Patent classifications
H04L69/30
Upgrading a descriptor engine for a network interface card
A method for updating a descriptor engine for a network interface card (NIT) can include quiescing, by a processing device, a transmit stream to the NIC. The method can further include stopping, by the processing device, a descriptor engine from providing new receive descriptors to the NIC. The method can further include setting, by the processing device, a controller to redirect inbound traffic to the memory. The method can further include restoring, by the processing device, a transmit configuration and a transmit state of the descriptor engine subsequent to updating the descriptor engine.
MULTI-DIMENSIONAL SEGMENTATION METHOD AND APPARATUS FOR 5G-ORIENTED PROTOCOL STACK, AND TERMINAL
Disclosed are a multi-dimensional segmentation method and apparatus for a 5G-oriented protocol stack, and a terminal. The method comprises: segmenting an MAC layer in a protocol stack, and putting HARQ entities of a physical layer and the MAC layer together in a pre-set physical resource for processing; and moving a relevant partial module of the physical layer to an FPGA for processing according to a calculation amount and functional requirements. The hardware configuration requirements are reduced on the basis of guaranteeing the performance.
Unified real-time and non-real-time data plane
According to some embodiments, system and methods are provided, comprising at least one asset; a computer programmed with a data share module for the asset, the data share module for controlling data flow in the asset; the computer including a data share processor and a memory in communication with the data share processor, the memory storing the data share module and additional program instructions, wherein the data share processor is operative with the data share module and additional program instructions to perform functions as follows: receiving a message from a source at the data share module; determining, via the data share module, whether the source is one of a non-real time domain of the asset and the real-time domain of the asset; determining, via the data share module, when a destination is able to respond to the message, wherein the destination is one of the non-real time domain and the real-time domain, and wherein the destination is different from the source; transmitting, via the data share module, the message directly to the destination when the destination is able to respond to the message; receiving a response to the message; and generating an operating response of the asset based on the response. Numerous other aspects are provided.
Kernel event triggers for content item security
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
Collaboration enhanced with kernel event triggers
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
Device, method, and computer program product for secure data communication
The invention relates to devices, methods, and computer program products for secure data communication according to a network protocol having a plurality of communication layers layered into a protocol stack. Said device comprises a processor system, in which a processor, controlled by a task scheduler, executes a plurality of autonomous software modules, which each run a communication layer of the protocol stack. The software modules are linked via communication channels to the protocol stack and the protocol stack is connected to an interface framework for data communication with an external network. At least one software module uses an assigned cryptographic key for secure data communication in its communication layer. The task scheduler is configured to obtain said key from the external network via the interface framework and to distribute said key to the assigned software module.
METHOD AND SYSTEM FOR CORE NETWORK SUPPORT OF ACCESS NETWORK PROTOCOLS IN MULTI-HOMED REDUNDANCY GROUPS
In one embodiment, a method according to the present disclosure includes receiving a topology change message at a core edge node and performing a network address information removal operation. The core edge node participates in network communications with one or more access network nodes of an access network using an access network protocol. The topology change message indicates that a topology change has occurred in the access network, and the topology change message conforms to the access network protocol. The network address information removal operation removes network address information stored by the core edge node, and the network address information is used by the core edge node in participating in the network communications.
MULTI-TUNNELING VIRTUAL NETWORK ADAPTER
Multiple virtual private network connections to be created without the need for administrative privileges, and network traffic to be routed using a single virtual adapter instead of a dedicated virtual adapter for each virtual network connection.
Kernel event triggers
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
Real-Time adaptive receive side scaling key selection
Selecting a receive side scaling (RSS) key is provided. It is determined whether a defined time interval expired. In response to determining that the defined time interval has expired, it is determined whether one or more keys in a set of randomly generated candidate RSS keys have a higher packet distribution score than an active RSS key. In response to determining that one or more keys in the set of randomly generated candidate RSS keys have a higher packet distribution score than the active RSS key, an RSS key having a highest packet distribution score is selected from the one or more keys in the set of randomly generated candidate RSS keys that have a higher packet distribution score than the active RSS key. The RSS key having the highest packet distribution score is used to distribute incoming network packets across a plurality of processors.