Patent classifications
H04L47/40
METHOD AND APPARATUS FOR SETTING INITIAL WINDOW VALUE IN WIRELESS COMMUNICATION SYSTEM
The present disclosure relates to a 5G or pre-5G communication system to be provided for supporting a data transmission rate higher than that of a 4G communication system such as an LTE. The present invention relates to a method by which a proxy sets an initial window value in a wireless communication system, the method comprising: splitting a transmission control protocol (TCP) connection between a terminal and a server; extracting the information related to the terminal from the data received from the terminal; and setting the initial window value on the basis of a round trip time (RTT) value and a throughput value for each of terminal groups grouped on the basis of the information related to the terminal.
Communication control method, user terminal, and communication apparatus
A communication method comprises a communication apparatus managing a serving cell of a user terminal and broadcasting to the user terminal system information for Device to Device (D2D) proximity service using a frequency of the serving cell. The user terminal performing a discovery procedure to discover another user terminal on a basis of the system information, which includes first information that indicates an available frequency for the discovery procedure different from the frequency of the serving cell and related to a center frequency of a frequency band of the available frequency, second information that indicates at least one parameter for calculating transmission power for the discovery procedure, third information that indicates a Public Land Mobile Network (PLMN) identifier for the available frequency, and fourth information that indicates number of times of re-transmissions of a discovery signal to be re-transmitted by one user terminal in the discovery procedure.
Congestion control in a communications network
A method of congestion control (500) in a communications network is provided. The method comprises detecting congestion (501, 502) for data packets being transmitted along a data path between a sender and a receiver of the communications network, wherein the receiver accesses the communications network via a Radio Access Network (RAN), interrupting transmission (503, 505, 506) of data packets to the receiver during an idle period, and transmitting an indication (504) pertaining to the interruption of transmission to the RAN. Thereby, the RAN may use opportunities for switching to a lower radio state directly, or shortly after, the onset of the idle period, rather than triggered by an inactivity timer. In that way, utilization of air interface resources is improved and power consumption on the UE side is reduced. Further, a corresponding computer program, a corresponding computer program product, and a network node for congestion control in a communications network, are provided.
Transmission control protocol proxy in long term evolution radio access network
A system, a method, a device, and a computer program product for transmission of data packets between a user device and a server. A transmission control protocol proxy component for establishing a communication link between the user device and the server in accordance with a transmission control protocol for transmission of a data packet between the user device and the server is provided. The data packet is transmitted utilizing the transmission control protocol.
TCP SPLICE OPTIMIZATIONS TO SUPPORT SECURE, HIGH THROUGHPUT, NETWORK CONNECTIONS
A communication device and method of operating the same. The method may include initiating a first connection between a client device and a proxy server application and a second connection between the proxy server application and the remote server while advertising a proxy-window-scale-value, and splicing the TCP connections below a transport layer. The method also includes left shifting a window size of a client-sourced-packet to obtain an originally intended client-window size, right shifting the originally intended client-window size by the proxy-window-scale-value, and providing the client-sourced-packet to the server with the proxy-window scaled value. In addition, the method includes receiving a server-sourced-packet from the remote server, left shifting a window size of the server-sourced-packet by the server-window-scale value to obtain an originally intended server-window size, right shifting the originally intended server-window size by the proxy-window-scale-value, and then providing the server-sourced-packet to the client with the proxy-window scaled value.
PACKET CLASSIFICATION USING MULTI-DIMENSIONAL SPLITTING
A computer-implemented method classifies a packet received from a network. The method comprises receiving the packet having header information and a rule-set that indicates a plurality of actions to perform on the packet. A geometric representation of the rule-set is constructed having a plurality of dimensions and rule boundaries. At least one rule boundary and dimension of the geometric representation is split to form a search structure having a plurality of nodes. Each node in the plurality of nodes is constrained to a predetermined memory threshold. The search structure is searched using the header information to obtain a rule in the rule-set that indicates an action to take on the packet.
System and method for reducing bandwidth usage of a network
A method of reducing the bandwidth usage of a network comprises intercepting traffic between a TCP server and a TCP client using TCP protocols that use client acknowledgements; identifying client acknowledgements from the TCP protocols; identifying the sequence number of a last received client acknowledgements from the intercepted traffic; identifying the sequence number of a last sent client acknowledgement from the intercepted traffic; calculating an unacknowledged byte value based on the difference between the last received client acknowledgement sequence number and the last sent client acknowledgement sequence number; comparing the calculated unacknowledged byte value with a predetermined threshold value, to determine whether the calculated unacknowledged byte value is at least as great as the predetermined threshold value; and transmitting the identified client acknowledgements into the network when the compared unacknowledged byte value is at least as great as the predetermined threshold value.
CLASSIFYING A MESSAGE BASED ON LIKELIHOOD OF SPOOFING
A technique for determining a boundary IP address is disclosed. The technique includes processing a header to extract candidate IP address, locating a gateway IP address, and selecting the boundary IP address based on the location of the gateway IP address.
Supporting communications for data storage
Various example embodiments for supporting communications for data storage are presented herein. Various example embodiments for supporting communications for data storage may be configured to support communications between a host and a storage element for supporting storage of data in the storage element by the host. Various example embodiments for supporting communications between a host and a storage element may be configured to support communications between a host and a controller of the storage element. Various example embodiments for supporting communications between a host and a controller of a storage element may be configured to support, using a single transport layer connection, communications of multiple queue pairs supporting communications between the host and the controller of the storage element, where each of the queue pairs includes a queue on the host and a queue on the controller of the storage element.
Communication device and communication system
When a proxy device is used between a transmission terminal and a reception terminal, receives final data from the transmission terminal, and fails immediately thereafter, a situation is avoided where transmission is completed in the transmission terminal, but reception is not completed in the reception terminal. There is provided a means for not returning ACK when a data packet is received in a state in which there is no data which waits for ACK and transmission of which is in progress, and there is no data which waits for arrangement and reception of which is in progress in the proxy device, for returning ACK for data received one step before when a data packet is received in a state in which there is data which waits for ACK and transmission of which is in progress, or there is data which waits for arrangement and reception of which is in progress.