Patent classifications
H04L47/22
DATA PACKET FORWARDING METHOD AND SYSTEM, NETWORK NODE, AND STORAGE MEDIUM
In embodiments of this application, the network node may receive a first data packet, where the first data packet carries first traffic feature data of a first data flow to which the first data packet belongs. The network node may determine a data forwarding policy based on the first traffic feature data. Because the data forwarding policy includes a policy used when the network node forwards a data packet included in the first data flow, the network node may forward the data packet based on the data forwarding policy. It may be learned that, in this solution, there is no need for a controller to determine the forwarding policy and the network node to execute the forwarding policy. Instead, the network node may learn of the traffic feature data of the transmitted data flow in real time, and determine and use the data forwarding policy in a timely manner.
DATA PACKET FORWARDING METHOD AND SYSTEM, NETWORK NODE, AND STORAGE MEDIUM
In embodiments of this application, the network node may receive a first data packet, where the first data packet carries first traffic feature data of a first data flow to which the first data packet belongs. The network node may determine a data forwarding policy based on the first traffic feature data. Because the data forwarding policy includes a policy used when the network node forwards a data packet included in the first data flow, the network node may forward the data packet based on the data forwarding policy. It may be learned that, in this solution, there is no need for a controller to determine the forwarding policy and the network node to execute the forwarding policy. Instead, the network node may learn of the traffic feature data of the transmitted data flow in real time, and determine and use the data forwarding policy in a timely manner.
RESISTANCE TO SIDE-CHANNEL ATTACKS ON 5G NETWORK SLICES
Resistance to vulnerabilities from timing-based side-channel attacks on 5G network slices that share underlying physical infrastructure and resources may be enhanced by selectively imposing time-based constraints on service provisioning and data handling to obscure data-driven time variations that occur during workload execution in a slice that can leak secret information. By preventing timing leakage from the 5G network slices, an attacker cannot observe execution latencies to thereby infer the constituency of workload characteristics. In addition, the attacker cannot create contention for shared resources on its own slice to observe an extent to which the shared resources are utilized by a targeted slice.
Bandwidth throttling
Bandwidth throttling in a browser isolation environment is disclosed. A request is received from a client browser executing on a client device to connect with a remote resource. The browser isolation system provides a surrogate browser to facilitate communications between the client browser and the remote resource. A throttle is applied to a portion of content delivered to the client browser in response to the received request.
Bandwidth throttling
Bandwidth throttling in a browser isolation environment is disclosed. A request is received from a client browser executing on a client device to connect with a remote resource. The browser isolation system provides a surrogate browser to facilitate communications between the client browser and the remote resource. A throttle is applied to a portion of content delivered to the client browser in response to the received request.
DISTRIBUTED NODE PROCESSING OF NETWORK TRAFFIC
A first network device may receive first traffic of a session that involves a service. The first network device may identify that the service is configured for distributed node processing. The first network device may identify a second network device that is configured for distributed node processing. The first network device may identify a state machine that is associated with the service. The first network device may determine, based on the state machine, a first function and a second function, wherein the first function is identified by a first label and the second function is identified by a second label. The first network device may process the first traffic based on the first function. The first network device may provide, to the second network device, the first traffic and the second label to permit the second network device to process second traffic in association with the second function.
DISTRIBUTED NODE PROCESSING OF NETWORK TRAFFIC
A first network device may receive first traffic of a session that involves a service. The first network device may identify that the service is configured for distributed node processing. The first network device may identify a second network device that is configured for distributed node processing. The first network device may identify a state machine that is associated with the service. The first network device may determine, based on the state machine, a first function and a second function, wherein the first function is identified by a first label and the second function is identified by a second label. The first network device may process the first traffic based on the first function. The first network device may provide, to the second network device, the first traffic and the second label to permit the second network device to process second traffic in association with the second function.
SYSTEM AND METHOD FOR MANAGING DISTRIBUTED SHAPING IN A COMPUTER NETWORK
A system and method for managing distributed shaping in a computer network. The system including: a plurality of logic nodes, each logic node including: a packet processor configured to determine metrics associated with traffic flows in the computer network; a control processor configured to determine a quality value based on the determined metrics and communicate with each of the plurality of logic nodes; and a shaper object configured to shape the network traffic. The method including: initializing each logic node of a plurality of logic nodes; determining metrics associated with traffic flows in the computer network; determining a quality value based on the determined metrics; communicating the metrics with each of the plurality of logic nodes; and shaping the network traffic flows based on the quality value.
SYSTEM AND METHOD FOR MANAGING DISTRIBUTED SHAPING IN A COMPUTER NETWORK
A system and method for managing distributed shaping in a computer network. The system including: a plurality of logic nodes, each logic node including: a packet processor configured to determine metrics associated with traffic flows in the computer network; a control processor configured to determine a quality value based on the determined metrics and communicate with each of the plurality of logic nodes; and a shaper object configured to shape the network traffic. The method including: initializing each logic node of a plurality of logic nodes; determining metrics associated with traffic flows in the computer network; determining a quality value based on the determined metrics; communicating the metrics with each of the plurality of logic nodes; and shaping the network traffic flows based on the quality value.
Communication apparatus, communication MElHOD, and storage medium
When a plurality of other communication apparatuses parallelly communicates with a first communication apparatus by using a frequency band assigned by the first communication apparatus to each of the plurality of other communication apparatuses including a second communication apparatus, a transmission rate when communicating with the second communication apparatus is set based on a communication time in communication with a third communication apparatus included in the plurality of other communication apparatuses.