Patent classifications
H04L47/31
METHOD FOR PROCESSING A DATA PACKET IN A COMMUNICATION NETWORK, METHOD FOR PROCESSING A REQUEST TO CHANGE THE QUALITY OF SERVICE LEVEL OF A CONNECTION, METHOD FOR REQUESTING TO CHANGE THE QUALITY OF SERVICE LEVEL OF A CONNECTION, METHOD FOR MANAGING A QUALITY OF SERVICE, CORRESPONDING DEVICES, SYSTEM AND COMPUTER PROGRAMS
A method for processing a data packet exchanged between an item of client terminal equipment and an item of server equipment in a communication network, which the item of client equipment accesses via a first communication network, a first quality of service level being intended to be applied to the data packet. The method is implemented by an item of routing equipment of the first communication network and includes: detecting in the data packet at least one item of activation information of a second quality of service level to be applied to the data packet; obtaining a quality of service management rule according to the second quality of service level, associated with the item of activation information; applying the second quality of service level to the routing of the data packet according to the obtained rule, instead of the first quality of service level.
TOKEN BUCKET WITH ACTIVE QUEUE MANAGEMENT
Systems and methods are provided for a new type of quality of service (QoS) primitive at a network device that has better performance than traditional QoS primitives. The QoS primitive may comprise a token bucket with active queue management (TBAQM). Particularly, the TBAQM may receive a data packet that is processed by the token bucket; adjust tokens associated with the token bucket, where the tokens are added based on a configured rate and subtracted in association with processing the data packet; determine a number of tokens associated with the token bucket, comprising: when the token bucket has zero tokens, initiating a first action with the data packet, and when the token bucket has more than zero tokens, determining a marking probability based on the number of tokens and initiating a second action based on the marking probability.
DYNAMIC QUALITY OF SERVICE FOR OVER-THE-TOP CONTENT
A method, non-transitory computer readable medium and apparatus for changing a quality of service for data packets that are delivered over-the-top are disclosed. For example, the method includes a processor that identifies the data packets as video data packets that are delivered over-the-top in a communication network, changes the quality of service associated with the data packets from a best effort quality of service level to a higher priority quality of service level, monitors the data packets until no video data packet is identified in the data packets and changes the quality of service associated with the data packets back to the best effort quality of service level from the higher priority quality of service level.
Adaptive Networking Policy with User Defined Fields
The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.
Method and computing devices for enforcing packet order based on packet marking
Method and computing devices for enforcing packet order based on packet marking. Upon occurrence of a link failure, a first device reallocates traffic initially forwarded through the failed link to an alternative link and marks the reallocated traffic with a first flag. Upon recovery of the failed link, the reallocated traffic is forwarded again through the recovered link and marked with a second flag different from the first flag. A second device calculates a reference inter-packet time for received traffic marked with the first flag. For received traffic marked with the second flag, the second device calculates a current inter-packet time. The current inter-packet time is compared with the reference inter-packet time, to determine if the traffic marked with the second flag shall be forwarded immediately or if the forwarding shall be delayed.
Method and computing devices for enforcing packet order based on packet marking
Method and computing devices for enforcing packet order based on packet marking. Upon occurrence of a link failure, a first device reallocates traffic initially forwarded through the failed link to an alternative link and marks the reallocated traffic with a first flag. Upon recovery of the failed link, the reallocated traffic is forwarded again through the recovered link and marked with a second flag different from the first flag. A second device calculates a reference inter-packet time for received traffic marked with the first flag. For received traffic marked with the second flag, the second device calculates a current inter-packet time. The current inter-packet time is compared with the reference inter-packet time, to determine if the traffic marked with the second flag shall be forwarded immediately or if the forwarding shall be delayed.
Method for determining sending period in deterministic network and apparatus
A method for determining a sending period of a packet in a deterministic network and an apparatus are disclosed. The method includes: receiving a first packet; determining a first period, where the first period is a sending period of the first packet; determining timestamp information of the first packet based on the first period, where the timestamp information is used to indicate a time difference between a first time and a second time, the first time is a time at which the first packet starts to be sent in the first period, and the second time is a start time of the first period; encapsulating the timestamp information into the first packet to obtain a second packet; and sending the second packet.
Transparent application-layer/os deeper packet inspector
A computer-implemented method of deep packet inspection (DPI) in a network is provided. The method comprises collecting data packets comprising a number of traffic flows from a number of devices via a number of traffic taps and classifying each traffic flow according to data about network protocol layers of the packets comprising the traffic flow. Application layer metadata is extracted from the packets. Traffic flow classification data and the extracted metadata are ingested into a data cluster and normalized. The normalized classification data and extracted metadata is then correlated to other data sets.
Transparent application-layer/os deeper packet inspector
A computer-implemented method of deep packet inspection (DPI) in a network is provided. The method comprises collecting data packets comprising a number of traffic flows from a number of devices via a number of traffic taps and classifying each traffic flow according to data about network protocol layers of the packets comprising the traffic flow. Application layer metadata is extracted from the packets. Traffic flow classification data and the extracted metadata are ingested into a data cluster and normalized. The normalized classification data and extracted metadata is then correlated to other data sets.
SECURITY REPORTING VIA MESSAGE TAGGING
Techniques and screening messages based on tags in an automotive environment, such as, messages communicated via a communication bus, like the CAN bus. Messages can be tagged with either a binary or probabilistic tag indicating whether the message is fraudulent. ECUs coupled to the CAN bus can receive the messages and the message tags and can determine whether to fully consume the message based on the tag.