Patent classifications
H04L69/30
BASE STATION EQUIPMENT, COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, PROGRAM, FRAME TRANSMITTING METHOD, AND DATA STRUCTURE
If the sequence of a traffic of a first communication link from a communication apparatus to another communication apparatus includes a traffic of a second communication link from that another communication apparatus to a communication apparatus, latency is reduced, thereby saving processing time.
If, after data is transmitted from a communication apparatus to another communication apparatus by the upper layer, a data receive response signal is required from that another communication apparatus to the communication apparatus, a predetermined frame including transmission grant information for that another communication apparatus to transmit the receive response signal and data is generated in the communication apparatus. The communication apparatus transmits this generated frame to that another communication apparatus. That is, data and transmission grant information are transmitted from the communication apparatus to that another communication apparatus as a predetermined frame.
UPGRADING A DESCRIPTOR ENGINE FOR A NETWORK INTERFACE CARD
A method for updating a descriptor engine for a network interface card (NIT) can include quiescing, by a processing device, a transmit stream to the NIC. The method can further include stopping, by the processing device, a descriptor engine from providing new receive descriptors to the NIC. The method can further include setting, by the processing device, a controller to redirect inbound traffic to the memory. The method can further include restoring, by the processing device, a transmit configuration and a transmit state of the descriptor engine subsequent to updating the descriptor engine.
DATA PROCESSING SYSTEM
A data processing system has a poll mode driver and a library supporting protocol processing. The poll mode driver and the library are non-operating system functionalities. An application is provided. An operation system is configured while executing in kernel mode and in response to the application being determined to be unresponsive, use a helper process being an operating system functionality executing at user-mode to cause a receive or transmit mode of the application to continue.
PROTOCOL MODEL GENERATOR AND MODELING METHOD THEREOF
A protocol model generator according to the present disclosure includes: a memory in which a protocol model generating program is stored; and a processor configured to execute the program. Herein, upon execution of the program, the processor extracts multiple strings from a binary corresponding to a protocol, generates a message pool including multiple candidate messages to be used in the protocol corresponding to the binary on the basis of the extracted multiple strings, and generates a protocol model corresponding to the protocol and configured to include nodes corresponding to the respective candidate messages included in the message pool. Further, the candidate messages include messages generated on the basis of the strings and response messages generated corresponding to the messages, and the protocol model is generated including one or more nodes and transition information between the nodes.
Methods, systems, and computer readable media for initiating and executing performance tests of a private network and/or components thereof
Methods, systems, and computer readable media for initiating and executing a performance test of a private network and/or components thereof are disclosed. Methods and systems include a receiver endpoint in a private network, and a sender endpoint in a public network. The receiver endpoint initiates a transport layer connection with the sender endpoint. The sender endpoint allocates a port, binds to the port, and sends an Internet Protocol (IP) address and a port number over the transport layer connection. The receiver endpoint then sends a hole punch datagram from the private network to the public network to create a hole in a firewall that is separating the public and private networks. The sender endpoint receives the hole punch datagram and uses IP address and port information in the hole punch datagram to send test traffic through the hole in the firewall.
Bluetooth internet protocol packet transmitting device and method
A Bluetooth internet protocol packet transmitting device and method are provided. The device includes a Bluetooth protocol stack, a Bluetooth controller and a host control interface. The Bluetooth protocol stack is configured to store an internet protocol stack and a host control interface driver. The Bluetooth controller generates at least one data packet based on an internet protocol packet, wherein the at least one data packet corresponds to an asynchronous connection data format. The Bluetooth controller transmits the at least one data packet to the host control interface driver. The host control interface driver determines whether the at least one data packet is an asynchronous connection data packet. When the host control interface driver determines that the at least one data packet is the asynchronous connection data packet, the at least one data packet is transmitted to the internet protocol stack.
Bluetooth internet protocol packet transmitting device and method
A Bluetooth internet protocol packet transmitting device and method are provided. The device includes a Bluetooth protocol stack, a Bluetooth controller and a host control interface. The Bluetooth protocol stack is configured to store an internet protocol stack and a host control interface driver. The Bluetooth controller generates at least one data packet based on an internet protocol packet, wherein the at least one data packet corresponds to an asynchronous connection data format. The Bluetooth controller transmits the at least one data packet to the host control interface driver. The host control interface driver determines whether the at least one data packet is an asynchronous connection data packet. When the host control interface driver determines that the at least one data packet is the asynchronous connection data packet, the at least one data packet is transmitted to the internet protocol stack.
Upgrading a descriptor engine for a network interface card
A method for updating a descriptor engine for a network interface card (NIC) may include quiescing a transmit stream to the NIC. The method may further include stopping a descriptor engine from providing new receive descriptors to the NIC. The method may further include creating a copy in a memory of any receive descriptors already available to the NIC prior to the stopping the descriptor engine. The method may further include setting a controller to redirect inbound traffic to the memory. The method may further include restoring a transmit configuration and a transmit state of the descriptor engine subsequent to updating the descriptor engine.
Method and apparatus for processing data packet based on parallel protocol stack instances
A method and an apparatus for processing a data packet based on parallel protocol stack instances, where lower-layer protocol processing is performed, using a first protocol stack instance. An associated second protocol stack instance is determined using a target socket after the target socket that is needed to perform upper-layer protocol processing on the data packet is determined, and the upper-layer protocol processing is performed, using the target socket and the second protocol stack instance. The second protocol stack instance that performs the upper-layer protocol processing is determined using the target socket, and hence, a technical problem that protocol processing cannot be performed on a data packet because a protocol stack instance specified by an application (APP) conflicts with a protocol stack instance specified by a network adapter is resolved.
SYSTEMS AND METHODS FOR UTILIZING CLIENT SIDE AUTHENTICATION TO SELECT SERVICES AVAILABLE AT A GIVEN PORT NUMBER
Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In embodiments, the functionality of such a host computer is enhanced by having it condition client access to services available at a particular port number based on client authentication and/or authorization. A host computer can change the service(s) available at a given port number on a client by client basis, enabling access to service(s) for trusted clients unavailable to untrusted clients. Preferably, client trust is based on client authentication via a certificate and a valid, signed transport layer security (TLS) handshake (or similar mechanism in other protocol contexts). In some embodiments, an authorization step can be added following authentication. The systems and methods disclosed herein find wide uses in bundling services on ports, as well as protecting access to services from untrusted and/or malicious clients, among others.