Patent classifications
H04L47/19
Data communication apparatus for high-speed identification of adaptive bit rate, communication system, data communication method, and program
A data communication apparatus is provided that includes: a transmission-reception part configured to transmit and receive data between a client terminal and a server, an ABR determination part configured to determine whether or not a data transmission scheme from the server to the client terminal is based on an ABR (Adaptive Bit Rate) distribution scheme, and, a scheme determination part configured to determine the data transmission scheme upon transmitting a received data from the server to the client terminal according to a result by the ABR determination part, wherein the transmission-reception part is configured to transmit the received data from the server to the client by the data transmission scheme determined by the scheme determination part.
Real time network adaptive low latency transport stream muxing of audio/video streams for miracast
Systems and methods for multiplexing audio/video data and generating transport streams for WiFi network with reduced latency for real time playback at a remote device. A virtual presentation clock reference (PCR) representing a scheduled transmission time of a transport stream packet at a transport stream multiplexer is calculated based on the network transmission rate and generation of the data packets. The virtual PCR is compared with the corresponding system PCR to derive a time difference. Based on the time difference, the transport stream multiplexer is configured to adaptively drop packets or throttle packet generation so as to synchronize the playback of audio/video data on a sink device with the generation of interleaved audio/video packets.
Continuous calibration of network metrics
Techniques for oscillatory complementary network property calibration of a network connection can be implemented by measuring a first network property (e.g., latency or bandwidth output) as a function of bandwidth input and performing statistical analysis to determine a correlation. If a non-zero correlation coefficient is detected, a second network property complementary to the first network property can be measured to determine a first value of the second network property. Likewise, the second network property can be measured as a function of bandwidth input to determine a second correlation which, if positive, may indicate how to determine a second value of the first network property. The first value and the second value can be utilized to determine a third value of a third network property (e.g., network latency and network capacity utilized to determine bandwidth-delay product).
Specifying service chains
Some embodiments provide novel methods for performing services for machines operating in one or more datacenters. For instance, for a group of related guest machines (e.g., a group of tenant machines), some embodiments define two different forwarding planes: (1) a guest forwarding plane and (2) a service forwarding plane. The guest forwarding plane connects to the machines in the group and performs L2 and/or L3 forwarding for these machines. The service forwarding plane (1) connects to the service nodes that perform services on data messages sent to and from these machines, and (2) forwards these data messages to the service nodes. In some embodiments, the guest machines do not connect directly with the service forwarding plane. For instance, in some embodiments, each forwarding plane connects to a machine or service node through a port that receives data messages from, or supplies data messages to, the machine or service node. In such embodiments, the service forwarding plane does not have a port that directly receives data messages from, or supplies data messages to, any guest machine. Instead, in some such embodiments, data associated with a guest machine is routed to a port proxy module executing on the same host computer, and this other module has a service plane port. This port proxy module in some embodiments indirectly can connect more than one guest machine on the same host to the service plane (i.e., can serve as the port proxy module for more than one guest machine on the same host).
Specifying service chains
Some embodiments provide novel methods for performing services for machines operating in one or more datacenters. For instance, for a group of related guest machines (e.g., a group of tenant machines), some embodiments define two different forwarding planes: (1) a guest forwarding plane and (2) a service forwarding plane. The guest forwarding plane connects to the machines in the group and performs L2 and/or L3 forwarding for these machines. The service forwarding plane (1) connects to the service nodes that perform services on data messages sent to and from these machines, and (2) forwards these data messages to the service nodes. In some embodiments, the guest machines do not connect directly with the service forwarding plane. For instance, in some embodiments, each forwarding plane connects to a machine or service node through a port that receives data messages from, or supplies data messages to, the machine or service node. In such embodiments, the service forwarding plane does not have a port that directly receives data messages from, or supplies data messages to, any guest machine. Instead, in some such embodiments, data associated with a guest machine is routed to a port proxy module executing on the same host computer, and this other module has a service plane port. This port proxy module in some embodiments indirectly can connect more than one guest machine on the same host to the service plane (i.e., can serve as the port proxy module for more than one guest machine on the same host).
MODERATING APPLICATION COMMUNICATIONS ACCORDING TO NETWORK CONDITIONS
Systems, methods and computer-readable media are presented for moderating the network connectivity of an application according to network connectivity quality. A monitoring component and/or process receives information regarding network requests from the computing device, filters the requests according to an application, and for each of the filtered network requests generates a network request tuple from the network request and stores the information in a communication queue. A moderating component and/or process receives a network request of the application, evaluates the network connectivity quality for the application according to the information in the communication queue, and moderates the network request activity of the application commensurate with the network connectivity quality.
Flow Tagging for Service Policy Implementation
A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications.
Flow Tagging for Service Policy Implementation
A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications.
In-band management interface with user space datapath
A method of utilizing the same hardware network interface card (NIC) in a gateway of a datacenter to communicate datacenter tenant packet traffic and packet traffic for a set of applications that execute in the user space of the gateway and utilize a network stack in the kernel space of the gateway. The method sends and receives packets for the datacenter tenant packet traffic through a packet datapath in the user space. The method sends incoming packets from the NIC to the set of applications through the datapath in the user space, a user-kernel transport driver connecting the kernel network stack to the datapath in the user space, and the kernel network stack. The method receives outgoing packets at the NIC from the set of applications through the kernel network stack, the user-kernel transport driver, and the data path in the user space.
Mobile core dynamic tunnel end-point processing
The present technology is directed to a system and method for using cloud based processing to co-locate one or more tunnel end points, associated with mobile user generated traffic traversing a Core network, with the serving machine located on application provider network. The describe system/method involves early stage identification of traffic flow (i.e., at the Packet Data network Gateway device using Application Detection and Control function) and dynamically instantiating an end point for the aforementioned traffic flow at the server where the application request is being served. The traffic is then directly tunneled to the endpoint thus avoiding decapsulated mobile traffic from traversing across provider network.