Patent classifications
H04L12/4675
MULTI-PERSON POSE RECOGNITION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
In a multi-person pose recognition method, a to-be-recognized image is obtained, and a circuitous pyramid network is constructed. The circuitous network pyramid includes parallel phases, and each phase includes downsampling network layers, upsampling network layers, and a first residual connection layer to connect the downsampling and upsampling network layers. The phases are interconnected by a second residual connection layer. The circuitous pyramid network is traversed, by extracting a feature map for each phase, and the feature map of the last phase is determined to be the feature map of the to-be-recognized image. Multi-pose recognition is then performed on the to-be-recognized image according to the feature map to obtain a pose recognition result for the to-be-recognized image.
Method for Managing Virtual Private Network, and Device
In a method for managing a VPN, a routing device establishes a BMP session with a BMP server. The routing device allocates a VPN label associated with a VPN instance, wherein the VPN instance is used for communication between the routing device and another routing device. Then, the routing device sends, to the BMP server, a BMP message that carries the VPN label. Because the routing device sends the VPN label through the BMP message, the routing device does not need to establish a BGP peer relationship with the BMP server to send the VPN label.
Processing traffic in a virtualised environment
Traffic is processed in a virtualised environment comprising: (i) a physical underlay network; (ii) a first overlay network (an overlay of the physical underlay network and associated with a first set of network addresses, IP.sub.1); (iii) a second overlay network (an overlay of the first overlay network and associated with a second set of network addresses, IP.sub.2); and (iv) virtualised applications each having an execution environment and being associated with at least one network address in each of the first and second sets of network addresses, IP.sub.1 and IP.sub.2. In the execution environment of a first virtualised application: (i) traffic communicated from the first virtualised application to the first overlay network is encapsulated; and/or (ii) traffic communicated from the first overlay network to the first virtualised application is decapsulated. Tenant separation processing is performed outside the execution environments of the virtualised applications.
Logical router comprising disaggregated network elements
A logical router includes disaggregated network elements that function as a single router and that are not coupled to a common backplane. The logical router includes spine elements and leaf elements implementing a network fabric with front panel ports being defined by leaf elements. Control plane elements program the spine units and leaf to function a logical router. The control plane may define operating system interfaces mapped to front panel ports of the leaf elements and referenced by tags associated with packets traversing the logical router. Redundancy and checkpoints may be implemented for a route database implemented by the control plane elements. The logical router may include a standalone fabric and may implement label tables that are used to label packets according to egress port and path through the fabric.
Interoperability between symmetric and asymmetric EVPN IRB modes
A system and method are disclosed for enabling interoperability between asymmetric and symmetric Integrated Routing and Bridging (IRB) modes. A system is configured to receive a route advertisement, examine the label fields of the route advertisement, and determine whether Layer 2 or Layer 3 information is conveyed. The system is further configured to build a route advertisement to advertise to a second device based on whether Layer 2 or Layer 3 information is conveyed in the first route advertisement.
Techniques For Virtual Time Slotting Of Communications Packets
Techniques for transmitting data packets on a shared channel in a data communications network, include determining a time slot interval, T, based on a longest data packet to be transmitted on a shared channel in a data communications network. At a first node in the data communications network a local base time, t.sub.0, is determined equal to a time at an end of receipt of a successful acknowledgement control packet on the shared channel. A local data packet is transmitted from the first node onto the shared channel at a transmit time that is an integer multiple n of T after the local base time t.sub.0. The local data packet is determined to be successfully transmitted when a successful acknowledgement control packet that uniquely indicates the local data packet is received on the shared channel within the interval T of transmitting the local data packet.
DATA COMMUNICATION SERVICE OVER A VIRTUAL PRIVATE NETWORK GATEWAY, APPLICATION FUNCTION, AND NETWORK EXPOSURE FUNCTION
A data communication system serves a user application in a User Equipment (UE). The data communication system receives a subscription from an application server into a Network Exposure Function (NEF). The subscription is for user data from the user application in the UE. The data communication system receives the user data from the user application in the UE over a Virtual Private Network (VPN) and transfers the user data to the NEF. The data communication system transfers the user data from the NEF for delivery to the application server in response to the subscription.
Data Routing Through a Gateway Cluster of a Wide Area Network
An example includes a manager gateway of a gateway cluster, comprising processing circuitry and a memory including instructions that cause the gateway to generate a virtual IP address for each gateway of the gateway cluster. The instructions further cause the gateway to receive an indication that a client device has joined a LAN. The instructions further cause the gateway to determine an anchor gateway to which the client device is to be anchored. The instructions further cause the gateway to transmit a first message anchoring the client device to the anchor gateway. The instructions further cause the gateway to transmit a second message offering an address to the client device.
VXLAN Implementation Method, Network Device, and Communications System
A Virtual eXtensible Local Area Network (VXLAN) method comprises obtaining, by a network device, a mapping from a virtual local area network identifier VLAN ID to a VXLAN network identifier VNI; receiving, by the network device through a port, an Ethernet frame forwarded by an access device, where a VLAN tag field in the Ethernet frame includes the VLAN ID; adding, by the network device, a VXLAN header to the Ethernet frame based on the VLAN ID and the mapping to obtain a VXLAN packet, where a VNI field in the VXLAN header includes the VNI; and sending, by the network device, the VXLAN packet.
Manufacturing line computer system and network setup method of the same
Disclosed herein is a manufacturing line computer system including: first and second computers. The first computer includes a storage section adapted to store a template that associates role information of the second computer and a network address of the second computer; and a reply section adapted to return the network address of the second computer associated with the role information to the second computer in response to reception of the role information from the second computer. The second computer includes an input section adapted to input the role information of the second computer; a transmission section adapted to send the input role information of the second computer to the first computer; and a network address setup section adapted to specify the network address, returned from the first computer, for the second computer.