Patent classifications
H04L47/21
System and method for maximizing resource credits across shared infrastructure
A computer-implemented method of adjusting a resource credit configuration for cloud resources that includes collecting a resource credit inventory and attributing metadata related to resources from one or more cloud resources. An expected resource demand is determined. A plurality of resource credit configurations is determined that matches the determined expected resource demand. An improved resource credit benefit based on the resource credit inventory and on the plurality of credit configurations is determined that matches the determined expected resource demand. A modified attribute metadata based on the determined improved resource credit benefit is then determined.
SYSTEMS AND METHODS FOR ENHANCED AUTONEGOTIATION
An improved autonegotiation approach includes determining that a negotiated rate between a first network device and a second network device exceeds data transfer capacity over a network path downstream of the second network device. In response, a configuration message is generated and transmitted to the first network device. When received by the first network device, the configuration message causes the first network device to limit data transfer between the first network device and the second network device to no more than the downstream data transfer capacity.
TIME SYNCHRONIZATION SYSTEM, METHOD OF CONTROLLING TIME SYNCHRONIZATION SYSTEM, AND RADIATION IMAGING SYSTEM
A time synchronization system includes at least one time server and a plurality of time clients connected to each other via a network. The time client comprises: a communication unit configured to obtain time information of the time server by transmitting/receiving messages to/from the time server; and a time count control unit configured to synchronize time information of an internal timepiece with time information of the time server. The time count control unit controls transmission of the messages by adjusting transmission intervals of the messages to irregular intervals.
User traffic generation method and apparatus
A user traffic generation method includes receiving a user traffic generation instruction, performing, in response to the user traffic generation instruction and index information pre-stored in an on-chip static random access memory (SRAM) of a field programmable gate array, a prefetch operation and a cache operation on a user packet that is stored in a dynamic random access memory DRAM and indicated by the index information, and generating user traffic at a line rate of the user packet that is cached during the cache operation. The on-chip SRAM is configured to store index information of all user packets that need to be used. The DRAM is configured to store all the user packets.
SCHEDULING REQUESTS, STATUS REPORTS, AND LOGICAL CHANNEL PRIORITIZATION
Features, methods, and functions for beam failure recovery and scheduling requests are provided, including methods for triggering, canceling, and transmitting beam recovery requests. The scheduling request may be designed to accommodate new criteria for transmission on a grant-free uplink shared channel (UL-SCH) and for putting the schedule request on hold.
Stateless and reliable load balancing using segment routing and TCP timestamps
Stateless and reliable load balancing using segment routing and an available side-channel may be provided. First, a non-SYN packet associated with a connection may be received. The non-SYN packet may have first data contained in an available side-channel. Next an associated bucket may be retrieved based on a hash of second data in the non-SYN packet. The associated bucket may identify a plurality of servers. Then a one of the plurality of servers may be selected based on the first data contained in the available side-channel.
POSITION PARAMETERIZED RECURSIVE NETWORK ARCHITECTURE WITH TOPOLOGICAL ADDRESSING
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities.
Routing method, related device, and system
The application provides a routing method which includes configuring a first path and a second path in charge of load sharing for a data flow, and configuring a third path in charge of reroute protection. A first group entry is generated for instructing the forwarding device to use the first path and the second path as load-sharing paths and use the third path to perform reroute protection on the first path and the second path. A flow entry for instructing to perform an operation of going to the first group entry is generated.
Systems and methods for enhanced autonegotiation
An improved autonegotiation approach includes determining that a negotiated rate between a first network device and a second network device exceeds data transfer capacity over a network path downstream of the second network device. In response, a configuration message is generated and transmitted to the first network device. When received by the first network device, the configuration message causes the first network device to limit data transfer between the first network device and the second network device to no more than the downstream data transfer capacity.
Multiplexing and congestion control
Methods, systems and devices for network congestion control exploit the inherent burstiness of network traffic, using a wave-based characterization of network traffic and corresponding multiplexing methods and approaches.