H04L49/30

METHOD AND SYSTEM FOR FACILITATING LOSSY DROPPING AND ECN MARKING
20230046350 · 2023-02-16 ·

Methods and systems are provided for performing lossy dropping and ECN marking in a flow-based network. The system can maintain state information of individual packet flows, which can be set up or released dynamically based on injected data. Each flow can be provided with a flow-specific input queue upon arriving at a switch. Packets of a respective flow are acknowledged after reaching the egress point of the network, and the acknowledgement packets are sent back to the ingress point of the flow along the same data path. As a result, each switch can obtain state information of each flow and perform per-flow packet dropping and ECN marking.

Communications management system with a separate peripherals server
11496578 · 2022-11-08 · ·

Systems and methods for managing an airport passenger processing system. The system includes a computing device and a peripheral device at an airport, a peripherals interface in communicative connection with the peripheral device and operable to execute a second client application, and a network outside the airport. The network includes a virtualization server for virtualizing an application for a first client application executed by the computing device and a peripherals manager in communication with the virtualization server. The first client application is configured to establish a first communication channel with the virtualization server for communication with an application virtualized on the virtualization server. The second client application is configured to establish a second communication channel with the peripherals manager. At least part of the network is configured to store an association between the first and second communication channels to associate the peripheral device with the computing device.

Automated access to racks in a colocation data center

Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the rack. In one method, a TOR switch is mounted in a rack. The TOR switch is connected to a network fabric of a data center. A lock is used to control physical access to the rack. A request to physically access the rack is received from a computing device (e.g., a badge implementing a security token, or a mobile device). The request includes authentication credentials. The computing device is then authenticated. In response to authenticating the computing device, the lock is configured to provide physical access to the rack.

System and method for low-latency network data switching

A digital crosspoint switch of a network switching system (NSS) replicates input data received via a first network interface to a first data processing port of a data processing card. The input data includes a digital market data feed comprising market-data packets. The crosspoint switch has internal crosspoint ports and external crosspoint ports. The data processing card includes a programmable logic device and a plurality of data processing ports connected to the internal crosspoint ports. The NSS includes a plurality of network interfaces connected to the external crosspoint ports. The data processing card processes the input data and generates processed data on the second data processing port at least in part by only including market-data packets that meet a first predetermined filtering criterion in the processed data. The crosspoint switch replicates the processed data from the second data processing port to the second network interface.

NON-POSTED WRITE TRANSACTIONS FOR A COMPUTER BUS

Systems and devices can include a controller and a command queue to buffer incoming write requests into the device. The controller can receive, from a client across a link, a non-posted write request (e.g., a deferred memory write (DMWr) request) in a transaction layer packet (TLP) to the command queue; determine that the command queue can accept the DMWr request; identify, from the TLP, a successful completion (SC) message that indicates that the DMWr request was accepted into the command queue; and transmit, to the client across the link, the SC message that indicates that the DMWr request was accepted into the command queue. The controller can receive a second DMWr request in a second TLP; determine that the command queue is full; and transmit a memory request retry status (MRS) message to be transmitted to the client in response to the command queue being full.

AUTOMATED ACCESS TO RACKS IN A COLOCATION DATA CENTER

Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the rack. In one method, a TOR switch is mounted in a rack. The TOR switch is connected to a network fabric of a data center. A lock is used to control physical access to the rack. A request to physically access the rack is received from a computing device (e.g., a badge implementing a security token, or a mobile device). The request includes authentication credentials. The computing device is then authenticated. In response to authenticating the computing device, the lock is configured to provide physical access to the rack.

METHOD AND DEVICE FOR PERFORMING COMMUNICATION IN SOFTWARE DEFINED NETWORK SYSTEM
20230031131 · 2023-02-02 ·

The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. According to the present disclosure, communication is performed more efficiently in a software defined network (SDN) environment.

Processing packets in an electronic device

A network traffic manager receives, from an ingress port in a group of ingress ports, a cell of a packet destined for an egress port. Upon determining that a number of cells of the packet stored in a buffer queue meets a threshold value, the manager checks whether the group of ingress ports has been assigned a token for the queue. Upon determining that the group of ingress ports has been assigned the token, the manager determines that other cells of the packet are stored in the buffer, and accordingly stores the received cell in the buffer, and stores linking information for the received cell in a receive context for the packet. When all cells of the packet have been received, the manager copies linking information for the packet cells to the buffer queue or a copy generator queue, and releases the token from the group of ingress ports.

Intermediary device for daisy chain and tree configuration in hybrid data/power connection

A plurality of intermediary devices may be interposed in a hybrid data/power connection between a power source and a powered device. In one aspect, the intermediary devices may be connected in series. Such connecting may be referred to as “daisy chaining.” In other aspects, the intermediary devices may be connected in a tree or a mesh. Each intermediary device may be configured to consume, for its own use, power that is supplied over the hybrid data/power connection and to deliver remaining power over the hybrid data/power connection to at least one other device. Furthermore, each intermediary device may be configured to independently route data and power to downstream devices.

Technologies for filtering network traffic on ingress

Technologies for filtering network traffic on ingress include a network interface controller (NIC) configured to parse a header of a network packet received by the NIC to extract data from a plurality of header fields of the header. The NIC is additionally configured to determine an input set based on the field vector, retrieve a matching list from a plurality of matching lists, and compare the input set to each of the plurality of rules to identify a matching rule of the plurality of rules that matches a corresponding portion of the input set. The NIC is further configured to perform an action on the network packet based on an actionable instruction associated with the one of the plurality of rules that matches the corresponding portion of the input set. Other embodiments are described herein.