Patent classifications
H04L69/10
METHOD AND DEVICE FOR MANAGING GROUP MEMBER, AND METHOD FOR PROCESSING GROUP MESSAGE
The present application relates to a method for managing a group member including: a target group that a client requests to join is determined in response to receiving a group joining request sent by the client, the target group is associated with at least one storage space for storing user information of group members, and each storage space is independent from other storage spaces; user information bound to the client is stored in a storage space associated with the target group.
Multi-path RDMA transmission
In accordance with implementations of the subject matter described herein, there provides a solution for multi-path RDMA transmission. In the solution, at least one packet is generated based on an RDMA message to be transmitted from a first device to a second device. The first device has an RDMA connection with the second device via a plurality of paths. A first packet in the at least one packet includes a plurality of fields, which include information for transmitting the first packet over a first path of the plurality of paths. The at least one packet is transmitted to the second device over the plurality of paths via an RDMA protocol. The first packet is transmitted over the first path. The multi-path RDMA transmission solution according to the subject matter described herein can efficiently utilize rich network paths while maintaining a low memory footprint in a network interface card.
Detecting MAC/IP spoofing attacks on networks
Systems and methods are provided for detecting MAC/IP spoofing attacks on networks. A method may include authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message.
Traffic steering for stateless packets over multipath networks
A tunnel is established between a gateway and a customer premises equipment (CPE) that are connected by a plurality of concurrent communication paths. In some cases, some the communication paths operate according to different access technologies. The tunnel is associated with a hypertext transfer protocol (HTTP) session. The packet is encapsulated based on the HTTP session and the encapsulated packet is transmitted over the plurality of concurrent communication paths via the tunnel. Information representing the encapsulated packet is received via the tunnel between the gateway and the CPE. The encapsulated packet is de-encapsulated and a packet of a stateless flow is generated based on a payload of the de-encapsulated packet. In some cases, the stateless flow is a user datagram protocol (UDP) flow and the encapsulated packet is conveyed using a plurality of transmission control protocol (TCP) sessions associated with the plurality of concurrent communication paths.
TCP/UDP acceleration
A method for accelerating TCP/UDP packet switching. The method involves determining whether exception processing is necessary; if not, the packet is forwarded to a special stack for expedited processing. Packets requiring exception processing are forwarded to the conventional stack.
Method for transmitting data in flexible ethernet and device
A method for transmitting data in flexible Ethernet (FlexE) and a device comprising transmitting data in FlexE whereby a first FlexE device receives, according to a first client calendar, data from a second FlexE device; the first FlexE device determines, based on an error data block in the data, that a first timeslot is damaged; the first FlexE device adds a timeslot damage notification to an overhead frame to be sent to the second FlexE device; the first FlexE device receives a second client calendar from the second FlexE device; and the first FlexE device receives, using the second client calendar, the data from the second FlexE device.
Golf club head
An exemplary golf club head having an increased amount of discretionary mass may be realized by utilizing improved drop angles, an improved average crown height, and/or articulation points. The discretionary mass may be placed low and deep in the club head to improve the location of the center of gravity as well as the inertial properties. A preferred break length may also be utilized to further improve the depth of the center of gravity. In one example, the center of gravity may be positioned to substantially align the sweet spot with the face center of the club head.
CONNECTION CONTROL METHOD AND DEVICE
Embodiments of the present application provide a computer-implemented connection control method based on a QUIC protocol, comprising: receiving a QUIC connection request from a peer endpoint; analyzing the QUIC connection request and obtaining identification information of the peer endpoint; retrieving target historical information of the peer endpoint based on the identification information; adjusting a transport parameter based on the target historical information; establishing a QUIC connection with the peer endpoint based on an adjusted transport parameter; and controlling a connection state of the QUIC connection based on the adjusted transport parameter.
DETECTING MAC/IP SPOOFING ATTACKS ON NETWORKS
Systems and methods are provided for detecting MAC/IP spoofing attacks on networks. A method may include authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message.
System for processing messages of data stream
A system for processing messages of a high rate data stream and an apparatus including: a message processor including a plurality of processor sub-modules and configured to read an input data stream, process the input data stream, and to output an output data stream; at least one payload memory storing data related to the input data stream and accessible to the message processor; at least one instruction memory accessible to the message processor and storing computer program instructions configuring the message processor to process the input data stream; and an application processor configured to rewrite the at least one instruction memory.