H04L69/12

Method and device for improving bandwidth utilization in a communication network

A communication system comprising at least one smart network interface card (“NIC”) provided with a logic/programmable processor and a local memory, and a computing element, wherein a communication bus is used to connect said smart NIC and said computing element to enable forwarding data there-between, wherein the system is characterized in that said smart NIC is configured to receive data packets, to extract data therefrom and to forward less than all data comprised in the received data packets, to said computing element along said communication bus, and wherein the forwarded data comprises data which is preferably required for making networking decisions that relate to that respective data packet.

METHOD FOR COMPRESSING CAN-BUS DATA
20220303362 · 2022-09-22 · ·

A method for compressing a flow of CAN-bus messages, which comprises: (A) during a training stage: (a) determining at least one series-type pattern; (b) defining a compressed series-type command for each of said patterns, each command comprising parameters of: (b.1) a timestamp of a first message; (b.2) a message-ID; (b.3) a type of pattern; (b.4) an indication of a field within the messages; (b.5) a parameter value at the first message; (b.6) period between messages; and (b.7) number of messages; (B) during a compression stage: (c) dividing a record of CAN-bus messages into groups of a same message-ID; (d) within each group, finding messages of a same pattern; (e) for each series, forming a compressed command in a form as defined with values for at least several parameters; and (C) during a decompression stage: (f) using the series-type compressed commands to reconstruct the content of the series of messages.

SYSTEM AND METHOD FOR NON-NETWORK DEPENDENT CYBERSECURITY
20220217205 · 2022-07-07 · ·

A method, computer program product, and computer system for applying a firewall security layer to software for hardware interface. Sensor data imported by the hardware interface may be secured using the firewall security layer. The sensor data may be provided to an artificial intelligence (AI) expert system. The sensor data provided to the AI expert system may be analyzed. An indication of an insecure condition may be provided via a user interface based upon, at least in part, analysis of the sensor data.

System and method for continuous AI management and learning
11399060 · 2022-07-26 · ·

A method, computer program product, and computer system for applying deductive artificial intelligence (AI) attribution and auditability to data inputs, wherein the deductive AI may account for ontologies and competing system information, and wherein the deductive AI attribution and auditability may be applied to the data inputs by vendor workflow. The data inputs applied with the deductive AI attribution and auditability may be processed via a feedback loop to align a sense-understand-decide-act (SUDA) understanding with an inductive AI understanding. The inductive AI may be automated via the feedback loop based upon, at least in part, an AI expert system processing of the data inputs. One or more policy based rules may be developed for user automation authorization based upon, at least in part, the feedback loop.

Method for reducing power consumption and device
11405271 · 2022-08-02 · ·

A method and a device related to the field of mobile terminals and for reducing power consumption of a terminal device when the terminal device enters a doze mode, where after detecting that screen-off duration of the terminal device is greater than first duration, the terminal device sends a transmission control protocol reset packet to an application server of a to-be-controlled application to enable the application server to disconnect a Transmission Control Protocol (TCP) connection to the terminal device.

Optimization of multi-stage hierarchical networks for practical routing applications
11405331 · 2022-08-02 · ·

Significantly optimized multi-stage networks, useful in wide target applications, with VLSI layouts using only horizontal and vertical links to route large scale sub-integrated circuit blocks having inlet and outlet links, and laid out in an integrated circuit device in a two-dimensional grid arrangement of blocks are presented. The optimized multi-stage networks in each block employ several rings of stages of switches with inlet and outlet links of sub-integrated circuit blocks connecting to rings from either left-hand side only, or from right-hand side only, or from both left-hand side and right-hand side; and employ shuffle exchange links where outlet links of cross links from switches in a stage of a ring in one sub-integrated circuit block are connected to either inlet links of switches in the another stage of a ring in the same or another sub-integrated circuit block.

Optimization of multi-stage hierarchical networks for practical routing applications
11405331 · 2022-08-02 · ·

Significantly optimized multi-stage networks, useful in wide target applications, with VLSI layouts using only horizontal and vertical links to route large scale sub-integrated circuit blocks having inlet and outlet links, and laid out in an integrated circuit device in a two-dimensional grid arrangement of blocks are presented. The optimized multi-stage networks in each block employ several rings of stages of switches with inlet and outlet links of sub-integrated circuit blocks connecting to rings from either left-hand side only, or from right-hand side only, or from both left-hand side and right-hand side; and employ shuffle exchange links where outlet links of cross links from switches in a stage of a ring in one sub-integrated circuit block are connected to either inlet links of switches in the another stage of a ring in the same or another sub-integrated circuit block.

Network systems and methods for CXL standard

A first processing unit for a computer server apparatus includes a first circuit configured to process a first type of data to be transmitted and received over a communication channel in accordance with a peripheral component interconnect express (PCIe) protocol, a second circuit configured to process a second type of data to be transmitted and received over the communication channel in accordance with a compute express link (CXL) protocol, and an optical communication interface configured to modulate the first type of data and the second type of data into a first signal in a PAM format to be transmitted over the communication channel to a second processing unit and receive, from the second processing unit over the communication channel, a second signal including either one of the first type of data and the second type of data modulated in the PAM format.

Network systems and methods for CXL standard

A first processing unit for a computer server apparatus includes a first circuit configured to process a first type of data to be transmitted and received over a communication channel in accordance with a peripheral component interconnect express (PCIe) protocol, a second circuit configured to process a second type of data to be transmitted and received over the communication channel in accordance with a compute express link (CXL) protocol, and an optical communication interface configured to modulate the first type of data and the second type of data into a first signal in a PAM format to be transmitted over the communication channel to a second processing unit and receive, from the second processing unit over the communication channel, a second signal including either one of the first type of data and the second type of data modulated in the PAM format.

SAFELY OVERWRITING DECIDED SLOTS
20220286229 · 2022-09-08 ·

Techniques are described for safely overwriting decided slots and in-order fault tolerant consensus logs for replicated services. Using techniques described herein, a broad class of already-existing consensus log protocols may be enhanced/extended to safely overwrite decided slots and provide in-order fault tolerant consensus logs. When changing to a different epoch of a consensus log, slots determined to be unreachable may be changed/deleted even if slots after the gap were decided. A sequencer protocol establishes distributed consensus among a group of services. The sequencer protocol provides in-order execution of messages from multiple clients, and flow control from within the sequencer protocol, without offloading de-duplicate and reorder (DDRO) logic to the application layer. Fault tolerance is provided by egress cursors and ingress cursors, which provide awareness of which specific messages from each client sender should be executed next, even if those messages are not presently in the consensus log.