白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

System and method of identification of packet nodes

專利號(hào)
US11159413B2
公開(kāi)日期
2021-10-26
申請(qǐng)人
JIO PLATFORMS LIMITED(IN Ahmedabad)
發(fā)明人
Siddharth Shanker Singh; Gaurav Kumar; Rishi Raj Koul
IPC分類
H04L12/26
技術(shù)領(lǐng)域
violator,node,nodes,daisy,δt,packet,twamp,loss,silo,probe
地域: Ahmedabad

摘要

System and method for identifying nodes with packet loss in a wireless communication network. The method comprises a central probe server—establishing a TWAMP session with a plurality of nodes. The central probe server probes the plurality of nodes for packet loss for a time duration ΔT and categorizes each of the plurality of nodes as one of violator node and non-violator node. A sectionalisation module retrieves a topology of the at least one violator node. The central probe server probes at least one neighboring node of the at least one violator node for packet loss for the time duration ΔT. The sectionalisation module identifies the at least one violator node as one of a silo node and a daisy chain node based on the probe of the at least one neighboring node.

說(shuō)明書(shū)

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority to Indian Patent Application No. 201921019931, filed May 20, 2019, the disclosure of which is hereby incorporated by reference herein in its entirety.

FIELD

The embodiments of present invention relate to wireless and wireline communication and more particular identification of packet nodes in the network that are errant nodes in real time and are responsible for packet loss.

BACKGROUND

The following description of related art is intended to provide background information pertaining to the field of the invention. This section may include certain aspects of the art that may be related to various features of the present invention. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present invention, and not as admissions of prior art.

權(quán)利要求

1
We claim:1. A method for identifying nodes with packet loss in a wireless communication network comprising a plurality of nodes, the method comprising:establishing, by a central probe server, a TWAMP session with the plurality of nodes;probing, by the central probe server, the plurality of nodes for packet loss for a time duration ΔT;categorizing, by the central probe server, each of the plurality of nodes as one of a violator node and a non-violator node;retrieving, by a sectionalisation module, a topology of the at least one violator node;probing, by the central probe server, at least one neighboring node of the at least one violator node for packet loss for the time duration ΔT; andidentifying, by the sectionalisation module, the at least one violator node as one of a silo node and a daisy chain node based on the probe of the at least one neighboring node.2. The method as claimed in claim 1, wherein the at least one violator node is identified as a silo node in an event the central probe server determines no packet loss for the at least one neighboring node of the at least one violator node for the time duration ΔT.3. The method as claimed in claim 1, wherein the at least one violator node is identified as a daisy chain node in an event the central probe server determines packet loss for the at least one neighboring node of the at least one violator node for the time duration ΔT.4. The method as claimed in claim 3, the method further comprising:forming, by the sectionalisation module, at least one daisy chain comprising at least one violator node identified as daisy chain node for the time duration ΔT;determining, by an errant point identification module, an apex node and a tail node for the at least one daisy chain; andrecursively processing, by the errant point identification module, the apex node of the daisy chain, wherein the apex node is replaced by at least one immediate neighboring node of the apex node based on the processing.5. The method as claimed in claim 1, the method further comprising:maintaining, by the sectionalisation module, a topology database for the plurality of nodes; anddetermining, by the central probe server, the at least one neighboring node for the at least one violator node based on the topology database.6. The method as claimed in claim 1, wherein the plurality of nodes is categorized, by the central probe server, as one of a violator node and a non-violator node based on a threshold count of packet loss.7. A system for identifying nodes with packet loss in a wireless communication network comprising a plurality of nodes, the system comprising:the wireless network further comprising:a central probe server configured to:establish a TWAMP session with the plurality of nodes;probe the plurality of nodes for packet loss for a time duration ΔT;categorize each of the plurality of nodes as one of a violator node and a non-violator node;a sectionalisation module connected to the central probe server, said sectionalisation module configured to retrieve a topology of the at least one violator node;wherein the central probe server is further configured to identify at least one neighboring node of the at least one violator node for packet loss for the time duration ΔT; andwherein the sectionalisation module is further configured to identify the at least one violator node as one of a silo node and a daisy chain node based on the probe of the at least one neighboring node.8. The system as claimed in claim 7, wherein the sectionalisation module is further configured to identify the at least one violator node as a silo node in an event the central probe server determines no packet loss for the at least one neighboring node of the at least one violator node for the time duration ΔT.9. The system as claimed in claim 7, wherein the sectionalisation module is further configured to identify the at least one violator node as a daisy chain node in an event the central probe server determines packet loss for the at least one neighboring node of the at least one violator node for the time duration ΔT.10. The system as claimed in claim 7, wherein the sectionalisation module is further configured to form at least one daisy chain comprising at least one violator node identified as daisy chain node for the time duration ΔT.11. The system as claimed in claim 10, the system further comprising an errant point identification module connected to the sectionalisation module and the central probe server, said errant point identification module configured to:determine an apex node and a tail node for the at least one daisy chain; andrecursively process the apex node of the daisy chain, wherein the apex node is replaced by at least one neighboring node of the apex node based on the processing.12. The system as claimed in claim 7, wherein:the sectionalisation module is further configured to maintain a topology database for the plurality of nodes; andthe central probe server is further configured to determine the at least one neighboring node for the at least one violator node based on the topology database.13. The system as claimed in claim 7, wherein the central probe server is further configured to plurality of nodes is categorized, by the central probe server , as one of a violator node and a non-violator node based on a threshold count of packet loss.14. A non-transitory computer-readable medium comprising instructions for causing a computer to perform a method comprising:establishing a TWAMP session between a central probe server and the plurality of nodes;probing the plurality of nodes for packet loss for a time duration ΔT;categorizing each of the plurality of nodes as one of a violator node and a non-violator node;retrieving a topology of the at least one violator node;probing at least one neighboring node of the at least one violator node for packet loss for the time duration ΔT; andidentifying the at least one violator node as one of a silo node and a daisy chain node based on the probe of the at least one neighboring node.
微信群二維碼
意見(jiàn)反饋