CN1571369A - Method for ensuring consistency between controlled users of snooping network side and snooping triggering side - Google Patents

Method for ensuring consistency between controlled users of snooping network side and snooping triggering side Download PDF

Info

Publication number
CN1571369A
CN1571369A CNA031495524A CN03149552A CN1571369A CN 1571369 A CN1571369 A CN 1571369A CN A031495524 A CNA031495524 A CN A031495524A CN 03149552 A CN03149552 A CN 03149552A CN 1571369 A CN1571369 A CN 1571369A
Authority
CN
China
Prior art keywords
controlled user
user data
target
synchronisation source
controlled
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA031495524A
Other languages
Chinese (zh)
Other versions
CN100499514C (en
Inventor
程作品
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031495524A priority Critical patent/CN100499514C/en
Publication of CN1571369A publication Critical patent/CN1571369A/en
Application granted granted Critical
Publication of CN100499514C publication Critical patent/CN100499514C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method of assuring the consistency of controlled user data between monitoring network side and monitoring triggering side, including: A. setting one of the monitoring network side and monitoring triggering side as a synchronous source and the other as a synchronous object; B. the synchronous source sends its own controlled user data to the synchronous object; C. the synchronous object compares its own controlled user data with that of the synchronous source: if the synchronous object has no corresponding controlled user data to be the same as that of the synchronous source, correspondingly adding or deleting the controlled user data in the synchronous object according to the controlled user data of the synchronous source. The method assures the consistency of the controlled user data between the monitoring network side and the monitoring triggering side.

Description

Guarantee to monitor the method for network side and the controlled users consistency of monitoring triggering side
Technical field
The present invention relates to monitoring technique, particularly a kind of method that guarantees to monitor network side and the controlled users consistency of monitoring triggering side.
Background technology
Lawful Interception is the requirement of answering state's laws, and operator provides monitoring triggering interface, equipment manufacturers to provide and monitors network side voice and incident transmission solution.According to legal mandate, state security organization can require Virtual network operator or service provider that the snoop results of specific objective is provided to specific monitoring authorities or actuator (LEA).
At present, Lawful Interception is normally realized according to the scheme that circuit domain of stipulating in ETSI (ETSI) agreement and packet domain are separated from each other, is existed the audiomonitor of variety of way and the networking mode of equipment room.As shown in Figure 1, Fig. 1 is for monitoring the structure chart of network, this is monitored network and is made up of listening center (LEMF), legal access function equipment (LIAF) and mobile switching centre (MSC) or other preservation controlled user data equipment, interface between LEMF and the LIAF is HI1, HI2 and HI3, wherein, HI1 is the interface that is used for transfer management information, and HI2 is the interface that is used to transmit Intercept related information, and HI3 is the interface that is used to transmit Content of communciation; LIAF and MSC or other interfaces of preserving between the controlled user data equipment are X1-1, X2, X3, and wherein, X1-1 is the interface that is used for transfer management information, and X2 is the interface that is used to transmit Intercept related information, and X3 is the interface that is used to transmit Content of communciation.
Controlled user's registration or cancel process and the relevant interface transport process as shown in Figure 2, this monitoring system is made up of MSC or other preservation controlled user data equipment of LEMF that monitors network side and monitoring triggering side, LEMF and MSC or other are preserved between the controlled user data equipment and are connected (not providing among the figure) by LIAF, and its specific descriptions are:
Step 1, when controlled user registers, LEMF preserves controlled user data equipment by HI1, X1-1 interface to MSC or other and sends and set controlled user instruction, this is set controlled user instruction and comprises controlled user profile, interception type and time etc.;
Step 2, MSC or other preservation controlled user data equipment are handled the controlled user instruction of the described setting of step 1, handling the back returns the setting success or sets unsuccessful result to LEMF by X1-1, if what return is MSC or the controlled user's successful result of other preservation controlled user data apparatus settings, then preserve this controlled user of mark on the controlled user data equipment at MSC or other, otherwise, preserve on the controlled user data equipment not this controlled user of mark at MSC or other;
What return is to set successful result if step 3 step 2 is described, this controlled user data of record on LEMF equipment then, otherwise, on LEMF equipment, do not write down this controlled user data;
Step 4, when controlled user cancels, LEMF preserves controlled user data equipment by HI1, X1-1 interface to MSC or other and sends and cancel controlled user instruction, this is cancelled controlled user instruction and comprises controlled user profile;
Step 5, MSC or other are preserved controlled user data equipment and are cancelled controlled user instruction and handle step 4 is described, if MSC or other are preserved the controlled user's success of controlled user data device revocation, then preserve this controlled user of deletion on the controlled user data equipment at MSC or other, and return the successful result of deletion to LEMF by X1-1, otherwise, on MSC or other preservation controlled user data equipment, do not delete this controlled user, and return the unsuccessful result of deletion to LEMF by X1-1;
That return is the successful result of deletion if step 6 step 5 is described, then deletes this controlled user data on LEMF equipment, otherwise, on LEMF equipment, do not delete this controlled user data.
There are following situation in the setting recited above or the process of cancelling:
Situation one, because network is former thereby cause the controlled user data monitored between network side and the monitoring triggering side inconsistent: preserve controlled user data equipment to may being wide area network or local area network (LAN) the LEMF from MSC or other, no matter all might there be the situation of data transmission exception in the sort of network, as: lost data packets etc.For example: preserve the controlled user's success of setting on the controlled user data equipment at MSC or other, it is to having lost that but the successful setting result who returns is transmitted on Network Transmission, at this moment controlled user will occur has sign at MSC, does not have the situation of expression at listening center.
Situation two, owing to unit exception causes the controlled user data monitored between network side and the monitoring triggering side inconsistent: preserve at MSC or other and to set controlled user's success on controlled user data equipment, the successful setting result who returns gives LEMF, but the equipment of LEMF has been paralysed, at this moment controlled user also can occur has sign at MSC, does not have the situation of expression at listening center.
Monitoring network side and the controlled user data between the monitoring triggering side that both of these case causes are inconsistent, will cause in the course of time owing to junk data is redundant to make whole monitoring system scarcity of resources, finally cause the monitoring system can't operate as normal.
Summary of the invention
In view of this, the invention provides a kind of method that guarantees to monitor network side and the controlled users consistency of monitoring triggering side, this method has guaranteed to monitor the controlled user data unanimity between network side and the monitoring triggering side, thereby guarantees the operate as normal of monitoring system.
According to above-mentioned purpose, technical scheme of the present invention is achieved in that
A kind of method that guarantees to monitor network side and the controlled users consistency of monitoring triggering side, this method comprises:
A, be provided with and monitor one of network side and monitoring triggering side and be synchronisation source, opposite side is synchronous target;
B, synchronisation source send to synchronous target to the controlled user data of self;
C, synchronous target are compared the controlled user data of self with the controlled user data from synchronisation source, if there is not synchronously corresponding controlled user data identical in the target, then adds or delete controlled user data according to the controlled user data of synchronisation source is corresponding in target synchronously with controlled user data from synchronisation source.
Described step B is provided with the verification end mark that this is taken turns after further being included in and sending controlled user data;
Described step C further comprises if there is in the target synchronously corresponding controlled user data identical with controlled user data from synchronisation source, then to this identical controlled user data a mark is set;
Judge and verify end mark, if set, then verify and finish, target initiates to contain the controlled user's who was not labeled interpolation instruction or delete instruction to synchronisation source synchronously, synchronisation source is received controlled user's interpolation that this instruction back basis was not labeled or the controlled user who deletes self, otherwise, continue to verify.
This method further comprises: a timer is set on synchronisation source, and when timer expiry, execution in step B.
Described step B further comprises: before synchronous target sent to synchronous target to the controlled user data of self, target sent the resource inspection instruction to synchronisation source synchronously at synchronisation source.
Described step B also comprises: when synchronous target sent to synchronous target to the controlled user data of self, target sent to synchronisation source to the controlled user data of self to synchronisation source synchronously at synchronisation source;
Described step C also comprises: target and synchronisation source are compared the controlled user data of self respectively with from the controlled user data of synchronisation source and synchronous target simultaneously synchronously, if do not have respectively in target and the synchronisation source synchronously corresponding controlled user data with from synchronisation source with the controlled user data of target is identical synchronously, then respectively according to synchronisation source and controlled user data corresponding simultaneously deletion controlled user data of adding or responding simultaneously in target and synchronisation source synchronously of target synchronously.
This method further comprises: on synchronisation source, a timer is set simultaneously with synchronous target, and when timer expiry, execution in step B1.
The described timer time regularly is minute being unit.
Described step B further comprises: adopt the mode of poll to send controlled user data.
The mode of described employing poll sends controlled user data and further comprises:
A, the position that label is set are 0, and the controlled user data that each transmission is set is a definite value;
B, send this definite value the controlled user data number to synchronous target, the position of this label is added this definite value;
C, judge whether the position of this label is last controlled user data, if, finish this label position poll, otherwise, step b returned.
Described monitoring network side comprises listening center, and described monitoring triggering side comprises mobile switching centre or preserves the equipment of controlled user data.
By technique scheme as can be seen, in order to guarantee the operate as normal of monitoring system, the present invention is provided with the controlled user data unanimity of monitoring between network side and the monitoring triggering side.For the controlled user data unanimity of monitoring between network side and the monitoring triggering side is set, the present invention has adopted the regularly method of resource inspection.Method provided by the invention has guaranteed to monitor the controlled user data unanimity between network side and the monitoring triggering side, has reduced the appearance of junk data, thereby reduces the shared monitoring system resource of junk data, guarantees the operate as normal of monitoring system.
Description of drawings
Fig. 1 is for monitoring the structure chart of network.
Fig. 2 is controlled user's registration or cancels process and relevant interface transport process figure.
Fig. 3 is the controlled user's of the present invention registration or an enforcement illustration of cancelling process.
Fig. 4 is the controlled user's of the present invention registration or another enforcement illustration of cancelling process.
Embodiment
In order to make the purpose, technical solutions and advantages of the present invention clearer, by the following examples and with reference to accompanying drawing, the present invention is described in more detail.
The present invention adopts to increase and decrease between the equipment of the MSC of LEMF that monitors network side and monitoring triggering side or other preservation controlled user data and confirms instruction or increase the timing verification mechanism, makes the controlled user data unanimity between monitoring network side and the monitoring triggering side.
As shown in Figure 3, Fig. 3 is the controlled user's of the present invention registration or an enforcement illustration of cancelling process, and it increases on the X1-1 interface between LEMF and the MSC confirms instruction, and the concrete steps of this process are:
When controlled user registers:
Steps A 1, LEMF preserve the controlled user instruction of controlled user data equipment transmission setting by HI1, X1-1 interface to MSC or other, and this is set controlled user instruction and comprises controlled user profile, interception type and time etc.;
Step B1, MSC or other are preserved controlled user data equipment the controlled user instruction of steps A 1 described setting are handled, if MSC or other are preserved the controlled user's success of controlled user data apparatus settings, then return and set controlled user's successful result, and preserve timer T1 of startup on the controlled user data equipment at MSC or other, otherwise, process ends;
What return is to set successful result if step C1 step B1 is described, then on LEMF equipment, write down this controlled user data, preserve controlled user data equipment for simultaneously MSC or other and return the affirmation instruction, otherwise, this controlled user data on LEMF equipment, do not write down;
Step D1, MSC or other were preserved controlled user data equipment and receive the affirmation instruction in the times of timer T1 defined, then on MSC or other preservation controlled user data equipment, do not do operation, otherwise, then preserve this controlled user data of deletion on the controlled user data equipment at MSC or other.
When controlled user cancels:
Steps A 2, LEMF cancel controlled user instruction by HI1, X1-1 interface to MSC or other preservation controlled user data equipment transmissions, and this is cancelled controlled user instruction and comprises controlled user profile;
Step B2, MSC or other are preserved controlled user data equipment and are cancelled controlled user instruction and handle steps A 2 is described, if MSC or other are preserved the controlled user's success of controlled user data unit deletion, that then return is the result who cancels controlled user's success, and preserve timer T1 of startup on the controlled user data equipment at MSC or other, otherwise, process ends;
That return is the successful result of deletion if step C2 step B2 is described, then on LEMF equipment, delete this controlled user data, preserve controlled user data equipment for simultaneously MSC or other and return the affirmation instruction, otherwise, this controlled user data on LEMF equipment, do not deleted;
Step D2, MSC or other are preserved controlled user data equipment and receive the affirmation instruction in timer T1 official hours, then on MSC or other preservation controlled user data equipment, do not operate, otherwise, then on MSC or other preservation controlled user data equipment, delete controlled user data.
The present invention can also verification mechanism guarantees to monitor network side and the consistent problem of monitoring triggering side controlled user data by increasing regularly, its detailed process as shown in Figure 4, Fig. 4 is the controlled user's of the present invention registration or another enforcement illustration of cancelling process, specifies as follows:
Steps A 3, preserving controlled user data equipment when LEMF and MSC or other can both proper communication, and the communication between the two just often, opens a timer T2 on LEMF, and the time span of this timer T2 can be a minute level;
Step B3, when the overtime triggering of timer T2, preserve controlled user data equipment to all MSC that link to each other with LEMF or other and initiate resource inspection and instruct by the X1-1 interface;
Step C3, after MSC or other are preserved controlled user data equipment and are received this resource inspection instruction, set a label, according to label position poll ground controlled user data is fed back to LEMF by X1-1, set label process can for: the position that the beginning label is set is 0, the number of users that at every turn feeds back to LEMF is 10, MSC or other preservation controlled user data equipment return and are numbered 0~9 controlled user data when asking for the first time, the position that label is set simultaneously is 10, as so continuous correction label position, if label position is run into the end, then rounds of inquiries finish;
Step D3, according to the controlled user profile in the resource inspection return messages, LEMF compares the controlled user profile of returning with the controlled user profile of LEMF, if there is not corresponding controlled user to be complementary, then cancels this controlled user or this user is added among the LEMF.
The resource inspection process also can be exchanging between LEMF and MSC or other preservation controlled user data equipment, promptly based on LEMF, regularly sending out resource inspection has instructed, specifically describe as follows: steps A 4, preserving controlled user data equipment when LEMF and MSC or other can both proper communication, and the communication between the two just often, preserves timer T2 of unlatching on the controlled user data equipment at MSC or other;
Step B4, preserve LEMF that controlled user data equipment links to each other by the X1-1 interface to all and MSC or other and initiate resource inspection and instruct when timer T2 is overtime when triggering;
Step C4, LEMF set a label after receiving this resource inspection instruction, according to label position poll ground controlled user data are fed back to MSC or other preservation controlled user data equipment by X1-1;
Step D4, according to the controlled user profile in the resource inspection return messages, MSC or other are preserved controlled user data equipment the controlled user profile of returning are compared with MSC or other controlled user profile of preserving in the controlled user data equipment, if there is not corresponding controlled user to be complementary, then initiation is cancelled this controlled user instruction or this user is added in MSC or other preservation controlled user data equipment.
In order further to guarantee the tightness of resource inspection process, the present invention has also increased the verification end mark, below preserve controlled user data equipment based on MSC or other, send resource to LEMF and regularly verify instruction this method, its detailed process is: steps A 5, preserving controlled user data equipment when LEMF and MSC or other can both proper communication, and the communication between the two just often, preserves timer T2 of unlatching on the controlled user data equipment at MSC or other;
Step B5, preserve LEMF that controlled user data equipment links to each other by the X1-1 interface to all and MSC or other and initiate resource inspection and instruct when timer T2 is overtime when triggering;
Step C5, LEMF set a label after receiving this resource inspection instruction, according to label position poll ground controlled user data are fed back to MSC or other preservation controlled user data equipment by X1-1, and resource inspection is provided with the verification end mark after finishing;
Step D5, according to the controlled user profile in the resource inspection return messages, MSC or other are preserved controlled user data equipment the controlled user profile of returning are compared with MSC or other controlled user profile of preserving in the controlled user data equipment, if there is not corresponding controlled user to be complementary, then initiation is cancelled this controlled user instruction or this user is added in MSC or other preservation controlled user data equipment, if have corresponding controlled user to be complementary, then the controlled user's of set mark;
Step e 5, judge that this is taken turns and whether finish according to verifying end mark, if finish, then MSC or other are preserved controlled user data equipment the user data that does not have mark and cross are initiated to add instruction or MSC or other are preserved controlled user data unit deletion operation to LEMF, this user who does not have mark to cross is meant in the resource inspection return messages not this user, and MSC or other preservation controlled user data equipment contain this user, otherwise, continue to verify.
The resource inspection process also can be two-way, LEMF and MSC or other are preserved controlled user data equipment all as main body, simultaneously send out the resource inspection request, and simultaneously the controlled user data of self is done corresponding deletion or interpolation according to the resource inspection return messages to the other side.
Resource inspection also can adopt the PUSH formula, that is: a side of reception resource inspection request is a passive type, as long as LEMF and MSC or other are preserved controlled user data equipment operate as normal, and mutual communication is normal, a side who then sends the resource inspection request needn't send the resource inspection request to a side who receives the resource inspection request, but regularly controlled user data is issued a side who receives the resource inspection request, allow a side who receives the resource inspection request directly verify the controlled user data of sending, and according to the result who verifies, deletion or the controlled user data of adding a side who receives the resource inspection request.
Controlled user data between network side and the monitoring triggering side is set, the process of cancelling has increased the affirmation interface monitoring in the present invention, greatly reduces owing to transmission abnormality or unit exception make the inconsistent situation of both sides' controlled user data; The present invention has increased the regularly mechanism of resource inspection, can guarantee to monitor the consistency of the controlled user data between network side and the monitoring triggering side, thereby can not cause owing to rubbish is redundant to make the monitoring system scarcity of resources, finally cause the situation that monitoring system can't operate as normal.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being made within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, a kind of method that guarantees to monitor network side and the controlled users consistency of monitoring triggering side is characterized in that this method comprises:
A, be provided with and monitor one of network side and monitoring triggering side and be synchronisation source, opposite side is synchronous target;
B, synchronisation source send to synchronous target to the controlled user data of self;
C, synchronous target are compared the controlled user data of self with the controlled user data from synchronisation source, if there is not synchronously corresponding controlled user data identical in the target, then adds or delete controlled user data according to the controlled user data of synchronisation source is corresponding in target synchronously with controlled user data from synchronisation source.
2, the method for claim 1 is characterized in that,
Described step B is provided with the verification end mark that this is taken turns after further being included in and sending controlled user data;
Described step C further comprises if there is in the target synchronously corresponding controlled user data identical with controlled user data from synchronisation source, then to this identical controlled user data a mark is set;
Judge and verify end mark, if set, then verify and finish, target initiates to contain the controlled user's who was not labeled interpolation instruction or delete instruction to synchronisation source synchronously, synchronisation source is received controlled user's interpolation that this instruction back basis was not labeled or the controlled user who deletes self, otherwise, continue to verify.
3, the method for claim 1 is characterized in that, this method further comprises: a timer is set on synchronisation source, and when timer expiry, execution in step B.
4, the method for claim 1 is characterized in that, described step B further comprises: before synchronous target sent to synchronous target to the controlled user data of self, target sent the resource inspection instruction to synchronisation source synchronously at synchronisation source.
5, the method for claim 1 is characterized in that,
Described step B also comprises: when synchronous target sent to synchronous target to the controlled user data of self, target sent to synchronous target to the controlled user data of self to synchronisation source synchronously at synchronisation source;
Described step C also comprises: target and synchronisation source are compared the controlled user data of self respectively with from the controlled user data of synchronisation source and synchronous target simultaneously synchronously, if do not have respectively in target and the synchronisation source synchronously corresponding controlled user data with from synchronisation source with the controlled user data of target is identical synchronously, then respectively according to synchronisation source and controlled user data corresponding simultaneously deletion controlled user data of adding or responding simultaneously in target and synchronisation source synchronously of target synchronously.
6, method as claimed in claim 4 is characterized in that, this method further comprises: on synchronisation source, a timer is set simultaneously with synchronous target, and when timer expiry, execution in step B1.
As claim 3 or 6 described methods, it is characterized in that 7, the described timer time regularly is minute being unit.
8, the method for claim 1 is characterized in that, described step B further comprises: adopt the mode of poll to send controlled user data.
9, method as claimed in claim 8 is characterized in that, the mode of described employing poll sends controlled user data and further comprises:
A, the position that label is set are 0, and the controlled user data that each transmission is set is a definite value;
B, send this definite value the controlled user data number to synchronous target, the position of this label is added this definite value; C, judge whether the position of this label is last controlled user data, if, finish this label position poll, otherwise, step b returned.
10, the method for claim 1 is characterized in that, described monitoring network side comprises listening center, and described monitoring triggering side comprises mobile switching centre or preserves the equipment of controlled user data.
CNB031495524A 2003-07-16 2003-07-16 Method for ensuring consistency between controlled users of snooping network side and snooping triggering side Expired - Fee Related CN100499514C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031495524A CN100499514C (en) 2003-07-16 2003-07-16 Method for ensuring consistency between controlled users of snooping network side and snooping triggering side

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031495524A CN100499514C (en) 2003-07-16 2003-07-16 Method for ensuring consistency between controlled users of snooping network side and snooping triggering side

Publications (2)

Publication Number Publication Date
CN1571369A true CN1571369A (en) 2005-01-26
CN100499514C CN100499514C (en) 2009-06-10

Family

ID=34472584

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031495524A Expired - Fee Related CN100499514C (en) 2003-07-16 2003-07-16 Method for ensuring consistency between controlled users of snooping network side and snooping triggering side

Country Status (1)

Country Link
CN (1) CN100499514C (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100413261C (en) * 2006-01-04 2008-08-20 华为技术有限公司 Method and system of data recovering
CN102857949A (en) * 2012-09-14 2013-01-02 中兴通讯股份有限公司 Method and device for planning data consistency guarantees

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100413261C (en) * 2006-01-04 2008-08-20 华为技术有限公司 Method and system of data recovering
CN102857949A (en) * 2012-09-14 2013-01-02 中兴通讯股份有限公司 Method and device for planning data consistency guarantees
WO2014040488A1 (en) * 2012-09-14 2014-03-20 中兴通讯股份有限公司 Method and device for guaranteeing consistency of planning data

Also Published As

Publication number Publication date
CN100499514C (en) 2009-06-10

Similar Documents

Publication Publication Date Title
CN1191725C (en) Method for making data transmission more effective and a data transmission protocol
CN102395156B (en) Data transmission methods and device applied between packet data convergence protocol (PDCP) entity and radio link control (RLC) entity
CN1251446C (en) Method of defending network transmission control protocol sync message from overflowing attack
RU2487485C2 (en) Method of controlling transmission window and retransmission and transmitting device
US20100105334A1 (en) Radio link control status reporting and polling
CN101047618A (en) Method and system for acquiring network route information
CN1753408A (en) Method for handling discarding of a sequence of service data units and communication apparatus
CN1988533B (en) Method for realizing IuUP/NBUP protocol process control function
CN101030842A (en) Method and apparatus for rearranging data in mobile telecommunication system
CN101039310A (en) Link sharing service apparatus and communication method thereof
CN1889414A (en) Method for transmitting status PDU based on missing PDU detection mechanism
CN1870551A (en) Distribution type group communication management system and method for setting group
HUE026068T2 (en) Transaction management
CN101051967A (en) Communication system and its method for user's device in user's network
CN1452830A (en) Data transmission protocol
CN105007308A (en) File transmission method for use in database isolation device environment
CN1977497A (en) Lossless radio link control entity (RLC) re-establishment avoiding service data unit (SDU) duplication
CN1317870C (en) Method for guaranteeing reliability of data transmission from one point to multiple points
CN1835474A (en) Text transmission method in protocal network of mobile internet
CN1571369A (en) Method for ensuring consistency between controlled users of snooping network side and snooping triggering side
CN110557369A (en) high-speed data processing platform based on domestic operating system kernel mode
CN101060488A (en) Connection adapter for communication device
CN1463123A (en) Method for retransmiting and discarding data packet of authentication service protocol for dialed from remote user
CN1822565A (en) Network with MAC table overflow protection
CN1863035A (en) Method for improving checking function fault-tolerant performance of counter

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090610

Termination date: 20200716