Patent classifications
H04L69/16
COMPUTING DEVICE
Disclosed herein is a computing device. The computing device may include a central processing unit (CPU) for controlling operation of a system, a Compute Express Link (CXL) storage device connected with the CPU, a flexible bus for connecting the CPU with the CXL storage device, and a TCP/IP Offload Engine (TOE) provided between the flexible bus and the CXL storage device.
Transmission of packets relating to a processing rule
A method of controlling a packet stream generated by an application installed in a mobile terminal, the stream being intended to be sent by the terminal over a communications network managed by an operator. The method includes the following acts implemented in the terminal, for at least one packet generated by the application: obtaining a first packet having a first header and payload data; transmitting a request message to a security module installed in the terminal, the message including a parameter of the first header; receiving a response from the security module, which includes an instruction relating to transmission of a second packet, the response being based on the parameter and established according to a processing rule; preparing the second packet by modifying the first header into a second header, based on the instruction, the second packet including the second header and the payload data; and transmitting the second packet.
Transmission of packets relating to a processing rule
A method of controlling a packet stream generated by an application installed in a mobile terminal, the stream being intended to be sent by the terminal over a communications network managed by an operator. The method includes the following acts implemented in the terminal, for at least one packet generated by the application: obtaining a first packet having a first header and payload data; transmitting a request message to a security module installed in the terminal, the message including a parameter of the first header; receiving a response from the security module, which includes an instruction relating to transmission of a second packet, the response being based on the parameter and established according to a processing rule; preparing the second packet by modifying the first header into a second header, based on the instruction, the second packet including the second header and the payload data; and transmitting the second packet.
Detection of malware and malicious applications
A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.
Detection of malware and malicious applications
A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.
TRANSMISSION OF PREVIOUSLY COMPRESSED PACKETS TO AVOID THROUGHPUT DROP
A second wireless device may transmit, to a first wireless device, a feedback message indicative of a transition from a first compression state to a second compression state. The first wireless device may transition, based on a state change indication corresponding to the feedback message, from the first compression state to the second compression state. The first wireless device may transmit, to the second wireless device based on the transition from the first compression state to the second compression state, one or more first data packets that are previously compressed based on the first compression state or one or more second data packets that are uncompressed or recompressed based on the second compression state. The one or more second data packets being associated with the one or more first data packets.
Managing bandwith in fibre channel over internet protocol communication channels
Methods and systems include managing bandwidth in Fibre Channel over Internet Protocol (FCIP) communication channels. A method includes monitoring traffic demand at an FCIP communication channel and, in response to an anticipated period of throughput demand on the FCIP communication channel, reallocating physical throughput bandwidth of the FCIP communication channel by configuring bandwidth of one or more tunnels of the FCIP communication channel.
METHOD AND SYSTEM FOR DEEP PACKET INSPECTION IN SOFTWARE DEFINED NETWORKS
A method for deep packet inspection (DPI) in a software defined network (SDN). The method includes configuring a plurality of network nodes operable in the SDN with at least one probe instruction; receiving from a network node a first packet of a flow, the first packet matches the at least one probe instruction and includes a first sequence number; receiving from a network node a second packet of the flow, the second packet matches the at least one probe instruction and includes a second sequence number, the second packet is a response of the first packet; computing a mask value respective of at least the first and second sequence numbers indicating which bytes to be mirrored from subsequent packets belonging to the same flow; generating at least one mirror instruction based on at least the mask value; and configuring the plurality of network nodes with at least one mirror instruction.
Systems and methods for providing load balancing as a service
The present disclosure is directed generally to systems and methods for providing load balancing as a service. A load balancer executing on a device intermediary to a server and a plurality of clients can receive a request from an agent executing on the server. The request can be to initiate establishment of a transport layer connection. The load balancer can accept the request to establish the transport layer connection with the server. The load balancer can receive a request to access the server from a client of the plurality of clients. The load balancer can forward the request to the server via the transport layer connection established between the load balancer and the server responsive to the request of the server.
Systems and methods for providing load balancing as a service
The present disclosure is directed generally to systems and methods for providing load balancing as a service. A load balancer executing on a device intermediary to a server and a plurality of clients can receive a request from an agent executing on the server. The request can be to initiate establishment of a transport layer connection. The load balancer can accept the request to establish the transport layer connection with the server. The load balancer can receive a request to access the server from a client of the plurality of clients. The load balancer can forward the request to the server via the transport layer connection established between the load balancer and the server responsive to the request of the server.