H04L69/03

Analyzing network data for debugging, performance, and identifying protocol violations using parallel multi-threaded processing

A device may receive network protocol data identifying a network protocol trace associated with network devices of a network, and may divide the network protocol trace into multiple segments. The device may identify a set of segments, in the multiple segments, that includes a first segment and second segments related to the first segment, and may process the multiple segments, in parallel, to determine first results data corresponding to the multiple segments. The device may process the second segments, in parallel, to determine second results data, and may combine the first results data and the second results data to generate final results data, wherein the final results data indicate utilization by the network devices of a network protocol associated with the network. The device may perform one or more actions based on the final results data.

CLOUD NATIVE SOFTWARE-DEFINED NETWORK ARCHITECTURE FOR MULTIPLE CLUSTERS

In an example, a network controller for an SDN architecture system includes processing circuitry of a central cluster of first one or more compute nodes; a configuration node configured for execution by the processing circuitry; a control node configured for execution by the processing circuitry. The configuration node includes a custom API server to process requests for operations on custom resources for SDN architecture configuration. Each of the custom resources for SDN architecture configuration corresponds to a type of configuration object in the SDN architecture system. The control node, in response to detecting an event on an instance of a first custom resource of the custom resources, obtains configuration data for the instance of the first custom resource and configures a corresponding instance of a configuration object in a workload cluster of second one or more compute nodes. The first and second compute nodes may be distinct.

Data Transmission Method and Device
20230155756 · 2023-05-18 ·

This application provides a data transmission method, a communications apparatus, a network device, a communications system, a storage medium, and a computer program product, to resolve a current problem that bandwidth waste is relatively severe when a service is carried based on a FlexE technology. In this application, a frame structure of a fine-granularity service frame is newly defined, so that service data can be transmitted in a time division multiplexing mode by using an Ethernet (ETH) interface.

Transmission of a packet data convergence protocol (PDCP) protocol data unit (PDU) in a wireless communication network

A method performed by a network node for transmission of a Packet Data Convergence Protocol, PDCP, Protocol Data Unit, PDU, to a wireless communications device is provided. The network node and the wireless communications device operate in a wireless communications network. The network node arranges (505) a number of PDCP PDUs in a numerical order based on their respective PDCP Sequence Number, SN. The number of PDCP PDUs is taken from a first set of PDCP PDUs comprising one or more first time transmitted PDCP PDUs and from a second set of PDCP PDUs comprising one or more retransmitted PDCP PDUs. The one or more first time transmitted PDCP PDUs and the one or more retransmitted PDCP PDUs are received from a controlling node. The network node transmits (506) the number of the PDCP PDUs in the numerical order to the wireless communications device 120.

RADIO BASE STATION, USER TERMINAL AND RADIO COMMUNICATION METHOD
20170373914 · 2017-12-28 · ·

The present invention is designed to improve spectral efficiency in a system that runs LTE/LTE-A by using a carrier in which LBT (Listen Before Talk) is configured. One aspect of the present invention provides a radio base station in a radio communication system where the radio base station and a user terminal communicate by using a carrier in which LBT is configured, and this radio base station has a measurement section that executes LBT in a predetermined carrier sensing duration and acquires an LBT result, and a transmission section that transmits a downlink signal based on the LBT result, and the predetermined carrier sensing duration includes a first carrier sensing duration and a second carrier sensing duration, which is shorter than the first carrier sensing duration.

METHOD AND SYSTEM FOR ALLOWING THE USE OF DOMAIN NAME BASED NETWORK POLICIES STORED IN A SECOND DEVICE IN ENFORCING NETWORK POLICY AT A FIRST DEVICE

A method and a system for creating Internet Protocol address based network policies (IPPs) by using domain name based network policies (DNNTPs) is disclosed. The DNNTPs are stored in a second device, and are used for enforcing IPPs at a first device. The first device retrieves one or more DNNTPs from the second device and monitors network traffic for Domain Name System (DNS) look-up reply. When a network device receives a record Domain Name System look-up reply, the network device identifies one or more Internet Protocol addresses of one or more host names specified in the address record Domain Name System look-up reply, then determine whether the one or more host names contain a domain name used in one or more DNNTPs and create one or more IPPs.

Scanning server ports to infer service protocols

Systems and methods are disclosed to infer, using a machine learned model, a service protocol of a server based on the banner data produced by the server. In embodiments, the machine learned model is implemented by a network scanner configured to receive banner data from open ports on servers. A received banner is parsed into a set of features, such as the counts or presence of particular characters or strings in the banner. In embodiments, certain types of banner content such as network addresses, hostnames, dates, and times, are replaced with special characters. The machine learned model is applied to the features to infer a most likely protocol of the server port that produced the banner. Advantageously, the model can be trained to perform the inference task with high accuracy and without using human-specified rules, which can be brittle for unconventional banner data and carry undesired biases.

Language binding for DDS types that allows publishing and receiving data without marshaling

A method for reducing a number of copies required to send a data sample with a Data Distribution Service (DDS) type in a system using an Object Management Group (OMG) Data Distribution Service (DDS) and a Real-Time Publish Subscribe (RTPS) protocol is provided. Key to the invention is the definition/creation of a memory representation of the data samples for the DDS type that is equal to the network representation of the data samples for the DDS type. Sending of data samples to the DataReader is accomplished without making a serialization copy of the data samples, and for the receiving the data samples from the DataWriter is accomplished without making a deserialization copy of the data samples. Further, a method is provided for accessing to a network representation of data samples with a DDS type in a system using an OMG DDS and a RTPS protocol.

Invoking a Random Linear Network Coding Communications Protocol
20230188628 · 2023-06-15 ·

A technology is provided for invoking a random linear network coding (RLNC) communications protocol between a client and server in a network. In one example, a synchronize message requesting a network connection to a server can contain an indication that a client supports the RLNC communications protocol to encode and decode data packets using random linear network coding. The server can analyze the synchronize message for the indication that the client supports the RLNC communications protocol and send an acknowledge message to the client indicating that the server supports the RLNC communications protocol. Thereafter, the server can listen on a communications channel for a connection request sent by the client to communicate with the server using the RLNC communications protocol.

Robust control plane assert for protocol independent multicast (PIM)

Techniques are described for providing robust control plane asserts in a network using Protocol Independent Multicast (PIM) or other routing protocols for controlling delivery of multicast traffic. In one example, a router includes a control unit having a hardware-based processor executing a Protocol Independent Multicast (PIM) protocol. The control unit, when executing the PIM protocol, initiates an election process for selecting, from a plurality of routers, a forwarding router to forward multicast traffic to a shared media computer network. In addition, the control unit determines whether the multicast traffic has been received by the router and outputs, in association with the election process, a PIM assert message that includes an indication as to whether the router has successfully received the multicast traffic.