H04L69/16

Storage interface command packets over fibre channel with transport and network headers as payloads

In some examples, a system includes a Fibre Channel (FC) interface to communicate over an FC network, and a network stack including a network layer and a transport layer. Machine-readable instructions are executable to produce a command packet including a payload including data for transmission to another system, the payload further including headers for the network layer and the transport layer, where the command packet is according to a storage interface protocol. The FC interface is to communicate the command packet over the FC network.

CONTROLLER DRIVEN RECONFIGURATION OF A MULTI-LAYERED APPLICATION OR SERVICE MODEL

Some embodiments provide novel inline switches that distribute data messages from source compute nodes (SCNs) to different groups of destination service compute nodes (DSCNs). In some embodiments, the inline switches are deployed in the source compute nodes datapaths (e.g., egress datapath). The inline switches in some embodiments are service switches that (1) receive data messages from the SCNs, (2) identify service nodes in a service-node cluster for processing the data messages based on service policies that the switches implement, and (3) use tunnels to send the received data messages to their identified service nodes. Alternatively, or conjunctively, the inline service switches of some embodiments (1) identify service-nodes cluster for processing the data messages based on service policies that the switches implement, and (2) use tunnels to send the received data messages to the identified service-node clusters. The service-node clusters can perform the same service or can perform different services in some embodiments. This tunnel-based approach for distributing data messages to service nodes/clusters is advantageous for seamlessly implementing in a datacenter a cloud-based XaaS model (where XaaS stands for X as a service, and X stands for anything), in which any number of services are provided by service providers in the cloud.

CONTROLLER DRIVEN RECONFIGURATION OF A MULTI-LAYERED APPLICATION OR SERVICE MODEL

Some embodiments provide novel inline switches that distribute data messages from source compute nodes (SCNs) to different groups of destination service compute nodes (DSCNs). In some embodiments, the inline switches are deployed in the source compute nodes datapaths (e.g., egress datapath). The inline switches in some embodiments are service switches that (1) receive data messages from the SCNs, (2) identify service nodes in a service-node cluster for processing the data messages based on service policies that the switches implement, and (3) use tunnels to send the received data messages to their identified service nodes. Alternatively, or conjunctively, the inline service switches of some embodiments (1) identify service-nodes cluster for processing the data messages based on service policies that the switches implement, and (2) use tunnels to send the received data messages to the identified service-node clusters. The service-node clusters can perform the same service or can perform different services in some embodiments. This tunnel-based approach for distributing data messages to service nodes/clusters is advantageous for seamlessly implementing in a datacenter a cloud-based XaaS model (where XaaS stands for X as a service, and X stands for anything), in which any number of services are provided by service providers in the cloud.

DECT network clustering method

A DECT network clustering method includes sending, by a DECT host to a router, a multicast command that declares joining a specified multicast group; sending, by a DECT device to the router, a multicast probe message sent to a target multicast group; receiving, by the router, the multicast command and the multicast probe message, and sending, to the DECT host according to the multicast command, the multicast probe message; receiving, by the DECT host, the multicast probe message, and sending status declaration information to the DECT device; receiving, by the DECT device, the status declaration information, and initiating a TCP connection request to the DECT host in a point-to-point manner; and receiving, by the DECT host, the connection request from the DECT device, and establishing a TCP channel with the DECT device.

DECT network clustering method

A DECT network clustering method includes sending, by a DECT host to a router, a multicast command that declares joining a specified multicast group; sending, by a DECT device to the router, a multicast probe message sent to a target multicast group; receiving, by the router, the multicast command and the multicast probe message, and sending, to the DECT host according to the multicast command, the multicast probe message; receiving, by the DECT host, the multicast probe message, and sending status declaration information to the DECT device; receiving, by the DECT device, the status declaration information, and initiating a TCP connection request to the DECT host in a point-to-point manner; and receiving, by the DECT host, the connection request from the DECT device, and establishing a TCP channel with the DECT device.

Media interaction method in DECT network cluster

The present application discloses a media interaction method in a Digital Enhanced Cordless Telecommunications (DECT) network cluster. Communication with a DECT host is established through a DECT network cluster constructed in advance, to obtain first account information allocated by the DECT host, and information of a first call request to call a second account is sent to the DECT host, so as to make a call to the second account in a first communication manner. If no Real-time Transport Protocol (RTP) from the second account is received, information of a second call request to call the second account is sent to the DECT host, so as to make a call to the second account in a second communication manner. Embodiments of the present disclosure can solve the technical problem of a communication failure and reduce a waiting time for communication, thereby achieving optimal Voice over Internet Protocol (VOIP) call experience.

Electronic device and method for scheduling of communication data link thereof

Disclosed is an electronic device including a communication module configured to support a first communication protocol and a second communication protocol, a processor operably connected to the communication module, and a memory storing instructions that enable the processor to establish a first connection based on the first communication protocol with a first external electronic device, identify a second external electronic device and a connection state of the second external electronic device using the second communication protocol, produce a first message, based at least in part on the first connection and the connection state of the second external electronic device, transmit the produced first message to the second external electronic device using the second communication protocol, receive, from the second external electronic device, a second message in response to the first message using the second communication protocol, and schedule a data link based on the second communication protocol.

Electronic device and method for scheduling of communication data link thereof

Disclosed is an electronic device including a communication module configured to support a first communication protocol and a second communication protocol, a processor operably connected to the communication module, and a memory storing instructions that enable the processor to establish a first connection based on the first communication protocol with a first external electronic device, identify a second external electronic device and a connection state of the second external electronic device using the second communication protocol, produce a first message, based at least in part on the first connection and the connection state of the second external electronic device, transmit the produced first message to the second external electronic device using the second communication protocol, receive, from the second external electronic device, a second message in response to the first message using the second communication protocol, and schedule a data link based on the second communication protocol.

Computational accelerator for storage operations

A system includes a host processor, which has a host memory and is coupled to store data in a non-volatile memory in accordance with a storage protocol. A network interface controller (NIC) receives data packets conveyed over a packet communication network from peer computers containing, in payloads of the data packets, data records that encode data in accordance with the storage protocol for storage in the non-volatile memory. The NIC processes the data records in the data packets that are received in order in each flow from a peer computer and extracts and writes the data to the host memory, and when a data packet arrives out of order, writes the data packet to the host memory without extracting the data and processes the data packets in the flow so as to recover context information for use in processing the data records in subsequent data packets in the flow.

FRAME COMPATIBILITY ACROSS NETWORK PROTOCOL VERSION
20230052930 · 2023-02-16 ·

One embodiment of the present invention sets forth a technique for processing packets transmitted within a network in accordance with a network protocol. The technique includes a network device in a mesh network receiving a type-length-value (TLV) element, determining, based on a type field of the TLV element, an expected length of a value field of the TLV element, and processing the value field up to the expected length.