会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Wireless MAC and link-layer simulation modeling
    • 无线MAC和链路层仿真建模
    • US20070036088A1
    • 2007-02-15
    • US11501388
    • 2006-08-09
    • Pradeep SinghAlain CohenAlejandro Talavera-MartinezArun PasupathyPoonam SinghIbrahim Moral
    • Pradeep SinghAlain CohenAlejandro Talavera-MartinezArun PasupathyPoonam SinghIbrahim Moral
    • H04J1/16H04L12/413
    • H04W16/225H04W74/00
    • Simulation models of media access control and physical layer characteristics facilitate the simulation/emulation of a variety of phenomena that affect transmissions via a wireless media. Such phenomena include media access contention delays, packet drops, and retransmissions that are generally dependent upon changes in transmitter/receiver locations. Each wireless environment is characterized by a model of the communication channel that characterizes transmission effects based on the number of competing transmitters in the environment, which is dynamically determined based on the location of each node in the environment. Additionally, the location of nodes is used to simulate the effects of ‘hidden nodes’, nodes that are unknown to a transmitting node but can interfere with the reception of transmissions at a receiving node. Each device/node model in the wireless environment preferably accesses the same model of the communication channel, thereby minimizing the amount of detail required at each device model.
    • 介质访问控制和物理层特性的仿真模型有助于模拟/仿真影响通过无线介质传输的各种现象。 这种现象包括通常取决于发射机/接收机位置的改变的媒体接入争用延迟,分组丢弃和重传。 每个无线环境的特征在于基于环境中的竞争发射机的数量来表征传输效应的通信信道的模型,其基于环境中的每个节点的位置动态地确定。 另外,节点的位置用于模拟“隐藏节点”,发送节点未知的节点的影响,但可能会干扰接收节点的传输接收。 无线环境中的每个设备/节点模型优选地访问通信信道的相同模型,从而最小化每个设备模型所需的细节量。
    • 3. 发明申请
    • Tracing routing differences
    • 跟踪路由差异
    • US20070025328A1
    • 2007-02-01
    • US11494692
    • 2006-07-27
    • Alain CohenPradeep SinghVinod JeyachandranNitin Gupta
    • Alain CohenPradeep SinghVinod JeyachandranNitin Gupta
    • H04L12/28H04L12/56
    • H04L45/28H04L45/02H04L45/54
    • A routing validation method and system identifies routers that are likely to be the cause of differences in forwarding tables associated with two versions of a network. Each destination sub-network prefix is processed to identify all the routers that exhibit differences in their forwarding table for this prefix. Each router exhibiting a difference is assessed to determine whether the difference may have been propagated to this router from another router. If the difference could not have been propagated from another router, this router is identified as a potential source of the observed difference. By eliminating routers that could have received the effects of the differences from another router, the task of identifying the root cause of the observed differences is substantially reduced in complexity.
    • 路由验证方法和系统识别可能是与两个网络版本相关联的转发表中的差异的原因的路由器。 处理每个目标子网络前缀以标识在其前缀的转发表中表现出差异的所有路由器。 评估每个出现差异的路由器,以确定差异是否可能已经从另一个路由器传播到该路由器。 如果差异不能从另一个路由器传播,则该路由器被识别为观察到的差异的潜在来源。 通过消除可能已经接收到来自另一个路由器的差异的影响的路由器,识别所观察到的差异的根本原因的任务在复杂性上显着降低。
    • 4. 发明申请
    • Analyzing security compliance within a network
    • 分析网络中的安全合规性
    • US20070157286A1
    • 2007-07-05
    • US11505171
    • 2006-08-16
    • Pradeep SinghAnkit AgarwalAlain CohenVenuprakash BarathanVinod Jeyachandran
    • Pradeep SinghAnkit AgarwalAlain CohenVenuprakash BarathanVinod Jeyachandran
    • H04L9/00
    • H04L41/28H04L12/2697H04L41/0866H04L41/0893H04L41/145H04L41/22H04L43/50H04L63/1433H04L63/20
    • A security policy database identifies the intended security policies within a network, a traffic generator provides test traffic that is configured to test each defined security policy, and a simulator simulates the propagation of this traffic on a model of the network. The model of the network includes the configuration data associated with each device, and thus, if devices are properly configured to enforce the intended security policies, the success/failure of the simulated test traffic will conform to the intended permit/deny policy of each connection. Differences between the simulated message propagation and the intended security policies are reported to the user, and diagnostic tools are provided to facilitate identification of the device configuration data that accounts for the observed difference. Additionally, if a network's current security policy is unknown, test traffic is generated to reveal the actual policy in effect, to construct a baseline intended security policy.
    • 安全策略数据库标识网络中的预期安全策略,流量生成器提供被配置为测试每个定义的安全策略的测试流量,并且模拟器模拟该流量在网络模型上的传播。 网络模型包括与每个设备相关联的配置数据,因此,如果设备被正确配置以实施预期的安全策略,则模拟测试流量的成功/失败将符合每个连接的预期允许/拒绝策略 。 向用户报告模拟消息传播与预期安全策略之间的差异,并提供诊断工具以便于识别出所观察到的差异的设备配置数据。 此外,如果网络当前的安全策略未知,则生成测试流量以显示实际的实际策略,以构建基准预期的安全策略。
    • 6. 发明申请
    • Incremental update of virtual devices in a modeled network
    • 模拟网络中虚拟设备的增量更新
    • US20070067351A1
    • 2007-03-22
    • US11503553
    • 2006-08-11
    • Pradeep SinghRaymond OnleyNishant GuptaAlain Cohen
    • Pradeep SinghRaymond OnleyNishant GuptaAlain Cohen
    • G06F17/30
    • G06F17/30286
    • In a network simulation system, a compiler is provided to support incremental updates to the configuration data associated with the modeled network. Each incremental change is identified and logged, to facilitate configuration management and select roll-backs to prior configurations. Because each update is processed and managed individually, and integrated automatically into the overall system configuration, the overhead associated with keeping a configuration database up-to-date is substantially reduced, thereby increasing the likelihood that all configuration changes will be reflected in the modeled network. In a preferred embodiment, the same data is used to incrementally update the configuration model and to execute the change in the actual system, thereby further reducing the overhead and assuring a correspondence between the modeled network and the actual network.
    • 在网络仿真系统中,提供编译器来支持与建模网络相关联的配置数据的增量更新。 识别和记录每个增量更改,以便于配置管理,并选择回滚到以前的配置。 由于每个更新被单独处理和管理,并且自动整合到整个系统配置中,所以与保持配置数据库的最新状态相关联的开销大大减少,从而增加了所有配置更改将反映在建模网络中的可能性 。 在优选实施例中,相同的数据用于递增地更新配置模型并执行实际系统中的改变,从而进一步降低开销并确保建模网络与实际网络之间的对应关系。
    • 7. 发明申请
    • Identifying and analyzing network configuration differences
    • 识别和分析网络配置差异
    • US20070058570A1
    • 2007-03-15
    • US11505228
    • 2006-08-16
    • Pradeep SinghAlain CohenAnkit Agarwal
    • Pradeep SinghAlain CohenAnkit Agarwal
    • H04L12/28
    • H04L41/0866H04L41/0859
    • A contextual and semantic analysis of network entities facilitates a mapping and comparison of the entities between network models. The system includes a plurality of refine handler and match handler pairs that use rules that are specific to the type of network entities being analyzed. The refine handler analyzes the network model to identify the entities for which its rules apply, and the match handler processes these identified entities to establish a pairing between corresponding entities in each model. A sequence of refine-match processes are applied to the network models, typically in accordance with a hierarchy of rules until each entity is identified as a matched, added, or removed entity. A difference handler processes the identified pairings to provide a difference analysis that facilitates a meaningful interpretation of the configuration changes, and a user interface provides an interactive environment to view the differences from different perspectives.
    • 网络实体的上下文和语义分析有助于网络模型之间的实体的映射和比较。 该系统包括使用特定于正在分析的网络实体的类型的规则的多个精简处理程序和匹配处理程序对。 精简处理程序分析网络模型以识别其规则适用的实体,匹配处理程序处理这些标识的实体以在每个模型中的对应实体之间建立配对。 精细匹配过程的序列通常根据规则的层次结构应用于网络模型,直到每个实体被识别为匹配的,添加的或移除的实体。 差异处理程序处理识别的配对以提供有助于对配置更改进行有意义的解释的差异分析,并且用户界面提供交互式环境以从不同的角度来查看差异。
    • 8. 发明申请
    • Routing validation
    • 路由验证
    • US20070025355A1
    • 2007-02-01
    • US11494441
    • 2006-07-27
    • Alain CohenPradeep SinghVinod JeyachandranNitin Gupta
    • Alain CohenPradeep SinghVinod JeyachandranNitin Gupta
    • H04L12/56
    • H04L45/28H04L41/0631H04L41/08H04L41/0866H04L41/14H04L41/145H04L45/02H04L45/124
    • A simulator simulates routing system protocols to build routing tables corresponding to a modeled network, and a comparator compares the routing tables in the actual network to these simulator-created routing tables. Because the modeled system represents a fault-free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator-produced routing tables will represent the ‘ideal’ routing tables that should be present in the routers of the actual network. By querying each router in the actual network for its routing table and comparing each routing table to the corresponding simulator-produced routing table, any differences from the ‘ideal’ can be identified.
    • 模拟器模拟路由系统协议以构建与建模网络相对应的路由表,并且比较器将实际网络中的路由表与这些模拟器创建的路由表进行比较。 因为建模的系统代表了实际系统的无故障版本,并且假设建模的路由系统协议代表实际路由器中使用的算法,则这些模拟器生成的路由表将表示应该应用的“理想”路由表 存在于实际网络的路由器中。 通过查询实际网络中的每个路由器的路由表,并将每个路由表与相应的模拟器生成的路由表进行比较,可以识别与“ideal”的任何差异。
    • 9. 发明申请
    • Wireless network hybrid simulation
    • 无线网络混合仿真
    • US20050055196A1
    • 2005-03-10
    • US10923214
    • 2004-08-20
    • Alain CohenPradeep Singh
    • Alain CohenPradeep Singh
    • G06F9/455H04L12/24H04L12/56
    • H04W16/18H04L41/145H04W40/02
    • A simulation method and system partitions network traffic into background traffic and explicit traffic, wherein explicit traffic is processed in detail, and background traffic is processed at a more abstract level. The packets of explicit traffic are modeled in complete detail, so that precise timing and behavior characteristics can be determined, whereas large volumes of traffic are modeled more abstractly as background flows, and only certain aspects, such as routing through the network, are simulated. Tracer packets are used to model the background traffic and carry a number of characteristics of interest for generating simulation results. These tracer packets are propagated through the network in the same manner as any other simulated packet and therefore are processed through each element traversed by the propagation of the background traffic, but each single tracer packet is representative of all of the packets comprising the modeled background traffic. In this manner, the effect of the background traffic on the explicit traffic can be modeled at each network element. The abstract processing of background traffic is facilitated by techniques that include multi-variate table look-up, neural networks, and the like.
    • 模拟方法和系统将网络流量分为后台流量和显式流量,其中详细处理显式流量,并且以更抽象的级别处理后台流量。 明确流量的数据包将被详细建模,从而可以确定精确的时序和行为特征,而大量的流量则以抽象的形式作为后台流量进行建模,只能模拟某些方面,如通过网络的路由。 示踪器数据包用于对后台流量进行建模,并携带多个感兴趣的特性以生成仿真结果。 这些示踪器分组以与任何其他模拟分组相同的方式传播通过网络,并且因此通过后台业务的传播遍历的每个元素进行处理,但是每个单个跟踪分组代表包括建模后台业务的所有分组 。 以这种方式,可以在每个网络元件上对后台流量对显式流量的影响进行建模。 通过包括多变量表查找,神经网络等的技术来促进背景流量的抽象处理。