MA44944A1 - Humanoid network network architecture and method of implementation - Google Patents
Humanoid network network architecture and method of implementationInfo
- Publication number
- MA44944A1 MA44944A1 MA44944A MA44944A MA44944A1 MA 44944 A1 MA44944 A1 MA 44944A1 MA 44944 A MA44944 A MA 44944A MA 44944 A MA44944 A MA 44944A MA 44944 A1 MA44944 A1 MA 44944A1
- Authority
- MA
- Morocco
- Prior art keywords
- network
- layer
- decisions
- control layer
- control
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
La présente invention concerne une architecture de réseau d'un réseau humanoïde et un procédé de mise en œuvre, se rapportant au domaine de l'architecture de réseau, de l'architecture de réseau comprenant une couche d'utilisateur, une couche réseau, une couche de commande et une couche d'application. La couche d'utilisateur est utilisée pour fournir des informations à la couche de commande ; la couche réseau est utilisée pour transmettre et recevoir des données, exécuter un ordre provenant de la couche de commande, détecter un état de réseau, des informations d'environnement et des connaissances d'autres réseaux, et les soumettre à la couche de commande ; la couche de commande est utilisée pour acquérir et traiter des informations provenant de la couche d'application, de la couche d'utilisateur et de la couche réseau, et sauvegarder les informations traitées et la connaissance des autres réseaux, et est également utilisée pour générer des connaissances associées à l'état de réseau et des décisions et ajouter celles-ci à une base de données ; une entité de commande est utilisée pour obtenir des décisions sur la base de l'état de réseau actuel, effectuer une pratique de prise de décision au moyen d'une simulation, estimer le temps optimal pour mettre en œuvre les décisions, mettre en œuvre les décisions, évaluer un résultat et renvoyer le résultat ; et la couche d'application est utilisée pour recevoir les informations fournies par la couche de commande et fournir des informations requises pour la couche de commande. La présente invention augmente la robustesse du réseau, améliore la défense contre les attaques de réseau, et offre des fonctions et des performances de meilleure qualité.The present invention relates to a network architecture of a humanoid network and a method for implementing, relating to the field of network architecture, the network architecture comprising a user layer, a network layer, a network architecture control layer and an application layer. The user layer is used to provide information to the control layer; the network layer is used to transmit and receive data, execute an order from the control layer, detect network state, environment information and knowledge of other networks, and submit them to the control layer; the control layer is used to acquire and process information from application layer, user layer and network layer, and save the processed information and knowledge of other networks, and is also used to generate knowledge associated with network state and decisions and add these to a database; a control entity is used to obtain decisions based on the current network state, perform decision-making practice through simulation, estimate optimal time to implement decisions, implement decisions decisions, evaluate a result and return the result; and the application layer is used to receive the information provided by the control layer and provide information required for the control layer. The present invention increases the robustness of the network, improves the defense against network attacks, and provides better features and performance.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710188751.4A CN107425997B (en) | 2017-03-27 | 2017-03-27 | The network architecture and implementation method of class people net |
PCT/CN2017/103576 WO2018176768A1 (en) | 2017-03-27 | 2017-09-27 | Network architecture of humanoid network and implementation method |
Publications (2)
Publication Number | Publication Date |
---|---|
MA44944A1 true MA44944A1 (en) | 2019-10-31 |
MA44944B1 MA44944B1 (en) | 2020-05-29 |
Family
ID=60424129
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MA44944A MA44944B1 (en) | 2017-03-27 | 2017-09-27 | Humanoid network network architecture and method of implementation |
Country Status (4)
Country | Link |
---|---|
CN (1) | CN107425997B (en) |
MA (1) | MA44944B1 (en) |
RU (1) | RU2704538C1 (en) |
WO (1) | WO2018176768A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111292523B (en) * | 2018-12-06 | 2023-04-07 | 中国信息通信科技集团有限公司 | Network intelligent system |
US11706101B2 (en) | 2020-12-04 | 2023-07-18 | A5G Networks, Inc. | Distributed, self-adjusting and optimizing core network with machine learning |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6317438B1 (en) * | 1998-04-14 | 2001-11-13 | Harold Herman Trebes, Jr. | System and method for providing peer-oriented control of telecommunications services |
US20030217125A1 (en) * | 2002-05-15 | 2003-11-20 | Lucent Technologies, Inc. | Intelligent end user gateway device |
US7966654B2 (en) * | 2005-11-22 | 2011-06-21 | Fortinet, Inc. | Computerized system and method for policy-based content filtering |
US8396083B2 (en) * | 2008-03-31 | 2013-03-12 | Qualcomm Incorporated | Determinative segmentation resegmentation and padding in radio link control (RLC) service data units (SDU) |
US10492102B2 (en) * | 2009-01-28 | 2019-11-26 | Headwater Research Llc | Intermediate networking devices |
EP2647239A1 (en) * | 2010-12-03 | 2013-10-09 | Huawei Technologies Co., Ltd. | Method and apparatus of communications |
CN102025781A (en) * | 2010-12-07 | 2011-04-20 | 南京邮电大学 | Service awareness method based on distributed monitoring and management structure |
CN102098799B (en) * | 2011-01-26 | 2013-04-03 | 北京邮电大学 | Intelligent cognitive wireless network system for realizing heterogeneous network convergence |
CN102592171A (en) * | 2011-12-30 | 2012-07-18 | 南京邮电大学 | Method and device for predicting cognitive network performance based on BP (Back Propagation) neural network |
CN103888285A (en) * | 2013-12-02 | 2014-06-25 | 江苏达科信息科技有限公司 | Cognitive network resource intelligent management method |
CN105515822A (en) * | 2015-11-24 | 2016-04-20 | 武汉邮电科学研究院 | Internet architecture driven by big data and realization method |
-
2017
- 2017-03-27 CN CN201710188751.4A patent/CN107425997B/en active Active
- 2017-09-27 MA MA44944A patent/MA44944B1/en unknown
- 2017-09-27 WO PCT/CN2017/103576 patent/WO2018176768A1/en active Application Filing
- 2017-09-27 RU RU2019107978A patent/RU2704538C1/en active
Also Published As
Publication number | Publication date |
---|---|
MA44944B1 (en) | 2020-05-29 |
CN107425997B (en) | 2019-08-06 |
RU2704538C1 (en) | 2019-10-29 |
CN107425997A (en) | 2017-12-01 |
WO2018176768A1 (en) | 2018-10-04 |
BR112019005315A2 (en) | 2019-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11297109B2 (en) | System and method for cybersecurity reconnaissance, analysis, and score generation using distributed systems | |
US11388198B2 (en) | Collaborative database and reputation management in adversarial information environments | |
US11991214B2 (en) | System and method for self-adjusting cybersecurity analysis and score generation | |
CN107146015B (en) | Multivariable time series prediction method and system | |
US20230067128A1 (en) | Prioritizing security controls using a cyber digital twin simulator | |
US20230362200A1 (en) | Dynamic cybersecurity scoring and operational risk reduction assessment | |
US11023577B2 (en) | Anomaly detection for time series data having arbitrary seasonality | |
US10229160B2 (en) | Search results based on a search history | |
US20160226893A1 (en) | Methods for optimizing an automated determination in real-time of a risk rating of cyber-attack and devices thereof | |
US20220060512A1 (en) | System and methods for automatically assessing and improving a cybersecurity risk score | |
CN104504084A (en) | Method and device for determining user retention rate | |
US20240244090A1 (en) | Cybersecurity analysis and protection using distributed systems | |
US20140304653A1 (en) | Method For Generating Rules and Parameters for Assessing Relevance of Information Derived From Internet Traffic | |
US20170142151A1 (en) | Server grouping system | |
MA44944B1 (en) | Humanoid network network architecture and method of implementation | |
US20170004217A1 (en) | Method and apparatus for deriving and using trustful application metadata | |
US20130318609A1 (en) | Method and apparatus for quantifying threat situations to recognize network threat in advance | |
WO2021243321A1 (en) | A system and methods for score cybersecurity | |
Verburg et al. | Setting the yardstick: A quantitative metric for effectively measuring tactile internet | |
US20240171614A1 (en) | System and method for internet activity and health forecasting and internet noise analysis | |
EP3586249A1 (en) | Importance sketching of influence dynamics in massive-scale networks | |
Fazzinga et al. | PARTY: A mobile system for efficiently assessing the probability of extensions in a debate | |
US11810011B2 (en) | Generation of predictive model metrics using intermediate operations | |
Chindipha | Evaluation of the Effectiveness of Small Aperture Network Telescopes as IBR Data Sources | |
EP3021268A1 (en) | Estimation of subscriber churn behaviour in telecommunication networks |