Patent classifications
H04L69/30
Packet exchange method and related device
The present application discloses a packet exchange method and a related device. The method includes: obtaining, by a first device, a packet by using a Network Convergence Protocol (NCP) layer of the first device; and sending, by the first device, the packet to an NCP layer of a second device by using the NCP layer of the first device, where the NCP layer is located at a data link layer of a user plane, and the NCP layer of the first device and the NCP layer of the second device form a direct data exchange channel between the first device and the second device; and the first device is a terminal and the second device is a core network device, or the first device is a core network device and the second device is a terminal.
RPS support for NFV by system call bypass
A system for Receive Packet Steering (RPS) support for Network Function Virtualization (NFV) by system call bypass includes a memory, a plurality of central processing units (CPUs) in communication with the memory, an operating system, and a Network Interface Controller (NIC) including a receive queue. The system also includes a driver thread and a plurality of forwarding threads. The driver thread handles the receive queue of the NIC. In an example, a first forwarding thread of the plurality of forwarding threads executes a system call. The first forwarding thread executes on the first CPU. The system call, when executed, executes a monitor instruction on a first CPU to monitor for updates to a designated memory location and checks a condition. Checking the condition includes reading the designated memory location and determining whether information in the designated memory location indicates that a new packet for the first forwarding thread has arrived.
Systems and methods for reducing the number of open ports on a host computer
Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In embodiments, the functionality of such a host computer is enhanced by having it condition client access to services available at a particular port number based on client authentication and/or authorization. A host computer can change the service(s) available at a given port number on a client by client basis, enabling access to service(s) for trusted clients unavailable to untrusted clients. Preferably, client trust is based on client authentication via a certificate and a valid, signed transport layer security (TLS) handshake (or similar mechanism in other protocol contexts). In some embodiments, an authorization step can be added following authentication. The systems and methods disclosed herein find wide uses in bundling services on ports, as well as protecting access to services from untrusted and/or malicious clients, among others.
Systems and methods for reducing the number of open ports on a host computer
Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In embodiments, the functionality of such a host computer is enhanced by having it condition client access to services available at a particular port number based on client authentication and/or authorization. A host computer can change the service(s) available at a given port number on a client by client basis, enabling access to service(s) for trusted clients unavailable to untrusted clients. Preferably, client trust is based on client authentication via a certificate and a valid, signed transport layer security (TLS) handshake (or similar mechanism in other protocol contexts). In some embodiments, an authorization step can be added following authentication. The systems and methods disclosed herein find wide uses in bundling services on ports, as well as protecting access to services from untrusted and/or malicious clients, among others.
Method and system for core network support of access network protocols in multi-homed redundancy groups
In one embodiment, a method according to the present disclosure includes receiving a topology change message at a core edge node and performing a network address information removal operation. The core edge node participates in network communications with one or more access network nodes of an access network using an access network protocol. The topology change message indicates that a topology change has occurred in the access network, and the topology change message conforms to the access network protocol. The network address information removal operation removes network address information stored by the core edge node, and the network address information is used by the core edge node in participating in the network communications.
Accounting and enforcing non-process execution by container-based software receiving data over a network
Utilizing a computing device to determine and enforce limits on cloud computing containers receiving data over a network. A determination is made of total container time remaining available for a first container to execute in a computing environment. Processor packet receipt time is determined for receiving and processing of a packet or a batch of packets via a network stack associated with the computing device. An updated total container time remaining is calculated for the first container accounting for the processor packet receipt time. The updated total container time remaining is enforced by dropping a subsequent packet or batch of packets received at the network stack if the updated total container time remaining is insufficient.
Multi-dimensional segmentation method and apparatus for 5G-oriented protocol stack, and terminal
Disclosed are a multi-dimensional segmentation method and apparatus for a 5G-oriented protocol stack, and a terminal. The method comprises: segmenting an MAC layer in a protocol stack, and putting HARQ entities of a physical layer and the MAC layer together in a pre-set physical resource for processing; and moving a relevant partial module of the physical layer to an FPGA for processing according to a calculation amount and functional requirements. The hardware configuration requirements are reduced on the basis of guaranteeing the performance.
BLUETOOTH INTERNET PROTOCOL PACKET TRANSMITTING DEVICE AND METHOD
A Bluetooth internet protocol packet transmitting device and method are provided. The device includes a Bluetooth protocol stack, a Bluetooth controller and a host control interface. The Bluetooth protocol stack is configured to store an internet protocol stack and a host control interface driver. The Bluetooth controller generates at least one data packet based on an internet protocol packet, wherein the at least one data packet corresponds to an asynchronous connection data format. The Bluetooth controller transmits the at least one data packet to the host control interface driver. The host control interface driver determines whether the at least one data packet is an asynchronous connection data packet. When the host control interface driver determines that the at least one data packet is the asynchronous connection data packet, the at least one data packet is transmitted to the internet protocol stack.
BLUETOOTH INTERNET PROTOCOL PACKET TRANSMITTING DEVICE AND METHOD
A Bluetooth internet protocol packet transmitting device and method are provided. The device includes a Bluetooth protocol stack, a Bluetooth controller and a host control interface. The Bluetooth protocol stack is configured to store an internet protocol stack and a host control interface driver. The Bluetooth controller generates at least one data packet based on an internet protocol packet, wherein the at least one data packet corresponds to an asynchronous connection data format. The Bluetooth controller transmits the at least one data packet to the host control interface driver. The host control interface driver determines whether the at least one data packet is an asynchronous connection data packet. When the host control interface driver determines that the at least one data packet is the asynchronous connection data packet, the at least one data packet is transmitted to the internet protocol stack.
Resource allocation method and system on software defined protocol network
The present disclosure provides a resource allocation method and system on a Software Defined Protocol (SDP) network. The method includes: receiving, by a resource allocator, a resource request message sent by a protocol stack deployment node, where the resource request message carries information about a protocol stack deployed on the protocol stack deployment node; determining, by the resource allocator, information about an available resource on an SDP network, where the available resource is used for resource allocation of the protocol stack; determining, by the resource allocator according to the information about the protocol stack and the information about the available resource, a resource allocated to each protocol layer in the protocol stack; and sending, by the resource allocator, a resource feedback message to the protocol stack deployment node, where the resource feedback message carries the information about the resource allocated to each protocol layer.