Patent classifications
H04L69/24
Fault detection for LACP packet timeout
A fault detection method of LACP packet timeout provided including: receiving a LACP packet from a target port of the partner device through a local port, the LACP packet at least includes a phase identifier to indicate a negotiation phase of a LACP negotiation process between the target port and the local port; sending a response LACP packet corresponding to the LACP packet to the target port through the local port; generating a LACP service processing entry for the LACP packet to indicate a LACP service processing phase performed by the actor device for the LACP packet; in response to that no LACP packet from the target port being received through the local port continues for a preset waiting time, performing fault detection based on the phase identifier and the LACP service processing entry so to obtain fault cause information to indicate a LACP packet timeout of the target port.
Real-time scalable virtual session and network analytics
Provided herein are systems and methods for providing insights or metrics in connection with provisioning applications and/or desktop sessions to end-users. Network devices (e.g., appliances, intermediary devices, gateways, proxy devices or middle-boxes) can gather insights such as network-level statistics. Additional insights (e.g., metadata and metrics) associated with virtual applications and virtual desktops can be gathered to provide administrators with comprehensive end-to-end real-time and/or historical reports of performance and end-user experience (UX) insights. Insights relating to an application or desktop session can be used to determine and/or improve the overall health of the infrastructure of the session, Citrix Virtual Apps and Desktops, the applications (e.g., remote desktop application) being delivered using the infrastructure, and/or the corresponding user experience.
Neighbor awareness networking password authentication
An apparatus comprises a memory and at least one processor in communication with the memory. The at least one processor is to detect, during a discovery window, a neighboring client station that is to perform peer-to-peer Wi-Fi communication via a Neighbor Awareness Networking (NAN) protocol and establish, via a negotiation after the discovery window, a datapath with the neighboring client station, wherein the negotiation includes an exchange of NAN data path setup attributes in parallel with an exchange of encryption cipher attributes and the encryption cipher is based on a simultaneous authentication of equals (SAE) protocol. The SAE protocol can be used to generate key material to encrypt the datapath.
Neighbor awareness networking password authentication
An apparatus comprises a memory and at least one processor in communication with the memory. The at least one processor is to detect, during a discovery window, a neighboring client station that is to perform peer-to-peer Wi-Fi communication via a Neighbor Awareness Networking (NAN) protocol and establish, via a negotiation after the discovery window, a datapath with the neighboring client station, wherein the negotiation includes an exchange of NAN data path setup attributes in parallel with an exchange of encryption cipher attributes and the encryption cipher is based on a simultaneous authentication of equals (SAE) protocol. The SAE protocol can be used to generate key material to encrypt the datapath.
RELIABILITY ENHANCEMENTS FOR MULTI-ACCESS TRAFFIC MANAGEMENT
The present disclosure is related to multi-access traffic management in multi-access computing environments. A reliability enhancement engine (REE) operated by a multi-access multipath traffic manager identifies traffic flows that have high reliability requirements (“reliability flows”) and performs admission control for the reliability flows. The REE determines a coding rate (e.g., a redundancy factor) and traffic distribution strategies for the identified reliability flows. The REE applies cross-access network coding (NC) on the reliability flows, and handles multi-access acknowledgements and traffic pacing, which may involve multiplexing traffic of the reliability flows with non-high-reliability traffic. Other embodiments may be described and/or claimed.
Method and apparatus for edge computing service
An example method for an edge computing service, of identifying a network protocol to be used by an application client, includes: executing the application client; based on the application client being executed, transmitting a request message for verifying the network protocol to be used by the application client to an edge data network; receiving, from the edge data network, a response message indicating the network protocol to be used by the application client; updating a network protocol policy corresponding to the network protocol to be used by the application client to a data socket, based on the response message.
Method and apparatus for edge computing service
An example method for an edge computing service, of identifying a network protocol to be used by an application client, includes: executing the application client; based on the application client being executed, transmitting a request message for verifying the network protocol to be used by the application client to an edge data network; receiving, from the edge data network, a response message indicating the network protocol to be used by the application client; updating a network protocol policy corresponding to the network protocol to be used by the application client to a data socket, based on the response message.
Joint use of ethernet header compression and robust header compression
The present invention provides a method for joint use of Ethernet header compression and robust header compression. More particularly, a method, comprising performing, a first compression/decompression operation to an Ethernet header of an Ethernet packet data; determining that the Ethernet packet includes an Internet Protocol packet; identifying at least one Internet Protocol packet within the Ethernet packet data; and performing a second compression/decompression operation to an Internet Protocol header of the at least one Internet Protocol packet, wherein the second compression/decompression operation is based on an indicated at least one of a context or profile independent from that of the first compression/decompression operation, is disclosed.
Dynamically routing code for executing
Code may be dynamically routed to computing resources for execution. Code may be received for execution on behalf of a client. Execution criteria for the code may be determined and computing resources that satisfy the execution criteria may be identified. The identified computing resources may then be procured for executing the code and then the code may be routed to the procured computing resources for execution. Permissions or authorization to execute the code may be shared to ensure that computing resources executing the code have the same permissions or authorization when executing the code.
Connecting computer processing systems and transmitting data
Examples described herein provide a computer-implemented method that includes converting, by a first processing system, a binary data stream into a string using encoding. The method further includes advertising, by the first processing system, standard characteristics to a second processing system. The method further includes receiving, by the first processing system, a request from the second processing system for a payload size and payload characteristics for the data to be transmitted from the first processing system to the second processing system. The method further includes transmitting, by the first processing system, the payload size and the payload characteristics to the second processing system.