Patent classifications
H04L69/22
Context identifier for packet compression
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a transmitter device may determine whether a packet, to be transmitted by the transmitter device, is compressed; generate a header for transmission of the packet based at least in part on the determination, wherein the header includes a context identifier indicating whether the packet is compressed; and transmit the packet and the header. Numerous other aspects are provided.
Context identifier for packet compression
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a transmitter device may determine whether a packet, to be transmitted by the transmitter device, is compressed; generate a header for transmission of the packet based at least in part on the determination, wherein the header includes a context identifier indicating whether the packet is compressed; and transmit the packet and the header. Numerous other aspects are provided.
Segment types as delimiters and addressable resource identifiers
An example device for processing media data is configured to parse a bitstream including the media data, the bitstream being formatted according to Common Media Application Format (CMAF), detect, during the parsing, a file type (FTYP) value for a CMAF track file of the bitstream, determine that a CMAF header of the CMAF track file starts with the FTYP value, and process one or more CMAF fragments following the CMAF header of the CMAF track file. The device may additionally be configured to detect one or more segment type (STYP) values in the bitstream, determine that each of the one or more STYP values corresponds to a start of a respective one of the CMAF fragments, and process each of the CMAF fragments starting from the corresponding STYP value.
Segment types as delimiters and addressable resource identifiers
An example device for processing media data is configured to parse a bitstream including the media data, the bitstream being formatted according to Common Media Application Format (CMAF), detect, during the parsing, a file type (FTYP) value for a CMAF track file of the bitstream, determine that a CMAF header of the CMAF track file starts with the FTYP value, and process one or more CMAF fragments following the CMAF header of the CMAF track file. The device may additionally be configured to detect one or more segment type (STYP) values in the bitstream, determine that each of the one or more STYP values corresponds to a start of a respective one of the CMAF fragments, and process each of the CMAF fragments starting from the corresponding STYP value.
Device communication
A device-communication system may receive, from a user device via a first network, communication data originating from a first device connected to the user device via a second network having a type different from that of the first network. The device-communication system may process the communication data to determine a corresponding device-management system, and may communicate further with the user device for additional identification information, if necessary. The device-communication system determines which of a plurality of device-management systems should receive the communication data and sends the data to the appropriate system.
Device communication
A device-communication system may receive, from a user device via a first network, communication data originating from a first device connected to the user device via a second network having a type different from that of the first network. The device-communication system may process the communication data to determine a corresponding device-management system, and may communicate further with the user device for additional identification information, if necessary. The device-communication system determines which of a plurality of device-management systems should receive the communication data and sends the data to the appropriate system.
Network devices using probes to test forwarding rules
A network switch having hardware thereon for transmitting probes to neighbor devices for exercising forwarding states (e.g., layer 2 and layer 3) on the switch. A light-weight agent resides on one or both of neighbor network devices and can be used to control the testing. Probe allocation can be managed locally on a source device based on a layer 3 routing table. One or more probes originating from the source network device (device A) from a local CPU are routed on the same network device A in hardware and sent out on a link towards a peer device (device B). Peer device B captures the probe using an Access Control List (ACL) hardware, and reflects the probe back to network device A on the ingress port. Network device A can then capture the reflected probe using ACL hardware and verifies the actual forwarding behavior applied on the probe packet.
Network devices using probes to test forwarding rules
A network switch having hardware thereon for transmitting probes to neighbor devices for exercising forwarding states (e.g., layer 2 and layer 3) on the switch. A light-weight agent resides on one or both of neighbor network devices and can be used to control the testing. Probe allocation can be managed locally on a source device based on a layer 3 routing table. One or more probes originating from the source network device (device A) from a local CPU are routed on the same network device A in hardware and sent out on a link towards a peer device (device B). Peer device B captures the probe using an Access Control List (ACL) hardware, and reflects the probe back to network device A on the ingress port. Network device A can then capture the reflected probe using ACL hardware and verifies the actual forwarding behavior applied on the probe packet.
Method and apparatus for identifying encrypted data stream
A method includes parsing a handshake message of an encrypted data stream according to a secure encrypted transmission protocol corresponding to the encrypted data stream, to obtain a plurality of fields included in the handshake message, determining, from a plurality of rule sets and based on the plurality of fields, a rule set that matches the handshake message, and determining, based on a mapping relationship between the matched rule set and an application, an application corresponding to the encrypted data stream.
Method and apparatus for identifying encrypted data stream
A method includes parsing a handshake message of an encrypted data stream according to a secure encrypted transmission protocol corresponding to the encrypted data stream, to obtain a plurality of fields included in the handshake message, determining, from a plurality of rule sets and based on the plurality of fields, a rule set that matches the handshake message, and determining, based on a mapping relationship between the matched rule set and an application, an application corresponding to the encrypted data stream.