Patent classifications
H04L12/64
Table Entry In Software Defined Network
A forwarding flow table request sent by a host device when the host device fails to find a matching forwarding flow table entry for a data packet to be forwarded is received, when a destination MAC address of the data packet is the global virtual MAC address, a forwarding flow table entry is generated according to the global port table; the forwarding flow table entry includes an operation indication of replacing the destination MAC address of the data packet with the matching MAC address found in the global port table; and the forwarding flow table entry is sent to the host device, so that the host device may forward a data packet matching the forwarding flow table entry.
DATA FORWARDING METHOD, DEVICE, AND SYSTEM IN SOFTWARE-DEFINED NETWORKING
Data forwarding method, device, and system are provided for software-defined networking. An SDN control device delivers a proactive flow entry according to network topology information, where the proactive flow entry is unrelated to a service, and instead related to the network topology information. The proactive flow entry may be reused during data forwarding. After data is received, the SDN control device delivers reactive flow entries to some switching devices, where the reactive flow entries are related to the service, but are delivered to a subset of switching devices. This reduces flow entries delivered by the SDN control device to some switching devices, so that occupation of resources of the SDN control device and a switching device by flow entries is reduced.
Method and device for processing data security channel
Embodiments of the present invention provide a method and a device for processing a data security channel of a tunnel, where the method includes: receiving an authentication and authorization request of an access side, and determining a trust relationship of access of a user equipment; and when an S6b interface session of the user equipment exists, sending a message including information about the trust relationship of the access of the user equipment to a packet data gateway, so that the packet data gateway establishes or updates a data security channel of an S2c tunnel according to the information about the trust relationship.
Policy control method and apparatus for terminal peripheral
Provided are a policy control method and device for one or more terminal peripherals. The method includes: an M2M gateway executing one or more operations for one or more terminal peripherals according to a transaction trigger condition in policy definition, wherein the one or more operations for the one or more terminal peripherals are one or more operations corresponding to the transaction trigger condition in the policy definition. The solution solves the technical problem in the related art that it is impossible to implement control for one or more terminal peripherals through the M2M gateway according to the policy definition, which implements policy control of one or more terminal peripherals through the M2M gateway and improves the intelligent degree of an M2M system.
Method and apparatus for processing packet on trill network
The present invention provides a method for processing a packet on a TRILL network, relates to the field of communications, and can effectively defend against a network packet attack. The method includes: receiving a packet sent by a device on a network; if it is determined that the device is a trusted RB, giving up performing a security check on the packet coming from the device; and if it is determined that the device is not a trusted RB, performing a security check on the packet coming from the device. The present invention further provides a corresponding apparatus.
Method for modifying M2M service setting and apparatus therefor
The present invention relates to a method and apparatus for modifying a machine-to-machine (M2M) service setting in an M2M system, comprising the steps of: transmitting at least one policy information to at least one device, wherein each of the at least one policy information comprises scope information and condition information; and if the state of an M2M gateway corresponds to a state of which the condition information is indicative, transmitting a first notification indicative of a state change of the M2M gateway to a device of which the scope information is indicative.
Adaptive home and commercial automation devices, methods and systems based on the proximity of controlling elements
A LED based illumination source with integrated communications and processing functions, which can communicate via wireless communications to a mobile phone, smart phone, smart pad, notebook, tablet, desktop or other computing device. The LED based illumination source is programmed to operate autonomously, and is able to alter its behavior, based on the proximity of a controlling element. The communications and processing functions can also be integrated into other household and commercial electrical devices, such as wall outlets, light switches, plug in timers, appliances, and the like.
System and method for efficient transport of large data files
Telecommunication networks are under stress due to rapid traffic increase cause mostly by large file transfers. Disclosed herein is a cross-layer transport protocol specifically designed to efficiently handle large transactions. Traffic generated from large transactions is shaped into a periodic succession of fixed-size data frames. Each transaction can then be scheduled for transmission using a two-way reservation protocol. Exemplary results show that the proposed approach is capable of significantly improving goodput and end-to-end delay relative to TCP, improving efficiency of bandwidth utilization by over 40%.
Method for tethering a communications device
A method for tethering a communications device which is capable of providing access to a data network to a second device which requires access to the data network, includes configuring a WLAN subsystem of the communications device to act as a wireless station. The method further includes configuring a router subsystem of the communications device to route data received by the WLAN subsystem from the second device and intended for the data network to a cellular modem subsystem of the communications device, and to route data from the data network received by the cellular modem subsystem and intended for the second device to the WLAN subsystem.
MAXIMUM TRANSMISSION UNIT INSTALLATION FOR NETWORK TRAFFIC ALONG A DATAPATH IN A SOFTWARE DEFINED NETWORK
In some examples, a maximum transmission unit (MTU) is installed by a Software-Defined Network (SDN) controller on a controlled network node for traffic along a datapath in an SDN. The installed MTU can, for example, be selected from MTU sizes in an MTU database for nodes along the datapath. For example, the installed MTU can be selected as the largest allowable MTU size based on the nodes of the datapath.