Patent classifications
H04L47/11
Methods and systems for multi-level network capacity allocation
Disclosed herein are systems and methods for allocating network capacity over a communication channel of a network. The systems and methods determine a transmission profile for each of a plurality of service flow types. The systems and methods then iteratively perform the following steps for allocating network capacity: selecting, for each service flow type, the network capacity allocation parameters in each service flow type's transmission profile associated with a current network capacity allocation cycle; determining amounts of data to transmit for each of the plurality of service flow types based at least in part on the selected network capacity allocation parameters; and transmitting, over the communication channel, the determined amounts for each of the plurality of service flow types for the current network capacity allocation cycle.
Identifying a tethered device using TCP error transmissions
Various embodiments comprise systems, methods, mechanisms, and apparatus by which a network operator such as a wireline internet service provider (ISP) may determine that an endpoint device has one or more other wireless devices tethered to it, such as a mobile handset providing dual-Wi-Fi ad-hoc tethering (i.e., connected to a high-speed Wi-Fi network while simultaneously providing Wi-Fi connections to wireless devices tethered to the mobile handset), by monitoring Transmission Control Protocol (TCP)/IP traffic flow associated with endpoint devices (i.e., to or through endpoint devices), characterizing these traffic flows in accordance with one or more error indicative criteria to establish thereby a baseline profile of error indicative criteria that is indicative of a TCP/IP traffic flow associated with an endpoint device that is not associated with tethering (e.g., a rate or number of duplicate ACKs), wherein deviations from the baseline profile of error indicative criteria beyond a threshold are indicative of a TCP/IP traffic flow associated with an endpoint device that is associated with tethering.
Identifying a tethered device using TCP error transmissions
Various embodiments comprise systems, methods, mechanisms, and apparatus by which a network operator such as a wireline internet service provider (ISP) may determine that an endpoint device has one or more other wireless devices tethered to it, such as a mobile handset providing dual-Wi-Fi ad-hoc tethering (i.e., connected to a high-speed Wi-Fi network while simultaneously providing Wi-Fi connections to wireless devices tethered to the mobile handset), by monitoring Transmission Control Protocol (TCP)/IP traffic flow associated with endpoint devices (i.e., to or through endpoint devices), characterizing these traffic flows in accordance with one or more error indicative criteria to establish thereby a baseline profile of error indicative criteria that is indicative of a TCP/IP traffic flow associated with an endpoint device that is not associated with tethering (e.g., a rate or number of duplicate ACKs), wherein deviations from the baseline profile of error indicative criteria beyond a threshold are indicative of a TCP/IP traffic flow associated with an endpoint device that is associated with tethering.
CONTROL APPARATUS, COMMUNICATION SYSTEM, CONTROL METHOD AND PROGRAM
A control apparatus configured to control communication between locations includes a database configured to store, for each location, a key and an IP address of CPE in association with each other, a search section configured to receive a CPE address request message including a key of a communication destination from CPE of a certain location and search the database to acquire an IP address of CPE corresponding to the key of the communication destination, and a response section configured to transmit the IP address of the CPE acquired by the search section to the CPE that is a transmission source of the CPE address request message.
INFERRING QUALITY OF EXPERIENCE (QOE) BASED ON CHOICE OF QOE INFERENCE MODEL
In one example, a location of a potential bottleneck of network traffic in a network is identified. Based on the location of the potential bottleneck, a first QoE inference model is selected from a plurality of respective QoE inference models. The respective QoE inference models are each trained to infer a respective QoE of the network traffic based on one or more respective network traffic metrics generated by monitoring the network traffic at a respective location in the network. One or more first network traffic metrics of the one or more respective network traffic metrics are generated by monitoring the network traffic at a first respective location. The one or more first network traffic metrics are provided to the first QoE inference model to infer a first respective QoE.
Networked sleep mode management
Networked sleep mode management is provided by measuring network conditions for a first Access Point (AP) serving a plurality of Client Devices (CDs) configured to operate in one of a sleep mode and an active mode; in response to detecting, based on the measured network conditions, an amount of network usage devoted to transitioning members of the plurality of CDs from the sleep mode to the active mode satisfies a threshold: identifying a first subset of CDs from the plurality of CDs that are deprioritized for access to the sleep mode; receiving a sleep request from a given CD that is a member of the first subset of CDs; and denying the sleep request to force the given CD to maintain the active mode for at least a predefined amount of time.
Networked sleep mode management
Networked sleep mode management is provided by measuring network conditions for a first Access Point (AP) serving a plurality of Client Devices (CDs) configured to operate in one of a sleep mode and an active mode; in response to detecting, based on the measured network conditions, an amount of network usage devoted to transitioning members of the plurality of CDs from the sleep mode to the active mode satisfies a threshold: identifying a first subset of CDs from the plurality of CDs that are deprioritized for access to the sleep mode; receiving a sleep request from a given CD that is a member of the first subset of CDs; and denying the sleep request to force the given CD to maintain the active mode for at least a predefined amount of time.
High Bandwidth Content Addressable Memory (CAM) Based Hardware Architecture For Datacenter Networking
A communication protocol system is provided for reliable transport of packets. A content addressable memory hardware architecture including a reorder engine and a retransmission engine may be utilized for the reliable transport of the packets. The content addressable memory module includes a primary CAM that may be logically partitioned into a plurality of physical sub-CAMs. One or more processors are in communication with the content addressable memory module. The one or more processors receive a set of data packets. A lookup operation is performed by the one or more processors to access data entries stored in each of the sub-content addressable memories. An update operation is performed by the one or more processors at a selected sub-content addressable memory from the plurality of the sub-content addressable memories.
CARDINALITY-BASED TRAFFIC CONTROL
Devices, methods, and systems are provided. In one example, a method is described to include measuring a cardinality of actual data flows at a flow-processing resource, determining that the cardinality of the actual data flows triggers a congestion control action, and, in response to determining that the cardinality of the actual data flows triggers the congestion control action, implementing the congestion control action with respect to the flow-processing resource.
Routing method, related device, and system
The present disclosure related to routing methods. One example method includes configuring a first path and a second path in charge of load sharing for a data flow, and configuring a third path in charge of reroute protection. A first group entry is generated for instructing the forwarding device to use the first path and the second path as load-sharing paths and use the third path to perform reroute protection on the first path and the second path. A flow entry for instructing to perform an operation of going to the first group entry is generated.