Patent classifications
H04L69/22
Data encoding and packet sharing in a parallel communication interface
An apparatus includes an interface circuit and an encoder circuit. The interface circuit is configured to send a data packet via a plurality of segments, and to send an idle value via the plurality of segments when no data packet is available. The idle value is configured to cause a segment in a receiving apparatus to idle. The encoder circuit is configured to receive a particular data packet, and, if a portion of the particular data packet has a same value as the idle value for a subset of the plurality of segments, to replace at least a portion of the data packet with a mask value to generate a modified data packet. The mask value indicates how to recreate the particular data packet. The encoder circuit is further configured to send the modified data packet to the receiving apparatus via the plurality of segments of the interface circuit.
Distinguishing Traffic-Engineered Packets and Non-Traffic-Engineered Packets
Various embodiments providing for an indicator (termed the “Traffic Category Indicator,” TCI) to be encoded into packets, different values of which can be used, e.g., to distinguish Traffic Engineered (TE) packets and non-TE packets. In an example embodiment, the TCI can be used, e.g., to configure a network node to implement different packet queues, on each link, for TE packets and non-TE packets. In embodiments corresponding to the DiffServ TE paradigm, a node can be configured to implement different queues within each Forwarding Class for each link, said different queues distinguished by different respective TCI values. Example benefits of TCI include, but are not limited to fate separation of TE and non-TE packets in a node. The TCI concept can beneficially be applied to different packet-switching technologies supporting Source Routing, such as the IP, MPLS, Ethernet, etc.
NETWORK TRAFFIC MANAGEMENT USING SERVER NAME INDICATION
A network gateway apparatus monitors Quic user datagram protocol (UDP) Internet Connection (QUIC) packets between a first device and a second device, extracts a version of the QUIC protocol and a connection identification from an unprotected portion of the protected header in response to detecting a QUIC packet having a protected header in use, determines a salt used in encryption of the protected header based on the version of the QUIC protocol, calculates a client initial secret based on the salt and the connection identification, determines an unprotected payload of the QUIC packet based on the client initial secret, a protected payload of the QUIC packet and the unprotected portion of the protected header, and extracts a server name indication (SNI) from the unprotected payload.
Intelligent flow state synchronization to improve resiliency, availability, and/or performance of redundant network security devices
Example security systems for use between at least one upstream router and at least one downstream router, are described. A group or pool of security devices can be used to provide stateful security to bidirectional packet flows between upstream and downstream routers. The packets of the bidirectional flows are forwarded to particular security devices based on a consistent hash ring process. For a given flow, bidirectional state information is synchronized among some, but not all, of the security devices. The security devices among which such bidirectional flow state information is shared are determined using the same consistent hash ring process.
Performance of traffic monitoring actions
Some embodiments provide a method for performing data traffic monitoring. For each packet processing stage of a set of packet processing stages in a packet processing pipeline, the method determines whether a packet received by the packet processing pipeline specifies a set of monitoring actions to be performed on the packet. When the packet specifies a set of monitoring action, the method determines whether the monitoring actions in the set are supported by the packet processing stage. The method executes the supported monitoring actions on the packet in addition to processing the packet according to configuration data for the stage.
Wireless Device Capability Information
Systems, apparatuses, and methods are described for wireless communications. A base station and wireless device may communicate capability information associated with a wireless device. The capability information may include information indicating support for an Ethernet type packet data unit session or header parameter compression. An Ethernet type packet data unit session may be instantiated based on the capability information.
Wireless Device Capability Information
Systems, apparatuses, and methods are described for wireless communications. A base station and wireless device may communicate capability information associated with a wireless device. The capability information may include information indicating support for an Ethernet type packet data unit session or header parameter compression. An Ethernet type packet data unit session may be instantiated based on the capability information.
Message processing
In a telecommunications network, a network node processes messages according to different sets of user-programmable message processing rules. The network node includes an input for receiving a series of input messages which are processed in a message manipulation function. Processed messages are also output from the network node according different communication protocols.
Message processing
In a telecommunications network, a network node processes messages according to different sets of user-programmable message processing rules. The network node includes an input for receiving a series of input messages which are processed in a message manipulation function. Processed messages are also output from the network node according different communication protocols.
Method, device, and system for network traffic analysis
A method, device, and system for network traffic analysis are provided. The method comprises obtaining traffic data of current time interval, recording the traffic data in a Chinese Remainder Theorem based Reversible Sketch (CRT-RS) based on a hash operation comprising Modulo operations, detecting abnormal buckets in the CRT-RS based on a change between the traffic data of current time interval and traffic data of previous time interval, and recovering abnormal source address associated information based on the abnormal buckets, wherein the modulus of the Modulo operations are selected from the modulus in Chinese Remainder Theorem (CRT) as pairwise coprime integers and the CRT-RS includes a plurality of buckets. The step of detecting uses a Modified Multi-chart Cumulative Sum.