Patent classifications
H04L47/31
SECURITY REPORTING VIA MESSAGE TAGGING
Techniques and screening messages based on tags in an automotive environment, such as, messages communicated via a communication bus, like the CAN bus. Messages can be tagged with either a binary or probabilistic tag indicating whether the message is fraudulent. ECUs coupled to the CAN bus can receive the messages and the message tags and can determine whether to fully consume the message based on the tag.
Traffic Rate Limiting Method, Related Network Device, and Storage Medium
A traffic rate limiting method, a related network device, and a system are provided. A third network device is multi-homed to a first network device and a second network device. The first network device may determine a restricted interface bandwidth of the first network device based on a remaining interface bandwidth of the second network device and a configured bandwidth of a second interface. Subsequently, the first network device may limit a user traffic rate based on the restricted interface bandwidth. The first network device and the second network device are configured to perform load balancing on user traffic, and the restricted interface bandwidth is determined by the first network device based on the remaining interface bandwidth of the second network device, i.e., a bandwidth occupation status of the second network device. The first network device can limit the user traffic rate based on the restricted interface bandwidth.
Traffic Rate Limiting Method, Related Network Device, and Storage Medium
A traffic rate limiting method, a related network device, and a system are provided. A third network device is multi-homed to a first network device and a second network device. The first network device may determine a restricted interface bandwidth of the first network device based on a remaining interface bandwidth of the second network device and a configured bandwidth of a second interface. Subsequently, the first network device may limit a user traffic rate based on the restricted interface bandwidth. The first network device and the second network device are configured to perform load balancing on user traffic, and the restricted interface bandwidth is determined by the first network device based on the remaining interface bandwidth of the second network device, i.e., a bandwidth occupation status of the second network device. The first network device can limit the user traffic rate based on the restricted interface bandwidth.
NETWORK TRAFFIC LOAD BALANCING
In one embodiment, a load balancing method may comprise: assigning a plurality of packets of a flow to a plurality of segments according to a segmentation criterion, each segment including one or more packets of said plurality of packets, and at least one of the plurality of segments including more than one packet of the plurality of packets; tagging each packet of the plurality of packets with a segment sequence identifier to indicate to which segment the packet is assigned; and arranging the plurality of packets for transmission via an interconnect so that all packets belonging to a same segment will be transmitted via a same path.
NETWORK TRAFFIC LOAD BALANCING
In one embodiment, a load balancing method may comprise: assigning a plurality of packets of a flow to a plurality of segments according to a segmentation criterion, each segment including one or more packets of said plurality of packets, and at least one of the plurality of segments including more than one packet of the plurality of packets; tagging each packet of the plurality of packets with a segment sequence identifier to indicate to which segment the packet is assigned; and arranging the plurality of packets for transmission via an interconnect so that all packets belonging to a same segment will be transmitted via a same path.
Anomaly detection through header field entropy
An approach for detecting anomalous flows in a network using header field entropy. This can be useful in detecting anomalous or malicious traffic that may attempt to “hide” or inject itself into legitimate flows. A malicious endpoint might attempt to send a control message in underutilized header fields or might try to inject illegitimate data into a legitimate flow. These illegitimate flows will likely demonstrate header field entropy that is higher than legitimate flows. Detecting anomalous flows using header field entropy can help detect malicious endpoints.
Anomaly detection through header field entropy
An approach for detecting anomalous flows in a network using header field entropy. This can be useful in detecting anomalous or malicious traffic that may attempt to “hide” or inject itself into legitimate flows. A malicious endpoint might attempt to send a control message in underutilized header fields or might try to inject illegitimate data into a legitimate flow. These illegitimate flows will likely demonstrate header field entropy that is higher than legitimate flows. Detecting anomalous flows using header field entropy can help detect malicious endpoints.
Dual side bulk material tender
A bulk material tender includes a mobile frame, a hopper, and a discharge system. The mobile frame has a left side and a right side. The hopper is disposed on the mobile frame. The discharge system is configured to discharge particulate matter from the hopper. The discharge system includes a discharge auger, a deploying actuator, and a positioning actuator. The discharge auger presents a proximal end and a distal end. The deploying actuator is configured to selectively emplace the discharge auger in a stowed orientation and a deployed orientation, wherein the distal end is adjacent to the hopper in the stowed orientation. The positioning actuator configured to selectively emplace the discharge auger along the left side and the right side of the mobile frame. Once emplaced, the discharge auger discharges particulate material from the hopper toward a target location.
Mobile terminal, control node, packet transfer node, and method for controlling congestion
In one embodiment, a mobile terminaI (10) includes a wireless communication network (101) capable of connecting to a mobile communication network (1), a packet processing unit (102), and a control unit (103). The packet processlng unit (102) transmits or receives a user packet through the wireless communication unit (101). The control unit (103) transmits, to the mobile communication network (1), a message indicating whether or not to permit setting a congestion indication marking to an Explicit Congestion Notification (ECN)-enabled user packet in the mobile communication network (1).
Network traffic load balancing
In one embodiment, a load balancing method may comprise: assigning a plurality of packets of a flow to a plurality of segments according to a segmentation criterion, each segment including one or more packets of said plurality of packets, and at least one of the plurality of segments including more than one packet of the plurality of packets; tagging each packet of the plurality of packets with a segment sequence identifier to indicate to which segment the packet is assigned; and arranging the plurality of packets for transmission via an interconnect so that all packets belonging to a same segment will be transmitted via a same path.