Patent classifications
H04L47/32
Network traffic disruptions
Apparatus including a network switch which includes switching circuitry to switch packets, packet drop decision circuitry to identify a packet that is to be dropped, packet duplication circuitry to duplicate the packet that is to be dropped, producing a first packet and a second packet, and packet exporting circuitry to export the first packet to a memory external to the switch via direct memory access (DMA). Related apparatus and methods are also provided.
Dynamic security actions for network tunnels against spoofing
An example network device receives an encapsulated network packet via a network tunnel; extracts IPv6 header information from the encapsulated network packet; extracts IPv4 header information from the encapsulated network packet; determines that the encapsulated network packet is a spoofed network packet based on the IPv6 header information and the IPv4 header information; and in response to detecting the spoofed network packet, transmits a message to a Tunnel Entry Point (TEP) device, the message including data representing the IPv6 header information and IPv4 header information. A tunnel entry point (TEP) device may receive the message and use the message to detect spoofed IPv6 traffic, e.g., when an IPv6 header and an IPv4 header of an encapsulated packet matches the IPv6 header and the IPv4 header specified in the message. In this manner, the TEP device may block, rate limit, or redirect spoofed network traffic.
Dynamic security actions for network tunnels against spoofing
An example network device receives an encapsulated network packet via a network tunnel; extracts IPv6 header information from the encapsulated network packet; extracts IPv4 header information from the encapsulated network packet; determines that the encapsulated network packet is a spoofed network packet based on the IPv6 header information and the IPv4 header information; and in response to detecting the spoofed network packet, transmits a message to a Tunnel Entry Point (TEP) device, the message including data representing the IPv6 header information and IPv4 header information. A tunnel entry point (TEP) device may receive the message and use the message to detect spoofed IPv6 traffic, e.g., when an IPv6 header and an IPv4 header of an encapsulated packet matches the IPv6 header and the IPv4 header specified in the message. In this manner, the TEP device may block, rate limit, or redirect spoofed network traffic.
System, method, and computer program for intelligent muting mitigation
A method for dynamically adapting a maximum bitrate (MBR) configuration of an IP Multimedia Subsystem (IMS)/Rich Communication Services (RCS) application, includes receiving a signal from a client server for an IMS/RCS application, establishing a bearer channel for an Internet multimedia communication, the channel having an initial preconfigured MBR, determining a codec used to transmit the communication, determining the bitrate used by a codec, and modifying the MBR of the channel based on the bitrate of the codec.
System, method, and computer program for intelligent muting mitigation
A method for dynamically adapting a maximum bitrate (MBR) configuration of an IP Multimedia Subsystem (IMS)/Rich Communication Services (RCS) application, includes receiving a signal from a client server for an IMS/RCS application, establishing a bearer channel for an Internet multimedia communication, the channel having an initial preconfigured MBR, determining a codec used to transmit the communication, determining the bitrate used by a codec, and modifying the MBR of the channel based on the bitrate of the codec.
Packet loss processing method and network device
A packet loss processing method and a network device are provided. The method includes: A first node obtains a first forwarding label of a first packet, where the first packet is a discarded packet. The first node determines, based on the first forwarding label, that the first node does not have a LSP corresponding to the first forwarding label. The first node sends a first message to a second node, where the first message includes the first forwarding label, and the first message is used to indicate that the first node does not have the LSP corresponding to the first forwarding label. The second node may be, for example, a peer node of the first node. The first node sends the message to the peer node, to indicate that the first node does not have the LSP corresponding to the forwarding label.
Packet loss processing method and network device
A packet loss processing method and a network device are provided. The method includes: A first node obtains a first forwarding label of a first packet, where the first packet is a discarded packet. The first node determines, based on the first forwarding label, that the first node does not have a LSP corresponding to the first forwarding label. The first node sends a first message to a second node, where the first message includes the first forwarding label, and the first message is used to indicate that the first node does not have the LSP corresponding to the first forwarding label. The second node may be, for example, a peer node of the first node. The first node sends the message to the peer node, to indicate that the first node does not have the LSP corresponding to the forwarding label.
Reducing power consumption in an electronic device
An ingress packet processor in a device corresponds to a group of ports and receives network packets from ports in its port group. A traffic manager in the device manages buffers storing packet data for transmission to egress packet processors. An ingress arbiter is associated with a port group and connects the port group to an ingress packet processor coupled to the ingress arbiter. The ingress arbiter determines a traffic rate at which the associated ingress packet processor transmits packets to the traffic manager. The ingress arbiter controls an associated traffic shaper to generate a number of tokens that are assigned to the port group. Upon receiving packet data from a port in the group, the ingress arbiter determines, using information from the traffic shaper, whether a token is available. Conditioned on determining that a token is available, the ingress arbiter forwards the packet data to the ingress packet processor.
Reducing power consumption in an electronic device
An ingress packet processor in a device corresponds to a group of ports and receives network packets from ports in its port group. A traffic manager in the device manages buffers storing packet data for transmission to egress packet processors. An ingress arbiter is associated with a port group and connects the port group to an ingress packet processor coupled to the ingress arbiter. The ingress arbiter determines a traffic rate at which the associated ingress packet processor transmits packets to the traffic manager. The ingress arbiter controls an associated traffic shaper to generate a number of tokens that are assigned to the port group. Upon receiving packet data from a port in the group, the ingress arbiter determines, using information from the traffic shaper, whether a token is available. Conditioned on determining that a token is available, the ingress arbiter forwards the packet data to the ingress packet processor.
Systems, apparatuses and methods for cooperating routers
Methods and systems are provided for cooperating routers in communication networks. The cooperating routers conduct a handshake to exchange information with respect to “cooperation types” which they are capable of performing and/or are configured to perform. In an exemplary “emergency connection” cooperation type, one cooperating router may use the ISP connection of another cooperating router to send and receive packets. In an exemplary “bandwidth sharing” cooperation type, one cooperating router may make excess bandwidth available for use by other cooperating routers. In an exemplary “latency optimization” cooperation type, one cooperating router may use another cooperating router to transmit duplicates of packets or to implement suppression techniques.