会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明申请
    • FAULT LOCATION
    • 故障位置
    • US20100110903A1
    • 2010-05-06
    • US12532478
    • 2008-01-11
    • Martin W. SpottRichard E. TatesonSimon G. Thompson
    • Martin W. SpottRichard E. TatesonSimon G. Thompson
    • H04L1/00H04L12/28
    • H04L43/0811H04L41/0677H04L43/065H04L45/22H04L45/28H04W8/005H04W24/00H04W40/248
    • The nodes (200, 201), etc in a hierarchical network are also capable of forming direct wireless connections between each other. Each node checks on a regular basis to determine whether its network connection is intact. If a node (211) discovers that its direct broadband connection (31, 21, 33, 24, 34) to the exchange (2) has failed, it autonomously communicates with other nodes (201, 202, 212, 220) in the physical neighbourhood, using its wireless capability. It first searches for a path through a WIFI connection to its immediate neighbours in the hierarchy to attempt to reach a working node (210, 212) connected to the same Distribution Point (21). (These are not necessarily the nearest neighbours in the wireless network). The nodes collect and store connectivity data on neighbouring nodes, and exchange connectivity data between themselves to identify nodes, and groups of nodes, that are not currently connected to the branched network. Within each group of nodes which have exchanged connectivity information, one of the group is selected to transmit a report on connectivity to the network control centre, the remaining members of the group being suppressed from transmitting such reports. If it is not itself connected to the hierarchical network, the selected node (211) can now use the connection (37) to the closest working node (220) and its broadband connection (22, 25) to the network control centre (2) to inform the network operator of the fault and its likely location. If the nodes have formed two or more separate ad hoc networks, (e.g link 35 being absent) the information from the separate networks is aggregated at the network control centre (2) to identify failure points in the hierachical network.
    • 分层网络中的节点(200,201)等也能够形成彼此之间的直接无线连接。 每个节点定期检查以确定其网络连接是否完整。 如果节点(211)发现其到交换机(2)的直接宽带连接(31,21,33,24,34)已经失败,则它自动地与物理上的其他节点(201,202,212,220)通信 邻里,使用其无线功能。 它首先通过与层次结构中的直接邻居的WIFI连接搜索路径,以尝试到达连接到相同分发点(21)的工作节点(210,212)。 (这些不一定是无线网络中最近的邻居)。 节点收集并存储相邻节点上的连通性数据,并在它们之间交换连接数据,以识别当前未连接到分支网络的节点和节点组。 在已经交换了连通性信息的每个节点组内,选择该组中的一个来传送关于网络控制中心的连接的报告,该组的其余成员被禁止传送这样的报告。 如果它本身不连接到分级网络,则所选择的节点(211)现在可以使用到最近的工作节点(220)的连接(37)及其到网络控制中心(2)的宽带连接(22,25) 通知网络运营商故障及其可能的位置。 如果节点已经形成两个或多个单独的自组织网络(例如链路35不存在),则来自分离网络的信息在网络控制中心(2)处被聚合以识别等级网络中的故障点。
    • 9. 发明授权
    • Access control to shared resources
    • 对共享资源的访问控制
    • US07373338B2
    • 2008-05-13
    • US10784919
    • 2004-02-24
    • Simon G. ThompsonZhu TanYang LiNick Giles
    • Simon G. ThompsonZhu TanYang LiNick Giles
    • G06F7/00
    • G06F17/30734G06F17/3089G06F21/6227Y10S707/99933Y10S707/99935
    • Controlled access is provided to a shared resource 23 such as an ontology (knowledge database) in order to maintain its quality without restraining the ability of users 21a, 21b, 21c . . . to contribute to that resource.An edit and query function 26 is used to determine the validity and consistency of individual contributions. The results of these checks and the level of contribution made by individual users to the information resource is used to produce a rating for each user of the resource, which is stored (24a, 24b . . . ) for use in prioritise and manage future contributions to the resource 23, provide metadata on the resource and to prioritise access control 28 to the resource.When a new contribution is made by a user a threshold of approval can be set before it is accepted into the main database 23. This threshold is based on the sum of the ratings points of the original contributor and of users that give their assent to the inclusion of that contribution.
    • 将控制访问提供给诸如本体(知识数据库)的共享资源23,以便在不限制用户21a,21b,21c的能力的情况下保持其质量。 。 。 为该资源做出贡献。 编辑和查询功能26用于确定个人贡献的有效性和一致性。 这些检查的结果和个人用户对信息资源的贡献程度被用于为资源的每个用户产生一个评级,该资源被存储(24a,24b ...)以用于优先和管理 对资源23的未来贡献提供资源上的元数据并且优先考虑资源的访问控制28。 当用户作出新的贡献时,可以在将其批准进入主数据库23之前设置批准阈值。 这个阈值是基于原始贡献者和同意列入该捐款的用户的评分数之和。