H04L69/16

Cloaked remote client access
11575757 · 2023-02-07 · ·

A datagram oriented UDP protocol is used for communication between tunnel gateways in a wide area network. Lightweight remote client accesses network services using TCP tunneling. Each remote client maintains one or more UDP/IP+DTLS communication channels to a single member of the gateway group. Gateway servers belonging to the gateway group form some interconnection topology linking each gateway server to each other gateway server, whereby each gateway server maintains a communication channel with every other gateway server in the gateway group. Through the links between gateway servers, a remote client may access any application provided by any gateway server within the gateway group regardless of which gateway server it is connected to, which serves to cloak its communication patterns.

Cloaked remote client access
11575757 · 2023-02-07 · ·

A datagram oriented UDP protocol is used for communication between tunnel gateways in a wide area network. Lightweight remote client accesses network services using TCP tunneling. Each remote client maintains one or more UDP/IP+DTLS communication channels to a single member of the gateway group. Gateway servers belonging to the gateway group form some interconnection topology linking each gateway server to each other gateway server, whereby each gateway server maintains a communication channel with every other gateway server in the gateway group. Through the links between gateway servers, a remote client may access any application provided by any gateway server within the gateway group regardless of which gateway server it is connected to, which serves to cloak its communication patterns.

UPLINK SEGMENTATION OFFLOAD TO MODEM

This disclosure provides a method, apparatus, and computer-readable medium for wireless communication at a modem, comprising receiving, via an interface with a host, an internet protocol (IP) packet including a first transport protocol header and a first IP header. The IP packet has a size greater than a maximum transport unit (MTU) size allowable for each packet transmitted over a communication link. The modem segments the IP packet into a plurality of segments based on a segment size indicated by a segmentation policy. Each segment includes a respective derived segment transport protocol header and a respective derived segment IP header derived from the IP packet. Each of these derived headers includes at least one field based on the segmentation policy, and each of the segment transport protocol headers includes a checksum for the respective segment. Additionally, the modem transmits the plurality of segments over the communication link.

MANAGING BANDWITH IN FIBRE CHANNEL OVER INTERNET PROTOCOL COMMUNICATION CHANNELS

Methods and systems include managing bandwidth in Fibre Channel over Internet Protocol (FCIP) communication channels. A method includes monitoring traffic demand at an FCIP communication channel and, in response to an anticipated period of throughput demand on the FCIP communication channel, reallocating physical throughput bandwidth of the FCIP communication channel by configuring bandwidth of one or more tunnels of the FCIP communication channel.

WAVEFORM SYNCHRONIZATION SYSTEM FOR DATA RECEIVED FROM A NETWORK

A system that synchronizes waveforms received over a network from one or more devices, such as medical devices. Because of network delays or losses, waveforms can arrive at varying rates and times. Precise post-synchronization of the received data, to within a few milliseconds, is needed for accurate analysis. Applications include automatic classification of waveforms, such as detection of myocardial infraction from heart monitor waveforms. Synchronization uses sequence numbers assigned by each device, but must also account for sequence number wraparounds. Waveforms may also be synchronized across devices, by calculating the bias between within-device synchronized times and a common time source or common disturbance. Waveform data may also be stored data in a database or data warehouse; embodiments may index the data using a key with a date-time prefix and a hash code suffix, to support distributed indexing while reducing the chance of hash collisions to a very small probability.

Computational accelerator for storage operations

A system includes a host processor, which has a host memory and is coupled to store data in a non-volatile memory in accordance with a storage protocol. A network interface controller (NIC) receives data packets conveyed over a packet communication network from peer computers containing, in payloads of the data packets, data records that encode data in accordance with the storage protocol for storage in the non-volatile memory. The NIC processes the data records in the data packets that are received in order in each flow from a peer computer and extracts and writes the data to the host memory, and when a data packet arrives out of order, writes the data packet to the host memory without extracting the data and processes the data packets in the flow so as to recover context information for use in processing the data records in subsequent data packets in the flow.

Systems and methods for detecting anomalous behaviors based on temporal profile
11496494 · 2022-11-08 · ·

The present disclosure is directed to a method of detecting anomalous behaviors based on a temporal profile. The method can include collecting, by a control system comprising a processor and memory, a set of network data communicated by a plurality of network nodes over a network during a time duration. The method can include identifying, by the control system, one or more seasonalities from the set of network data. The method can include generating, by the control system, a temporal profile based on the one or more identified seasonalities. The method can include detecting, by the control system and based on the temporal profile, an anomalous behavior performed by one of the plurality of network nodes. The method can include identifying, by the control system and based on the temporal profile, a root cause for the anomalous behavior.

Systems and methods for detecting anomalous behaviors based on temporal profile
11496494 · 2022-11-08 · ·

The present disclosure is directed to a method of detecting anomalous behaviors based on a temporal profile. The method can include collecting, by a control system comprising a processor and memory, a set of network data communicated by a plurality of network nodes over a network during a time duration. The method can include identifying, by the control system, one or more seasonalities from the set of network data. The method can include generating, by the control system, a temporal profile based on the one or more identified seasonalities. The method can include detecting, by the control system and based on the temporal profile, an anomalous behavior performed by one of the plurality of network nodes. The method can include identifying, by the control system and based on the temporal profile, a root cause for the anomalous behavior.

Method, apparatus, and data processing system including controller to manage storage nodes and host operations

A data processing system and method, and a corresponding apparatus, where the data processing system includes a controller and at least two storage nodes. The controller is configured to receive, using a first coupling between the controller and a host, an operation request received from the host, where the operation request includes an identity of target data and an operation type, determine at least one target storage node from the at least two storage nodes according to the identity of the target data, and send an instruction message to the at least one target storage node using a second coupling to the at least one target storage node, where the at least one target storage node is configured to send the target data to the host or obtain the target data from the host according to the instruction message.

Method, apparatus, and data processing system including controller to manage storage nodes and host operations

A data processing system and method, and a corresponding apparatus, where the data processing system includes a controller and at least two storage nodes. The controller is configured to receive, using a first coupling between the controller and a host, an operation request received from the host, where the operation request includes an identity of target data and an operation type, determine at least one target storage node from the at least two storage nodes according to the identity of the target data, and send an instruction message to the at least one target storage node using a second coupling to the at least one target storage node, where the at least one target storage node is configured to send the target data to the host or obtain the target data from the host according to the instruction message.