H04L69/30

HETEROGENEOUS MULTI-PROTOCOL STACK METHOD, APPARATUS, AND SYSTEM
20190319894 · 2019-10-17 ·

A heterogeneous multi-protocol stack system including a plurality of heterogeneous protocol stack instances is described. Resource allocation between the protocol stack instances is unbalanced, and algorithms are independently configured, so that QoS capacities of different protocol stack instances are different. Data packets of applications or connections with different QoS requirements can be dispatched by a dispatcher to corresponding protocol stack instances at a high speed. When system resources are limited, the heterogeneous multi-protocol stack system is capable of simultaneously supporting classification optimization processing performed on data of a high-concurrency application, a high-throughput application, and a low-delay application, so as to meet QoS requirements of different types of applications, thereby improving user experience.

Real-time adaptive receive side scaling key selection

Selecting a receive side scaling (RSS) key is provided. It is determined whether a defined time interval expired. In response to determining that the defined time interval has expired, it is determined whether one or more keys in a set of randomly generated candidate RSS keys have a higher packet distribution score than an active RSS key. In response to determining that one or more keys in the set of randomly generated candidate RSS keys have a higher packet distribution score than the active RSS key, an RSS key having a highest packet distribution score is selected from the one or more keys in the set of randomly generated candidate RSS keys that have a higher packet distribution score than the active RSS key. The RSS key having the highest packet distribution score is used to distribute incoming network packets across a plurality of processors.

Kernel event triggers

The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.

Multi-tunneling virtual network adapter

Multiple virtual private network connections to be created without the need for administrative privileges, and network traffic to be routed using a single virtual adapter instead of a dedicated virtual adapter for each virtual network connection.

PACKET EXCHANGE METHOD AND RELATED DEVICE
20190223252 · 2019-07-18 ·

The present application discloses a packet exchange method and a related device. The method includes: obtaining, by a first device, a packet by using a Network Convergence Protocol (NCP) layer of the first device; and sending, by the first device, the packet to an NCP layer of a second device by using the NCP layer of the first device, where the NCP layer is located at a data link layer of a user plane, and the NCP layer of the first device and the NCP layer of the second device form a direct data exchange channel between the first device and the second device; and the first device is a terminal and the second device is a core network device, or the first device is a core network device and the second device is a terminal.

Method and system for restarting network service without packet loss and with zero downtime
10348558 · 2019-07-09 · ·

The present disclosure discloses a method and system for restarting the network service with zero downtime, comprising: a) listening, by an original process of the network service, on a first port; (b) configuring and initiating a transition process, wherein the configuring includes causing the transition process to listen on a second port different from the first port of the original process; (c) running a connection tracking module and, meanwhile adding an iptables rule to redirect a connection directed to the first port to the second port; (d) waiting until existing connections on the original process are processed completely, then exiting the original process; (e) initiating a new process on the first port according to a new configuring file; (f) reconfiguring the iptables rule to cancel port redirection; and (g) waiting until existing connections on the transition process are processed completely, then exiting the transition process.

Employing session level restrictions to limit access to a redirected interface of a composite device

Session level restrictions can be implemented to limit access to a redirected interface of a composite device. These session level restrictions can be defined within a policy of a directory service, such as Active Directory, to facilitate the dynamic application of the restrictions to the appropriate remote sessions. In this way, access restrictions can be applied to individual interfaces of a redirected composite device so that a particular interface will only be accessible from specified remote sessions.

RPS SUPPORT FOR NFV BY SYSTEM CALL BYPASS
20190182139 · 2019-06-13 ·

A system for Receive Packet Steering (RPS) support for Network Function Virtualization (NFV) by system call bypass includes a memory, a plurality of central processing units (CPUs) in communication with the memory, an operating system, and a Network Interface Controller (NIC) including a receive queue. The system also includes a driver thread and a plurality of forwarding threads. The driver thread handles the receive queue of the NIC. In an example, a first forwarding thread of the plurality of forwarding threads executes a system call. The first forwarding thread executes on the first CPU. The system call, when executed, executes a monitor instruction on a first CPU to monitor for updates to a designated memory location and checks a condition. Checking the condition includes reading the designated memory location and determining whether information in the designated memory location indicates that a new packet for the first forwarding thread has arrived.

COMMUNICATION METHOD BASED ON USER-MODE PROTOCOL STACK, AND CORRESPONDING APPARATUS
20240205170 · 2024-06-20 ·

Example communication methods and systems based on a user-mode protocol stack are provided. One example method is applied to a service side, where the service side includes an application layer, the user-mode protocol stack, and a hardware layer. A target application of the application layer corresponds to at least one W thread. The example method includes obtaining, by using a routing module, a first correspondence and a second correspondence, where the first correspondence includes a correspondence between a listen file descriptor (FD) of a first W thread and a plurality of shadow FDs, and the second correspondence includes a correspondence between a target N thread and a connection FD. Communication with a client is performed using the routing module based on the first correspondence and the second correspondence.

Using a single work item to send multiple messages

A method for communication includes receiving multiple work requests from a process running on a computer to transmit respective messages over a network. A single work item corresponding to the multiple work requests is submitted to a network interface controller (NIC) connected to the computer. In response to the single work item, multiple data packets carrying the respective messages are transmitted from the NIC to the network.