Patent classifications
H04L61/00
IMPLEMENTING QUEUES (FIFO) AND STACKS (FILO) ON TOP DISPERSED STORAGE
A computing device includes an interface to communicate with a dispersed storage network (DSN), a memory, and a processing module. The computing device receives, from another computing device, a write queue entry request to facilitate storage of one or more queue entries of a queue in a set of storage units (SUs). The computing device dispersed error encodes at least a portion of the write queue entry request to generate a set of queue entry encoded slices (QEESs). The computing device generates a write request, based on the write queue entry request, that includes a slice name corresponding to a QEES of the set of QEESs that includes a queue entry identifier (ID) field that includes a timestamp field and/or an entry number of the write queue entry request. The computing device transmits the write request to the set of SUs to facilitate distributed storage of the set of QEESs.
APPLICATION INTERACTION METHOD AND APPARATUS, AND TERMINAL
Embodiments of the present invention disclose an application interaction method and apparatus, and a terminal. The application interaction method includes: receiving application invitation information sent by a target application running in a first terminal, where the application invitation information carries application interaction information of the target application; detecting, according to the application interaction information, whether a currently triggered interactive application and the target application are a same application. If the interactive application and the target application are different applications, sending a notification message to an interaction application, corresponding to the application interaction information, in a preset storage area according to the application invitation information, so that the interaction application establishes a session connection to the target application according to the notification message. By means of the embodiments of the present invention, operations are easy, and application interaction processing efficiency can be improved.
Priority based anycast routing
A technique for selecting a network node from a plurality of nodes employing anycast addressing based on a priority. The plurality of nodes is configured with an anycast address. At each node, the anycast address is associated with a unique priority value that represents a priority associated with the node. Traffic destined for the anycast address is forwarded to the node whose priority value indicates the highest priority. If the node becomes unavailable, traffic destined for the anycast address is forwarded to a node whose priority value indicates the next highest priority, and so on.
Systems and methods utilizing peer measurements to detect and defend against distributed denial of service attacks
A method, operated by a Software Defined Networking (SDN) controller associated with an Autonomous System (AS) with one or more peering points, each peering point with an associated router communicatively coupled to the SDN controller, the method for detecting and defending against Distributed Denial of Service (DDoS) attacks, and the method includes receiving data from the one or more peering points; detecting malicious traffic at the one or more peering points; determining a peer quality measurement for the one or more peering points; and communicating the peer quality measurement and other data associated with the malicious traffic to one or more other SDN controllers, associated with Autonomous Systems connected through the one or more peering points, to facilitate convergence of the peer quality measurement back to a nominal level.
IDENTIFYING WIRELESS SERVICE
This document discloses a solution where a frame transferred in a wireless network comprises a group address, and wherein the group address comprises a service identifier identifying a service provided in the wireless network. Apparatuses of the wireless network may employ the group address to identify the service.
CYBERSECURITY SYSTEM FOR COMMON INTERFACE OF SERVICE-BASED ARCHITECTURE OF A WIRELESS TELECOMMUNICATIONS NETWORK
A method performed by a cybersecurity system includes monitoring multiple network functions (NFs) of a service-based architecture (SBA) of a 5G network. The NFs are communicatively interconnected over an HTTP/2 interface. The cybersecurity system detects potentially malicious network traffic communicated over the HTTP/2 interface, identifies a NFs or associated services that are susceptible to a cyberattack based on the potentially malicious network traffic and deploys resources to secure the NFs or associated services. In one example, the resources are prioritized for a most frequently used (MFU) or most recently used (MRU) NF or associated service.
CYBERSECURITY SYSTEM FOR COMMON INTERFACE OF SERVICE-BASED ARCHITECTURE OF A WIRELESS TELECOMMUNICATIONS NETWORK
A method performed by a cybersecurity system includes monitoring multiple network functions (NFs) of a service-based architecture (SBA) of a 5G network. The NFs are communicatively interconnected over an HTTP/2 interface. The cybersecurity system detects potentially malicious network traffic communicated over the HTTP/2 interface, identifies a NFs or associated services that are susceptible to a cyberattack based on the potentially malicious network traffic and deploys resources to secure the NFs or associated services. In one example, the resources are prioritized for a most frequently used (MFU) or most recently used (MRU) NF or associated service.
Packet forwarding method, apparatus, device, and system
Packet forwarding methods, apparatuses, devices, and systems are disclosed. An example packet forwarding system includes a target virtual machine, a virtual switch and a network card device, wherein: the target virtual machine is configured to send a first packet to the virtual switch; the virtual switch is configured to add input port information to the first packet to obtain a second packet after receiving the first packet sent by the target virtual machine, and forward the second packet to the network card device; and the network card device is configured to determine a corresponding first forwarding rule based on the input port information included in the second packet in response to receiving the second packet sent by the virtual switch, and perform forwarding processing on the second packet based on the first forwarding rule.
IP-based matching system
In one aspect, an example method includes (i) accessing, by a computing device, a first Internet Protocol (IP) address that encodes first attributes of a first profile; (ii) accessing, by the computing device, a second IP address that encodes second attributes of a second profile; (iii) comparing, by the computing device, the first IP address and the second IP address using a network layer communication function; (iv) determining, by the computing device, that a result of the comparing satisfies a threshold condition; and (v) based on the result of the comparing satisfying the threshold condition, providing, by the computing device to another device, an indication of a match between the first profile and the second profile.
Port number extension method and switch
A port number extension method and a switch are provided. A first switch determines bits for identifying the first switch in a Media Access Control (MAC) address in an identifier (ID) of a specified bridge; calculates a bit for port number extension according to the bits for identifying the first switch; and combines the bit for port number extension and original bits for specifying a port, to obtain new bits for specifying a port. In this way, a problem that Spanning Tree Protocol (STP) port numbers are insufficient in a super virtual fabric with a massive quantity of ports is resolved.