H04L69/22

Method for reducing power consumption and device
11665057 · 2023-05-30 · ·

Embodiments of this application disclose a method for reducing power consumption and a device, and relate to the field of mobile terminals, to further reduce power consumption of a terminal device when the terminal device enters a doze mode. A specific solution is as follows: After detecting that screen-off duration of the terminal device is greater than first duration, the terminal device sends a transmission control protocol reset packet to an application server of a to-be-controlled application, so that the application server disconnects a TCP connection to the terminal device. Therefore, after the terminal device enters the doze mode, the power consumption of the terminal device is further reduced. The embodiments of this application are used to reduce power consumption of the terminal device.

Data stream identification method and apparatus

This application provides a data stream identification method and apparatus and belongs to the field of Internet technologies. The method includes: obtaining packet transmission attribute information of N consecutive packets in a target data stream; generating feature images of the packet transmission attribute information of the N consecutive packets based on the packet transmission attribute information of the N consecutive packets; and inputting the feature images into a pre-trained image classification model, to obtain a target application identifier corresponding to the target data stream. According to this application, accuracy of identifying an application identifier corresponding to a data stream can be improved.

Data stream identification method and apparatus

This application provides a data stream identification method and apparatus and belongs to the field of Internet technologies. The method includes: obtaining packet transmission attribute information of N consecutive packets in a target data stream; generating feature images of the packet transmission attribute information of the N consecutive packets based on the packet transmission attribute information of the N consecutive packets; and inputting the feature images into a pre-trained image classification model, to obtain a target application identifier corresponding to the target data stream. According to this application, accuracy of identifying an application identifier corresponding to a data stream can be improved.

Mechanism for hitless resynchronization during SDN controller upgrades between incompatible versions

A method is implemented by a switch in a software defined networking (SDN) network managed by a controller to achieve hitless resynchronization during a controller upgrade. The method includes installing an upgraded set of flow entries so that a packet processing pipeline of the switch includes both a non-upgraded set of flow entries and the upgraded set of flow entries, processing non-tunneled packets using the non-upgraded set of flow entries, processing tunneled packets that have a tunnel upgrade status indicator set in a tunnel header using the non-upgraded set of flow entries, while processing tunneled packets that do not have a tunnel upgrade status indicator set in a tunnel header using the upgraded set of flow entries, and processing non-tunneled packets using the upgraded set of flow entries after all switches managed by the controller have installed upgraded flow entries.

Mechanism for hitless resynchronization during SDN controller upgrades between incompatible versions

A method is implemented by a switch in a software defined networking (SDN) network managed by a controller to achieve hitless resynchronization during a controller upgrade. The method includes installing an upgraded set of flow entries so that a packet processing pipeline of the switch includes both a non-upgraded set of flow entries and the upgraded set of flow entries, processing non-tunneled packets using the non-upgraded set of flow entries, processing tunneled packets that have a tunnel upgrade status indicator set in a tunnel header using the non-upgraded set of flow entries, while processing tunneled packets that do not have a tunnel upgrade status indicator set in a tunnel header using the upgraded set of flow entries, and processing non-tunneled packets using the upgraded set of flow entries after all switches managed by the controller have installed upgraded flow entries.

Graph stream mining pipeline for efficient subgraph detection

A graph stream mining processing system and method may be used to analyze the data from a plurality of data streams. In one embodiment, the graph stream mining processing system and method may be used to detect one or more candidate botnet malicious nodes.

Extended sequence control for fragmented frames in WLAN

Embodiments of the present invention transmit fragmented frames using a sequence control field in a MAC header that includes an extended 15-bit sequence number for tracking the order of frames, and a 1-bit PF field that indicates the position of a fragmented frame in conjunction with a 1-bit MF field carried in a frame control subfield of the MAC header. The fragmented frames can be received by a wireless device and defragmented according to the MF field, the PF field, and the sequence control number. The frames can be discarded if any are not received successfully.

Extended sequence control for fragmented frames in WLAN

Embodiments of the present invention transmit fragmented frames using a sequence control field in a MAC header that includes an extended 15-bit sequence number for tracking the order of frames, and a 1-bit PF field that indicates the position of a fragmented frame in conjunction with a 1-bit MF field carried in a frame control subfield of the MAC header. The fragmented frames can be received by a wireless device and defragmented according to the MF field, the PF field, and the sequence control number. The frames can be discarded if any are not received successfully.

Fine-grained SD-WAN optimization services for cloud-native applications

In one embodiment, a device of a software-defined wide area network (SD-WAN) receives, from a cloud-native application, contextual data for the cloud-native application that identifies microservices of the cloud-native application. The device translates the contextual data for the cloud-native application into a network policy for traffic in the SD-WAN associated with the cloud-native application. The device applies the network policy to a traffic flow in the SD-WAN between an endpoint and a particular microservice of the cloud-native application.

Secure access to a corporate web application with translation between an internal address and an external address

Secure access to a corporate application with translation between an internal address and an external address. In some embodiments, a method may include receiving, at a secure access cloud point of delivery (PoD), from a client application on a client device, a request to access a corporate web application that is deployed in a corporate datacenter. The method may also include forwarding, from the secure access cloud PoD, to a connector that is also deployed in the corporate datacenter, the request to access the corporate web application. The method may further include brokering, by the connector and the secure access cloud PoD, authentication of a user, authorization of access by the user, and a secure communication session between the client application and the corporate web application by translating between an internal address of the corporate web application and an external address of the corporate web application.