpinneyHenry S. YangWilliam R. Hawe
    • H04L5/14H04L12/433
    • H04L12/433H04L5/1423
    • A technique for establishing and maintaining full duplex communication between two stations connected to a token ring network, without physically reconfiguring the station connections or otherwise disturbing the network. In an auto-configuration full duplex mode of operation, each station ascertains whether there are only two active stations on the network and, if so, performs an exchange of frames with the other station to establish full duplex communication. One way to ascertain whether only two stations are active is for each station to transmit periodically a neighbor information frame, which contains the indentities of the source station and the source station's nearest upstream neighbor. Once established, full duplex communication can proceed at a greater bandwidth than communication in a token ring network, and without latency delays and distance limitations associated with token ring networks. Periodic checks are made by each station in full duplex communication, to ascertain if the other station is still participating or if any third station has become active. In either case, stations in the auto-configuration mode revert to token ring mode automatically. In a variant form of the invention, stations can operate in a fixed full duplex mode, in which the detection of tokens or third stations are merely reported and do not necessarily result in reversion to the token ring mode.
    • 6. 发明授权
    • Negotiation protocol for establishment of full duplex communication on a
token ring network
    • 用于在令牌环网上建立全双工通信的协商协议
    • US5414700A
    • 1995-05-09
    • US226423
    • 1994-04-12
    • Henry S. YangBarry A. SpinneyWilliam R. HaweLuc A. Pariseau
    • Henry S. YangBarry A. SpinneyWilliam R. HaweLuc A. Pariseau
    • H04L5/14H04L12/433H04J3/02H04L12/28
    • H04L12/433H04L5/1423
    • A technique for establishing and maintaining full duplex communication between two stations connected to a token ring network, without physically reconfiguring the station connections or otherwise disturbing the network. Each station continually performs a two node test to ascertain whether there are only two active stations on the network, and updates a two node flag that indicates whether or only two active stations are present. The two node test uses both upstream neighbor and downstream neighbor addresses to update the two node flag, and requires validation of either one of these addresses if the other one of them appears to have changed since the previous observation. A concurrently running full duplex control process uses the two node flag and other conditions to decide whether to initiate or continue transition to full duplex mode. The control process uses an exchange of full duplex request and acknowledgment frames and completes the transition to full duplex mode when each station has transmitted and received a Restricted Token.
    • 一种用于在连接到令牌环网络的两个站之间建立和维持全双工通信的技术,而无需物理地重新配置站点连接或以其他方式干扰网络。 每个站连续执行两节点测试,以确定网络上是否只有两个活动站,并更新指示是否存在两个活动站的两个节点标志。 双节点测试使用上游邻居和下游邻居地址来更新两个节点标志,并且如果从上一次观察看,其中一个似乎已经改变,则需要验证这两个地址之一。 同时运行的全双工控制过程使用两个节点标志和其他条件来决定是启动还是继续转换到全双工模式。 控制过程使用全双工请求和确认帧的交换,并且当每个站已经发送和接收到限制令牌时,完成向全双工模式的转换。
    • 7. 发明授权
    • Station-to-station full duplex communication in a token ring local area
network
    • 令牌环局域网中的站到站全双工通信
    • US5305306A
    • 1994-04-19
    • US23741
    • 1993-02-25
    • Barry A. SpinneyHenry S. YangWilliam R. Hawe
    • Barry A. SpinneyHenry S. YangWilliam R. Hawe
    • H04L5/14H04L12/433H04J3/02H04L12/42
    • H04L12/433H04L5/1423
    • A technique for establishing and maintaining full duplex communication between two stations connected to a token ring network, without physically reconfiguring the station connections or otherwise disturbing the network. In an auto-configuration full duplex mode of operation, each station ascertains whether there are only two active stations on the network and, if so, performs an exchange of frames with the other station to establish full duplex communication. One way to ascertain whether only two stations are active is for each station to transmit periodically a neighbor information frame, which contains the identities of the source station and the source station's nearest upstream neighbor. Once established, full duplex communication can proceed at a greater bandwidth than communication in a token ring network, and without latency delays and distance limitations associated with token ring networks. Periodic checks are made by each station in full duplex communication, to ascertain if the other station is still participating or if any third station has become active. In either case, stations in the auto-configuration mode revert to token ring mode automatically. In a variant form of the invention, stations can operate in a fixed full duplex mode, in which the detection of tokens or third stations are merely reported and do not necessarily result in reversion to the token ring mode.
    • 一种用于在连接到令牌环网络的两个站之间建立和维持全双工通信的技术,而无需物理地重新配置站点连接或以其他方式干扰网络。 在自动配置全双工操作模式下,每个站确定网络上是否只有两个活动站,如果是,则与其他站执行帧建立全双工通信。 确定只有两个站是活动的一种方式是每个站周期性地发送包含源站和源站最近的上游邻居的标识的邻居信息帧。 一旦建立,全双工通信可以以比令牌环网络中的通信更大的带宽进行,并且没有与令牌环网络相关联的延迟延迟和距离限制。 每个台站进行全双工通信进行定期检查,以确定其他站是否仍在参与,或者任何第三站是否已经活动。 在任一情况下,自动配置模式下的站自动恢复为令牌振铃模式。 在本发明的变型形式中,站可以以固定的全双工模式操作,其中仅报告令牌或第三站的检测,并且不一定导致向令牌环模式的逆转。
    • 8. 发明授权
    • Wireless switched network
    • 无线交换网络
    • US07970408B2
    • 2011-06-28
    • US12556079
    • 2009-09-09
    • Gary VaconPaul D. CallahanFloyd J. BackesWilliam R. Hawe
    • Gary VaconPaul D. CallahanFloyd J. BackesWilliam R. Hawe
    • H04W40/00
    • H04W16/10H04W24/02
    • An access point in a wireless network includes an external indication of the access point's proximity to another access point. The external indication can be a LED that blinks at a rate that is related to the proximity of the access point to the other access point. An access point is also capable of producing a network map that indicates the access point's proximity relative to other access points that are coupled to the network. The access point is further capable of monitoring wireless network traffic to ascertain whether wireless network traffic has exceeded a threshold, and if so, releasing some client devices so that wireless network traffic no longer exceeds the threshold. The access point is also capable of automatically choosing one of a plurality of radio frequencies on which to operate. The access point chooses a frequency after evaluating frequencies on which other access points may be operating.
    • 无线网络中的接入点包括接入点与另一接入点的接近的外部指示。 外部指示可以是以与接入点与其他接入点的接近度相关联的速率闪烁的LED。 接入点还能够产生指示接入点相对于耦合到网络的其他接入点的接近度的网络映射。 接入点还能够监视无线网络流量,以确定无线网络流量是否已经超过阈值,如果是,则释放一些客户端设备,使得无线网络流量不再超过阈值。 接入点还能够自动选择要操作的多个射频中的一个。 接入点在评估其他接入点可能在操作的频率之后选择频率。
    • 9. 发明授权
    • Method and apparatus for end-to-end encryption of a data packet in a
computer network
    • 用于计算机网络中的数据分组的端到端加密的方法和装置
    • US5594869A
    • 1997-01-14
    • US432331
    • 1995-05-01
    • William R. HaweButler W. LampsonAmar Gupta
    • William R. HaweButler W. LampsonAmar Gupta
    • H04L29/06G06F7/00
    • H04L63/0485H04L29/06H04L63/12H04L63/162
    • A technique to facilitate decryption processing of information packets transmitted over a communication network after encryption in accordance with a specific network protocol, the details of which may be subject to later change as standards are developed or modified. Programmable registers are used in the decryption process to hold information for identifying an incoming information packet as being subject to the specific protocol and requiring decryption, and identifying a starting location of a data field to be decrypted. Specifically one programmable register contains a first offset locating an identifier field in the packet, in which a cryptographic identifier will be found if the packet is one conforming to the protocol; another programmable register contains a cryptographic identifier value that will be found in the identifier field if decryption is to be performed, and a third programmable register contains a second offset to locate the beginning of a data field to be decrypted.
    • 一种用于根据特定网络协议在加密之后通过通信网络传送的信息分组的解密处理的技术,其细节可能随着标准的开发或修改而随之而变化。 解密过程中使用可编程寄存器来保存用于识别进入信息包的信息为受特定协议的约束,并且需要解密,以及识别要被解密的数据字段的起始位置。 具体地,一个可编程寄存器包含定位分组中的标识符字段的第一偏移,其中如果分组是符合该协议的密钥标识符,将找到密码标识符; 另一个可编程寄存器包含将要在执行解密时在标识符字段中找到的加密标识符值,并且第三可编程寄存器包含第二偏移量以定位待解密的数据字段的开始。
    • 10. 发明授权
    • Method and apparatus for transparently bridging traffic across wide area
networks
    • 用于透明地桥接广域网的流量的方法和装置
    • US5870386A
    • 1999-02-09
    • US816316
    • 1991-12-30
    • Radia Joy PerlmanWilliam R. HaweJohn A. Harper
    • Radia Joy PerlmanWilliam R. HaweJohn A. Harper
    • H04L12/46H04L12/701H04L12/703H04L12/705H04L12/753
    • H04L45/28H04L12/4604H04L12/462H04L12/4633H04L45/00H04L45/18H04L45/48
    • A technique for logically connecting local area networks (LANs) that may be separated by wide area networks containing routers and other network components. A logical link is formed between two bridge-like devices called tunnelers, such that, once a tunnel has been established between two LANs, other devices on the LANs can communicate as if the tunnel were a bridge. The tunneling mechanism of the invention requires that each LAN or extended LAN have only one active tunneler at any particular time, referred to as the designated tunneler, and each of the tunnelers is configured to have knowledge of the identities of the other tunnelers. A tunnel is established after a successful exchange of messages between two tunnelers, and then traffic may be forwarded through the tunnel in a transparent manner. The tunneling mechanism permits messages to be forwarded between LANs separated by a wide area network containing routers. Moreover, the mechanism permits filtering of traffic, such that only selected types of traffic, or messages for selected destinations or from selected sources, are forwarded through tunnels. The tunneling mechanism inherently precludes the formation of closed communication loops. An alternate embodiment of the invention optimizes the configuration process for particular network topologies.
    • 一种用于逻辑连接可能由包含路由器和其他网络组件的广域网分隔的局域网(LAN)的技术。 在称为隧道传输器的两个类似桥的设备之间形成逻辑链路,使得一旦在两个LAN之间建立了隧道,则LAN上的其他设备可以像隧道是桥接一样进行通信。 本发明的隧道机制要求每个LAN或扩展LAN在任何特定时间仅具有一个主动隧道,称为指定的隧道,并且每个隧道被配置为具有其他隧道的身份知识。 在两个隧道之间成功交换消息之后建立隧道,然后可以透明地通过隧道转发流量。 隧道机制允许在由包含路由器的广域网分离的LAN之间转发消息。 此外,该机制允许对流量进行过滤,使得仅选择类型的流量或者所选目的地或来自所选源的消息通过隧道转发。 隧道机制固有地阻止了封闭通信环路的形成。 本发明的替代实施例优化了特定网络拓扑的配置过程。