Patent classifications
H04L69/22
Invoking a random linear network coding communications protocol
A technology is provided for invoking a random linear network coding (RLNC) communications protocol between a client and server in a network. In one example, a synchronize message requesting a network connection to a server can contain an indication that a client supports the RLNC communications protocol to encode and decode data packets using random linear network coding. The server can analyze the synchronize message for the indication that the client supports the RLNC communications protocol and send an acknowledge message to the client indicating that the server supports the RLNC communications protocol. Thereafter, the server can listen on a communications channel for a connection request sent by the client to communicate with the server using the RLNC communications protocol.
Inter-packet communication of machine learning information
A network switch includes one or more queues to hold packets received from a first input flow and a second input flow. The network switch also includes a packet communication switch configured to access a first header of a first packet in the one or more queues and a second header of a second packet in the one or more queues. The first header includes first machine learning (ML) information that represents a first set of state transition probabilities under a set of actions performed at the network switch. The second header includes second ML information that represents a second set of state transition probabilities under the set of actions performed at the network switch. The packet communication switch is configured to selectively modify the first header or the second header based on a comparison of the first ML information and the second ML information.
Inter-packet communication of machine learning information
A network switch includes one or more queues to hold packets received from a first input flow and a second input flow. The network switch also includes a packet communication switch configured to access a first header of a first packet in the one or more queues and a second header of a second packet in the one or more queues. The first header includes first machine learning (ML) information that represents a first set of state transition probabilities under a set of actions performed at the network switch. The second header includes second ML information that represents a second set of state transition probabilities under the set of actions performed at the network switch. The packet communication switch is configured to selectively modify the first header or the second header based on a comparison of the first ML information and the second ML information.
Identifying and removing a tracking capability from an external domain that performs a tracking activity on a host web page
Identifying and removing a tracking capability from an external domain that performs a tracking activity on a host web page. Tracking capabilities of an external domain may be removed by altering web requests and/or responses to API calls. Once these tracking capabilities of the external domain have been removed, the altered web requests and/or altered responses to API calls may be transmitted to a web browser and/or entity making the API call thereby protecting user privacy while allowing the external domain to interact with the host web page.
Message Encapsulation Method and Apparatus, and Message Decapsulation Method and Apparatus
A message encapsulation method and apparatus, and a message decapsulation method and apparatus are provided. The message encapsulation method includes encapsulating a first message according to a preset encapsulation format to obtain a second message, where the first message is obtained by encapsulating a traffic stream, the second message carries stream attribute information, and the stream attribute information is used for indicating a feature attribute of the traffic stream.
Message Encapsulation Method and Apparatus, and Message Decapsulation Method and Apparatus
A message encapsulation method and apparatus, and a message decapsulation method and apparatus are provided. The message encapsulation method includes encapsulating a first message according to a preset encapsulation format to obtain a second message, where the first message is obtained by encapsulating a traffic stream, the second message carries stream attribute information, and the stream attribute information is used for indicating a feature attribute of the traffic stream.
MULTIPLEXING SIDELINK AND RADIO ACCESS TRAFFIC
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first wireless node may receive a packet from a second wireless node, wherein the packet is associated with an indication of whether the packet is associated with a radio access link or a sidelink of the first wireless node. The first wireless node may transmit the packet on the radio access link or the sidelink in accordance with the indication. Numerous other aspects are described.
TRANSMITTING MULTI-DIMENSIONAL DATA BETWEEN DEVICES
The present disclosure relates to systems, methods, and computer-readable media for data from a first multi-dimensional memory block to a second multi-dimensional memory block. For example, systems described herein facilitate transferring data between memory blocks having different shapes from one another. The systems described herein facilitate transferring data between different shaped memory blocks by identifying shape properties and other characteristics of the data and generating a plurality of network packets having control data based on the identified shape properties and other characteristics. This data included within the network packets enables memory controllers to determine memory addresses on a destination memory block to write data from the network packets. Features described herein facilitate efficient transfer of data without generating a linearized copy that relies on constant availability of significant memory resources.
Distributed Telemetry and Policy Gateway in the cloud for remote devices
Systems and methods include connecting to and authenticating a plurality of user devices; utilizing a plurality of RESTful (Representational State Transfer web service) endpoints to communicate with the plurality of user devices; providing any of policy and configuration to the plurality of user devices utilizing version number via a RESTful endpoint; caching the any of policy and configuration for each device of the plurality of user devices; and receiving metrics based on measurements at the plurality of user devices according to corresponding policy and configuration, via a RESTful endpoint.
Auto discovery of network proxies
According to one or more embodiments of the disclosure, techniques herein provide for auto discovery of network proxies. In particular, in one embodiment, a controller in a computer network receives, from both source devices and destination devices, corresponding Transmission Control Protocol/Internet Protocol (TCP/IP) information and associated transaction identifiers (IDs) for packets sent by the source devices and for packets received at the destination devices. The controller may then correlate particular source TCP/IP information to particular destination TCP/IP information based on associated transaction IDs being the same, and can compare the correlated source TCP/IP information and destination TCP/IP information in order to determine whether a proxy device exists (e.g., and which particular type of proxy device exists) between the source device and the destination device.