会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • PASSIVE MONITORING OF NETWORK PERFORMANCE
    • 被动监控网络性能
    • WO2008108697A1
    • 2008-09-12
    • PCT/SE2007/050134
    • 2007-03-08
    • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)MÅNGS, Jan-ErikEKELIN, SvanteMELANDER, BobFLINTA, Christofer
    • MÅNGS, Jan-ErikEKELIN, SvanteMELANDER, BobFLINTA, Christofer
    • H04L12/26
    • H04L12/2697H04L41/0896H04L41/5003H04L41/5009H04L43/0864H04L43/106H04L43/50
    • The present invention relates to methods and arrangements to measure network performance. The method comprises the following steps: - Transmitting via a communication network (IP) payload packets (21-24) from a sending node (GGSN/A) to a receiving node (GGSN/B). - Generating at the sending node (GGSN/A) a send specification (s21-s24, sid21-sid24) for each of at least one selected packet (21-24) of the transmitted payload packets (21-24). - Generating at the receiving node (GGSN/B), a receive specification (r21-r22, rid21-rid22, siz21- siz22) for each of at least one selected packet (21-22) of the transmitted payload packets (21-24). - Bringing together generated send specifications (s21-s24, sid21-sid24) and generated receive specifications (r21-r22, rid21-rid22, siz21-siz22). - Estimating network performance by utilizing corresponding specifications (sll-sl2, rll-rl2, siz21-siz22) of the brought together specifications.
    • 本发明涉及测量网络性能的方法和装置。 该方法包括以下步骤: - 经由通信网络(IP)有效载荷分组(21-24)从发送节点(GGSN / A)发送到接收节点(GGSN / B)。 - 在所发送的有效载荷分组(21-24)的至少一个所选分组(21-24)中的每一个上,在发送节点(GGSN / A)生成发送规范(s21-s24,sid21-sid24)。 - 在所述接收节点(GGSN / B)处生成所发送的有效载荷分组(21-24)中的至少一个所选分组(21-22)中的每一个的接收规范(r21-r22,rid21-rid22,siz21- siz22) )。 - 汇集生成的发送规格(s21-s24,sid21-sid24)和生成的接收规格(r21-r22,rid21-rid22,siz21-siz22)。 - 通过使用相应的规格(sll-sl2,rll-rl2,siz21-siz22)来估计网络性能。
    • 6. 发明申请
    • METHOD FOR MEASURING NETWORK PERFORMANCE USING INTERMEDIATE MEASUREMENT NODES
    • 使用中间测量节点测量网络性能的方法
    • WO2009070070A1
    • 2009-06-04
    • PCT/SE2007/050903
    • 2007-11-27
    • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)MELANDER, BobFLINTA, ChristopherEKELIN, SvanteMÅNGS, Jan-Erik
    • MELANDER, BobFLINTA, ChristopherEKELIN, SvanteMÅNGS, Jan-Erik
    • H04L12/26
    • H04L43/0894H04L43/106H04L43/12
    • The present invention relates to methods and arrangements to measure network performance, wherein a send specification (Sx;Sp) for each of at least one probe packet (X;P) is generated at a sending node (GGSN/A; GW/A). The probe packet is transmitted from the sending node on a communication path (A-D) in a communication network (IP; ETHERNET), towards a receiving node (GGSN/B; GW/B). The method comprises the following steps: - The probe packet (X;P) passes at least one intermediate measurement capable node (IMEN1-IMEN3) located on the path (A-D) between the sending node and the receiving node. - At least one time stamp specification (rx1-rx3, sx1-sx3; rp1-rp3, sp1-sp3) for the packet (X;P) is generated at the intermediate measurement capable node (IMEN1-IMEN3). - the probe packet is received by the receiving node (GGSN/B; GW/B) and a receive specification (Rx;Rp) is generated for the probe packet. - Network performance is estimated by utilizing generated specifications (Sx, rx1-rx3, sx1-sx3, Rx; Sp, rp1-rp3, sp1-sp3, Rp).
    • 本发明涉及测量网络性能的方法和装置,其中在发送节点(GGSN / A; GW / A)上生成用于至少一个探测分组(X; P)中的每一个的发送规范(Sx; Sp) 。 探测分组从通信网络(IP;以太网)中的通信路径(A-D)上的发送节点向接收节点(GGSN / B; GW / B)发送。 该方法包括以下步骤: - 探测分组(X; P)通过位于发送节点和接收节点之间的路径(A-D)上的至少一个中间测量能力节点(IMEN1-IMEN3)。 - 在中间测量能力节点(IMEN1-IMEN3)上生成用于分组(X; P)的至少一个时间戳规范(rx1-rx3,sx1-sx3; rp1-rp3,sp1-sp3)。 - 接收节点(GGSN / B; GW / B)接收探测分组,并为探测分组生成接收规范(Rx; Rp)。 - 通过利用生成的规范(Sx,rx1-rx3,sx1-sx3,Rx; Sp,rp1-rp3,sp1-sp3,Rp)来估计网络性能。
    • 7. 发明申请
    • A METHOD AND AN ARRANGEMENT OF IDENTIFYING TRAFFIC FLOWS IN A COMMUNICATION NETWORK
    • 通信网络中识别流量流量的方法和方案
    • WO2010074620A1
    • 2010-07-01
    • PCT/SE2008/051557
    • 2008-12-23
    • TELEFONAKTIEBOLAGET LM ERICSSON (publ)FLINTA, ChristoferMÅNGS, Jan-ErikMELANDER, Bob
    • FLINTA, ChristoferMÅNGS, Jan-ErikMELANDER, Bob
    • H04L12/56
    • H04L47/2441
    • A method of identifying traffic flows is provided in a traffic generating node, where each traffic flow is being associated with an application process running on the traffic generating node. The method is configured to perform a mapping operation, such that an application process is being linked to a signature that uniquely identifies a traffic flow and an associated socket, and such that the obtained linked information is maintained in a list. The mapping operation is configured to be executed in response to recognising a change to a socket associated with the application process at the traffic generating node. Based on accumulated mapping information, one or more processing element located at the traffic generating node, or at another node, may classify and/or control traffic flows associated with any of the application processes of the traffic generating node.
    • 在业务生成节点中提供了识别业务流的方法,其中每个业务流正在与在业务生成节点上运行的应用进程相关联。 该方法被配置为执行映射操作,使得应用进程被链接到唯一地标识业务流的签名和相关联的套接字,并且使得所获得的链接信息被维护在列表中。 映射操作被配置为响应于识别与业务生成节点处的应用进程相关联的套接字的改变而被执行。 基于积累的映射信息,位于业务生成节点处或另一节点处的一个或多个处理单元可以分类和/或控制与业务生成节点的任何应用进程相关联的业务流。
    • 8. 发明申请
    • CONFIGURATION OF A NETWORK NODE USING CAPTIVE MODE
    • 使用权限模式配置网络节点
    • WO2010056168A1
    • 2010-05-20
    • PCT/SE2008/051313
    • 2008-11-14
    • TELEFONAKTIEBOLAGET L M ERICSSON (publ)FLINTA, ChristoferMÅNGS, Jan-ErikMELANDER, Bob
    • FLINTA, ChristoferMÅNGS, Jan-ErikMELANDER, Bob
    • H04L12/24
    • H04L41/0806H04L41/0253H04L41/0293H04L41/18
    • The invention relates to a network node arranged to provide an end user of a network terminal in a local network with an access link to an external network, said network node is arranged to be connected between said local network and said external network. The network node is characterized in that it comprises a control unit arranged to in response to receiving a first triggering information, switch said network node from a normal operational mode into a captive mode, in which said control unit is further arranged to intercept any request from said network terminals to said external network, resolve said request to the IP address of the network node in the local network such that gateway information to the end user of said network terminals is provided. The invention also relates to a method for use in a network node and a computer program product.
    • 本发明涉及一种网络节点,被布置为向本地网络中的网络终端的终端用户提供到外部网络的接入链路,所述网络节点被布置为连接在所述本地网络和所述外部网络之间。 网络节点的特征在于,其包括控制单元,其被配置为响应于接收到第一触发信息,将所述网络节点从正常操作模式切换到捕获模式,其中所述控制单元进一步布置成拦截任何来自 所述网络终端到所述外部网络,将所述请求解析为本地网络中的网络节点的IP地址,从而提供到所述网络终端的终端用户的网关信息。 本发明还涉及一种在网络节点和计算机程序产品中使用的方法。
    • 10. 发明申请
    • A VIRTUALIZATION PLATFORM
    • 虚拟平台
    • WO2010041996A1
    • 2010-04-15
    • PCT/SE2008/051157
    • 2008-10-09
    • TELEFONAKTIEBOLAGET L M ERICSSON (publ)MÅNGS, Jan-ErikMELANDER, BobFLINTA, Christofer
    • MÅNGS, Jan-ErikMELANDER, BobFLINTA, Christofer
    • H04L29/06H04L12/46G06F9/455
    • H04L63/0272G06F9/455H04L12/4633H04L61/2015
    • The invention relates to a visualization platform (9) arranged to provide at least one virtual operating system instance (9A,...,9N) to at least one remote network (3) over a packet-based communication network (5). The visualization platform is characterized in that it comprises at least one first termination point (4b) of a virtual private network VPN tunnel (10) which enables the establishment of at least one VPN tunnel between said at least one first termination point and at least one second termination point (4a) in said at least one remote network over said packet-based communication network; and in that it is arranged to map said at least one virtual operating system instance to said at least one first termination point of said at least one VPN tunnel. The invention also relates to a method for virtualization and a computer program product.
    • 本发明涉及一种被配置为通过基于分组的通信网络(5)向至少一个远程网络(3)提供至少一个虚拟操作系统实例(9A,...,9N)的可视化平台(9)。 可视化平台的特征在于它包括虚拟专用网络VPN隧道(10)的至少一个第一终止点(4b),其能够在所述至少一个第一终止点和至少一个第一终端点之间建立至少一个VPN隧道 通过所述基于分组的通信网络在所述至少一个远程网络中的第二终止点(4a); 并且其中被布置为将所述至少一个虚拟操作系统实例映射到所述至少一个VPN隧道的所述至少一个第一终止点。 本发明还涉及虚拟化方法和计算机程序产品。