H04L69/16

Method and system for transparent tcp proxy to containerized applications

Example aspects include techniques for implementing a transparent TCP proxy for containerized applications. These techniques may include receiving an outgoing packet from the containerized application via a container bridge and determining, based on a connection associated with the outgoing packet, whether the outgoing packet corresponds to an incoming packet identified by a first marking as being redirected through the TCP proxy. In addition, the techniques may include in response to determining that the outgoing packet corresponds to the incoming packet, adding a second marking to the outgoing packet to indicate that the outgoing packet is to be routed through the TCP proxy, sending the outgoing packet to the TCP proxy based on the second marking, and transmitting an outgoing processed packet to an external device having the destination address, the outgoing processed packet resulting from a performance of a proxy operation by the TCP proxy on the outgoing packet.

Method and system for transparent tcp proxy to containerized applications

Example aspects include techniques for implementing a transparent TCP proxy for containerized applications. These techniques may include receiving an outgoing packet from the containerized application via a container bridge and determining, based on a connection associated with the outgoing packet, whether the outgoing packet corresponds to an incoming packet identified by a first marking as being redirected through the TCP proxy. In addition, the techniques may include in response to determining that the outgoing packet corresponds to the incoming packet, adding a second marking to the outgoing packet to indicate that the outgoing packet is to be routed through the TCP proxy, sending the outgoing packet to the TCP proxy based on the second marking, and transmitting an outgoing processed packet to an external device having the destination address, the outgoing processed packet resulting from a performance of a proxy operation by the TCP proxy on the outgoing packet.

Identifying a tethered device using TCP error transmissions

Various embodiments comprise systems, methods, mechanisms, and apparatus by which a network operator such as a wireline internet service provider (ISP) may determine that an endpoint device has one or more other wireless devices tethered to it, such as a mobile handset providing dual-Wi-Fi ad-hoc tethering (i.e., connected to a high-speed Wi-Fi network while simultaneously providing Wi-Fi connections to wireless devices tethered to the mobile handset), by monitoring Transmission Control Protocol (TCP)/IP traffic flow associated with endpoint devices (i.e., to or through endpoint devices), characterizing these traffic flows in accordance with one or more error indicative criteria to establish thereby a baseline profile of error indicative criteria that is indicative of a TCP/IP traffic flow associated with an endpoint device that is not associated with tethering (e.g., a rate or number of duplicate ACKs), wherein deviations from the baseline profile of error indicative criteria beyond a threshold are indicative of a TCP/IP traffic flow associated with an endpoint device that is associated with tethering.

Identifying a tethered device using TCP error transmissions

Various embodiments comprise systems, methods, mechanisms, and apparatus by which a network operator such as a wireline internet service provider (ISP) may determine that an endpoint device has one or more other wireless devices tethered to it, such as a mobile handset providing dual-Wi-Fi ad-hoc tethering (i.e., connected to a high-speed Wi-Fi network while simultaneously providing Wi-Fi connections to wireless devices tethered to the mobile handset), by monitoring Transmission Control Protocol (TCP)/IP traffic flow associated with endpoint devices (i.e., to or through endpoint devices), characterizing these traffic flows in accordance with one or more error indicative criteria to establish thereby a baseline profile of error indicative criteria that is indicative of a TCP/IP traffic flow associated with an endpoint device that is not associated with tethering (e.g., a rate or number of duplicate ACKs), wherein deviations from the baseline profile of error indicative criteria beyond a threshold are indicative of a TCP/IP traffic flow associated with an endpoint device that is associated with tethering.

Systems and methods for charging vehicles

Systems and methods for charging vehicles. In some embodiments, a system includes at least one mobile device and a utility network management center (“NMC”). The at least one mobile device is configured as an electronic utility device and includes a network interface card (“NIC”). The at least one mobile device is also associated with a utility billing account and at least one utility commodity meter. The utility NMC is configured to communicate with the at least one mobile device and the at least one utility commodity meter over a network, locate the at least one mobile device, and monitor a state of the at least one utility commodity meter. The utility NMC is also configured to determine a usage of a commodity based on the state of the at least one utility commodity meter, and bill the utility billing account associated with the mobile device for the usage of the commodity.

Systems and methods for charging vehicles

Systems and methods for charging vehicles. In some embodiments, a system includes at least one mobile device and a utility network management center (“NMC”). The at least one mobile device is configured as an electronic utility device and includes a network interface card (“NIC”). The at least one mobile device is also associated with a utility billing account and at least one utility commodity meter. The utility NMC is configured to communicate with the at least one mobile device and the at least one utility commodity meter over a network, locate the at least one mobile device, and monitor a state of the at least one utility commodity meter. The utility NMC is also configured to determine a usage of a commodity based on the state of the at least one utility commodity meter, and bill the utility billing account associated with the mobile device for the usage of the commodity.

Data transmission method and system, and apparatus

This application provides a data transmission method and system, an apparatus, and belongs to the field of communications technologies. The method is applied to a terminal, a wireless link is established between the terminal and an access control point device, a transmission control protocol (TCP) connection is established between the terminal and a server, and the wireless link is used to bear the TCP connection. The method includes: determining, by the terminal, link state information of the wireless link by using a link layer, and sending the link state information from the link layer to a transport layer. The method also includes: sending, by the terminal to the server by using the transport layer, a link notification corresponding to the link state information. In this application, data transmission efficiency can be improved.

Decentralized method and system for accurately determining a level of activity of a client device

One or more computing devices, systems, and/or methods for monitoring levels of activity of client devices using a cluster of servers having a decentralized network architecture are provided, where over-counting, which may be caused by an uneven distribution of requests transmitted by the client devices to the cluster of servers, may be mitigated. For example, a request may be received by a first server, of the cluster of servers, from a client device. A first counter value associated with a level of activity of the client device may be incremented by a first number. One or more data packets may be transmitted to one or more servers of the cluster of servers. Each data packet of the one or more data packets may comprise an instruction to increment a counter value associated with the client device by a second number, which may be different than the first number.

Decentralized method and system for accurately determining a level of activity of a client device

One or more computing devices, systems, and/or methods for monitoring levels of activity of client devices using a cluster of servers having a decentralized network architecture are provided, where over-counting, which may be caused by an uneven distribution of requests transmitted by the client devices to the cluster of servers, may be mitigated. For example, a request may be received by a first server, of the cluster of servers, from a client device. A first counter value associated with a level of activity of the client device may be incremented by a first number. One or more data packets may be transmitted to one or more servers of the cluster of servers. Each data packet of the one or more data packets may comprise an instruction to increment a counter value associated with the client device by a second number, which may be different than the first number.

Transmission control protocol (TCP) and/or user datagram protocol (UDP) receive offloading

Various aspects of the present disclosure generally relate to wired and/or wireless communication. In some aspects, a device may receive a plurality of data packets at a modem of the device. The device may group, at the modem of the device, payloads of a first subset of the plurality of data packets into a container. The device may transfer, to a processor of the device and using the modem, the container via a first interface channel. The device may transfer, to the processor and using the modem, a second subset of the plurality of data packets via a second interface channel. Numerous other aspects are provided.