H04L69/22

Connection management techniques

Devices communicating wirelessly may experience temporary disconnections. While disconnected, a device may be unable to notify the other device that an update has occurred and that data previously used for communication may no longer be current. An ephemeral characteristic can be used by a service device that is updated each time a change occurs on the service device that may impact communications. A client device can use cached service data to attempt to write to this ephemeral characteristic. If the write does not complete successfully, it can be determined that the cached data is no longer current and a service request change can be used to cause the client device to flush the cached data and request current data from the service device.

OVERLAY NETWORK BASED TECHNIQUES FOR ENABLING COMMUNICATION BETWEEN ON-PREMISES AND CLOUD HOSTED DATA CENTERS

A host machine implementing a service host that implements a set of one or more tunnel-endpoints (TEPs) is provided a first connection from a first customer premise equipment (CPE) in a first on-premises data center of a first customer, the first connection terminating at a first TEP of the set of one or more TEPs. The first TEP receives a first packet over the first connection, and adds a first label to the first packet. The first packet with the first label is forwarded to a direct-attached virtual network interface card (DAV) associated with the service host. The DAV modifies a header of the first packet, and responsive to the modifying, switches the first packet to a virtual cloud network (VCN) of the first customer.

OVERLAY NETWORK BASED TECHNIQUES FOR ENABLING COMMUNICATION BETWEEN ON-PREMISES AND CLOUD HOSTED DATA CENTERS

A host machine implementing a service host that implements a set of one or more tunnel-endpoints (TEPs) is provided a first connection from a first customer premise equipment (CPE) in a first on-premises data center of a first customer, the first connection terminating at a first TEP of the set of one or more TEPs. The first TEP receives a first packet over the first connection, and adds a first label to the first packet. The first packet with the first label is forwarded to a direct-attached virtual network interface card (DAV) associated with the service host. The DAV modifies a header of the first packet, and responsive to the modifying, switches the first packet to a virtual cloud network (VCN) of the first customer.

Techniques for network packet classification, transmission and receipt

A virtual machine (VM) can provision a region of memory for a queue to receive packet header, packet payload, and/or descriptors from the network interface. A virtual switch can provide a routing rule to a network interface to route a received packet header, packet payload, and/or descriptors associated with the VM to the provisioned queue. A direct memory access (DMA) transfer operation can be used to copy the received packet header, packet payload, and/or descriptors associated with the VM from the network interface to the provisioned queue without copying the packet header or payload to an intermediate buffer and from the intermediate buffer to the provisioned queue. A DMA operation can be used to transfer a packet or its descriptor from the provisioned queue to the network interface for transmission.

Techniques for network packet classification, transmission and receipt

A virtual machine (VM) can provision a region of memory for a queue to receive packet header, packet payload, and/or descriptors from the network interface. A virtual switch can provide a routing rule to a network interface to route a received packet header, packet payload, and/or descriptors associated with the VM to the provisioned queue. A direct memory access (DMA) transfer operation can be used to copy the received packet header, packet payload, and/or descriptors associated with the VM from the network interface to the provisioned queue without copying the packet header or payload to an intermediate buffer and from the intermediate buffer to the provisioned queue. A DMA operation can be used to transfer a packet or its descriptor from the provisioned queue to the network interface for transmission.

In-packet version tagging utilizing a perimeter NAT

Various embodiments are directed to receiving, at a receiving device, a packet from a node in a first network. determining a version identifier for the packet, encoding the version identifier into the packet, and transmitting the packet containing the encoded version identifier to a load balancing device in a second network. The version identifier may be encoded into a destination port field of the packet. The receiving device may be a perimeter network address translation device. The packet is received at the load balancing device, where the version identifier is extracted and a hash of source address information is performed. The version and hash are used to select a back-end device in the second network. The packet is transmitted to the selected back-end device.

In-packet version tagging utilizing a perimeter NAT

Various embodiments are directed to receiving, at a receiving device, a packet from a node in a first network. determining a version identifier for the packet, encoding the version identifier into the packet, and transmitting the packet containing the encoded version identifier to a load balancing device in a second network. The version identifier may be encoded into a destination port field of the packet. The receiving device may be a perimeter network address translation device. The packet is received at the load balancing device, where the version identifier is extracted and a hash of source address information is performed. The version and hash are used to select a back-end device in the second network. The packet is transmitted to the selected back-end device.

Enhanced Bluetooth mechanism for triggering Wi-Fi radios

This disclosure describes methods, apparatus, and systems related to enhanced Bluetooth triggering of device Wi-Fi radios. A device may determine a first Bluetooth data packet including transport data and an indication of a Wi-Fi service discovery, the transport data including a first sub-field and a second sub-field, the first sub-field indicating a length of the second sub-field, and the second sub-field indicating one or more Wi-Fi services supported by the device. A Bluetooth radio of the device may send the first Bluetooth data packet including an indication of a Wi-Fi service. The device may identify a second Bluetooth data packet received by the Bluetooth radio from a second device, the second Bluetooth data packet indicating that the Wi-Fi service is supported by the second device. The device may use a Wi-Fi radio to send one or more Wi-Fi frames associated with the Wi-Fi service to the second device.

Enhanced Bluetooth mechanism for triggering Wi-Fi radios

This disclosure describes methods, apparatus, and systems related to enhanced Bluetooth triggering of device Wi-Fi radios. A device may determine a first Bluetooth data packet including transport data and an indication of a Wi-Fi service discovery, the transport data including a first sub-field and a second sub-field, the first sub-field indicating a length of the second sub-field, and the second sub-field indicating one or more Wi-Fi services supported by the device. A Bluetooth radio of the device may send the first Bluetooth data packet including an indication of a Wi-Fi service. The device may identify a second Bluetooth data packet received by the Bluetooth radio from a second device, the second Bluetooth data packet indicating that the Wi-Fi service is supported by the second device. The device may use a Wi-Fi radio to send one or more Wi-Fi frames associated with the Wi-Fi service to the second device.

Control Information for a Wirelessly-Transmitted Data Stream

Control information for configuring an audiovisual device to present multimedia content according to a first service type may be generated. A method may include generating first control information for configuring an audiovisual device to decode a multimedia stream, generating first data that indicates a structure of the first control information, and transmitting the first data and the first control information. The first control information may be generated according to a first protocol version. Second data and second control information may be similarly generated and transmitted according to a second protocol version. Disclosed techniques may facilitate receiving devices to determine whether they support received wireless transmissions and decode the transmissions based on the control information.