H04L69/16

Selective tracking of acknowledgments to improve network device buffer utilization and traffic shaping

Systems and methods provide for Selective Tracking of Acknowledgments (STACKing) to improve buffer utilization and traffic shaping for one or more network devices. A network device can identify a first flow that corresponds to a predetermined traffic class and a predetermined congestion state. The device can determine a current window size and congestion threshold of the first flow. In response to a determination to selectively track a portion of acknowledgments of the first flow, the device can track, in main memory, information of a first portion of acknowledgments of the first flow. The device can exclude, from one or more buffers, a second portion of acknowledgments of the first flow. The device can re-generate and transmit segments corresponding to the second portion of acknowledgments at a target transmission rate based on traffic shaping policies for the predetermined traffic class and congestion state.

Selective tracking of acknowledgments to improve network device buffer utilization and traffic shaping

Systems and methods provide for Selective Tracking of Acknowledgments (STACKing) to improve buffer utilization and traffic shaping for one or more network devices. A network device can identify a first flow that corresponds to a predetermined traffic class and a predetermined congestion state. The device can determine a current window size and congestion threshold of the first flow. In response to a determination to selectively track a portion of acknowledgments of the first flow, the device can track, in main memory, information of a first portion of acknowledgments of the first flow. The device can exclude, from one or more buffers, a second portion of acknowledgments of the first flow. The device can re-generate and transmit segments corresponding to the second portion of acknowledgments at a target transmission rate based on traffic shaping policies for the predetermined traffic class and congestion state.

Encapsulated FICON communication

Using an alternative communication protocol between a first system and a second system that are otherwise configured to communicate using a FICON protocol includes the first system determining if the alternative communication protocol is handled by the second system, the first system providing encapsulated data by encapsulating FICON data if the alternative communication protocol is handled at the second system, and the first system transmitting the encapsulated data directly to the second system using the alternative communication protocol if the alternative communication protocol is handled at the second system. The alternative communication protocol may be TCP/IP. At least one of the systems is a host computing system, an array storage system, and/or a tape emulation system. At least one of the systems may be a simulation of a host computing system, an array storage system, and/or a tape emulation system.

Encapsulated FICON communication

Using an alternative communication protocol between a first system and a second system that are otherwise configured to communicate using a FICON protocol includes the first system determining if the alternative communication protocol is handled by the second system, the first system providing encapsulated data by encapsulating FICON data if the alternative communication protocol is handled at the second system, and the first system transmitting the encapsulated data directly to the second system using the alternative communication protocol if the alternative communication protocol is handled at the second system. The alternative communication protocol may be TCP/IP. At least one of the systems is a host computing system, an array storage system, and/or a tape emulation system. At least one of the systems may be a simulation of a host computing system, an array storage system, and/or a tape emulation system.

Communication Method and Apparatus
20220418012 · 2022-12-29 ·

A method implemented by a session management function (SMF) network element and comprises receiving, from a terminal device, a first message requesting to establish or update a protocol data unit (PDU) session, and comprising first indication information indicating that the terminal device supports either a quick user datagram protocol (UDP) internet connection (QUIC) capability or a multi-path (MP) QUIC (MP-QUIC) capability, determining whether a traffic flow in the PDU session is transmitted using a QUIC method or an MP-QUIC method, and sending, to the terminal device, a second message indicating that the PDU session is successfully established or updated, and comprising second indication information indicating that the traffic flow is transmitted using the QUIC method or the MP-QUIC method.

Server for providing a graphical user interface to a client and a client

The invention relates to a server for providing a graphical user interface to a client over a communication network. The graphical user interface comprises a graphical user interface element, the graphical user interface element being formed by an element shape and an element text, the element shape being represented by element shape data, the element text being represented by element text data. The server comprises an encoder configured to encode the element shape data into video data, a detector configured to detect a change associated with the graphical user interface element within the graphical user interface, and a communication interface configured to separately transmit the video data and the element text data over the communication network, the element text data being transmitted upon detection of the change associated with the graphical user interface element for providing the graphical user interface to the client.

METHOD AND APPARATUS FOR DEPLOYING TENANT DEPLOYABLE ELEMENTS ACROSS PUBLIC CLOUDS BASED ON HARVESTED PERFORMANCE METRICS

Some embodiments of the invention provide a method for evaluating multiple candidate resource elements associated with different resource element types for deploying one tenant deployable element in a single public cloud. The method deploys a set of one or more agents in the public cloud to collect metrics evaluating performance of each of the multiple candidate resource elements. The method communicates with the set of deployed agents to collect metrics to quantify performance of each candidate resource element. The method aggregates the collected metrics in order to generate a report that quantifies performance of each type of candidate resource element for deploying the tenant deployable element in the single public cloud.

CROSS-SITE HIGH-AVAILABILITY DISTRIBUTED CLOUD STORAGE SYSTEM TO PROVIDE MULTIPLE VIRTUAL CHANNELS BETWEEN STORAGE NODES
20220404980 · 2022-12-22 ·

Systems and methods are described for a cross-site high availability distributed storage system. According to one embodiment, a computer implemented method includes providing a remote direct memory access (RDMA) request for a RDMA stream, and generating, with an interconnect (IC) layer of the first storage node, multiple IC channels and associated IC requests for the RDMA request. The method further includes mapping an IC channel to a group of multiple transport layer sessions to split data traffic of the IC channel into multiple packets for the group of multiple transport layer sessions using an IC transport layer of the first storage node and assigning, with the IC transport layer, a unique transaction identification (ID) to each IC request and assigning a different data offset to each packet of a transport layer session.

Method and system for dynamic traffic distribution and bi-casting in a hybrid network environment

A method, apparatus and computer program product are provided in accordance with example embodiments in order to provide for the efficient, dynamic distribution of traffic in a hybrid network environment based at least in part on reliability probabilities associated with individual subflows within the network. In some example implementations, a traffic distribution entity provides for control over the determination of combined reliability probabilities of multiple potential traffic distribution modes and the selection of a traffic distribution mode that is capable of meeting performance targets, such as those associated with mission-critical operations of cyber-physical systems.

Enforcing security policies on mobile devices in a hybrid architecture
11533307 · 2022-12-20 · ·

Systems and methods include intercepting traffic on a mobile device based on a set of rules; determining whether a connection associated with the traffic is allowed based on a local map associated with an application; responsive to the connection being allowed or blocked based on the local map, one of forwarding the traffic associated with the connection when allowed and generating a block of the connection at the mobile device when blocked; and, responsive to the connection not having an entry in the local map, forwarding a request for the connection to a cloud-based system for processing therein. The cloud-based system is configured to allow or block the connection based on the connection not having an entry in the local map.