H04L69/12

COMMUNICATION APPARATUS GENERATING AND ELIMINATING REDUNDANT DATA PACKETS

Apparatuses, systems, and techniques to eliminate redundant data packets. In at least one embodiment, a communication apparatus generates redundant data packets, and sends them in multiple packet streams. In at least one embodiment, a communication apparatus eliminates redundant data packets from received packet streams.

Heterogeneous multi-protocol stack method, apparatus, and system

A heterogeneous multi-protocol stack system including a plurality of heterogeneous protocol stack instances is described. Resource allocation between the protocol stack instances is unbalanced, and algorithms are independently configured, so that QoS capacities of different protocol stack instances are different. Data packets of applications or connections with different QoS requirements can be dispatched by a dispatcher to corresponding protocol stack instances at a high speed. When system resources are limited, the heterogeneous multi-protocol stack system is capable of simultaneously supporting classification optimization processing performed on data of a high-concurrency application, a high-throughput application, and a low-delay application, so as to meet QoS requirements of different types of applications, thereby improving user experience.

EQUIPMENT DETECTION SYSTEM AND EQUIPMENT DETECTION METHOD
20210377142 · 2021-12-02 ·

An equipment detection system includes a processor, a communication module, and a display module. The processor is configured to detect a connection to an external device. The processor enumerates device information about the external device, obtains user information from a local host, and generates a data structure according to the device information and the user information. The processor is included in the local host. The communication module is configured to transmit the data structure and receive status information. The status information includes a placement space corresponding to the external device or the status of the external device. The status information is associated with the data structure. Moreover, the display module is configured to display the status information.

HARDWARE ACCELERATION TECHNIQUES USING FLOW SELECTION
20210377188 · 2021-12-02 ·

In some embodiments, a method receives a packet for a flow associated with a workload. Based on an indicator for the flow, the method determines whether the flow corresponds to one of an elephant flow or a mice flow. Only when the flow is determined to correspond to an elephant flow, the method enables a hardware acceleration operation on the packet. The hardware acceleration operation may include hardware operation offload, receive side scaling, and workload migration.

COMMUNICATIONS FOR FIELD PROGRAMMABLE GATE ARRAY DEVICE

According to implementations of the subject matter described herein, there is proposed a solution for supporting communications for an FPGA device. In an implementation, the FPGA device includes an application module and protocol stack modules. The protocol stack modules are operable to access target devices based on different communication protocols via a physical interface. The FPGA device further includes a universal access module operable to receive, from the application module, first data and a first identity of a first target device, the first target device acting as a destination of the first data, and transmit, based on the first identity and predetermined first routing information, the first data to a first protocol stack module accessible to the first target device via the physical interface. By introducing the universal access module, it is possible to provide unified and direct communications for the application module.

COMMUNICATIONS FOR FIELD PROGRAMMABLE GATE ARRAY DEVICE

According to implementations of the subject matter described herein, there is proposed a solution for supporting communications for an FPGA device. In an implementation, the FPGA device includes an application module and protocol stack modules. The protocol stack modules are operable to access target devices based on different communication protocols via a physical interface. The FPGA device further includes a universal access module operable to receive, from the application module, first data and a first identity of a first target device, the first target device acting as a destination of the first data, and transmit, based on the first identity and predetermined first routing information, the first data to a first protocol stack module accessible to the first target device via the physical interface. By introducing the universal access module, it is possible to provide unified and direct communications for the application module.

FRAME COMPATIBILITY ACROSS NETWORK PROTOCOL VERSIONS
20220201101 · 2022-06-23 ·

One embodiment of the present invention sets forth a technique for processing packets transmitted within a network in accordance with a network protocol. The technique includes determining a first expected length of a value field included in a type-length-value (TLV) element within a first frame of a first packet received over the network, wherein the first expected length is based on a type field included in the TLV element. The technique also includes processing a first portion of the value field based on the expected length of the value field in accordance with a first specification for a first version of the network protocol, without processing a second portion of the value field beyond the expected length of the value field.

Phishing protection using cloning detection
11356478 · 2022-06-07 · ·

Techniques for phishing protection using cloning detection are described herein. The techniques described herein can include a server which hosts a website detecting that a fetcher is a cloning toolkit or an entity known for using a cloning toolkit. The techniques can also include a server which hosts a downloadable application (such as a mobile application) detecting that a fetcher for the application is a cloning toolkit or an entity known for using a cloning toolkit. The detection can be done in several ways, such as by analyzing data logs for patterns associated with cloning toolkits or entities known for using cloning toolkits. The techniques described herein can also include a part of an end user device (such as a part of a mobile device) detecting a clone (such as a clone website or application) that was cloned by a cloning toolkit. Then, upon detection, security actions can be taken.

Technologies for securely providing remote accelerators hosted on the edge to client compute devices

Technologies for securely providing one or more remote accelerators hosted on edge resources to a client compute device includes a device that further includes an accelerator and one or more processors. The one or more processors are to determine whether to enable acceleration of an encrypted workload, receive, via an edge network, encrypted data from a client compute device, and transfer the encrypted data to the accelerator without exposing content of the encrypted data to the one or more processors. The accelerator is to receive, in response to a determination to enable the acceleration of the encrypted workload, an accelerator key from a secure server via a secured channel, and process, in response to a transfer of the encrypted data from the one or more processors, the encrypted data using the accelerator key.

NETWORK PACKET PROCESSOR FOR PROCESSING A DATA PACKET
20220166859 · 2022-05-26 ·

A partial packet context builder can determine a partial packet context associated with a data packet based upon packet context associated with the data packet, the partial packet context including a plurality of partial packet context fields, where a network packet processor including an action unit, the action unit including the partial packet context builder, a systolic array of arithmetic-logical units (ALUs), and a packet context builder, the packet context including a plurality of packet context fields. The systolic array of ALUs can process the partial packet context to provide a processed partial packet context, the processed partial packet context including a plurality of processed partial packet context fields. The packet context builder can merge the processed partial packet context with the packet context to provide a processed packet context.