Patent classifications
H04L47/43
TELEMETRY DISTRIBUTION IN AN OVERLAY NETWORK
Systems including at least one processor and a memory storing instructions that, when executed by the at least one processor, result in the system collecting real-time telemetry measurements for packets received at each hop of an overlay network, and the system injecting the measurements into a variable-length trailers of the packets.
APPARATUS AND METHOD FOR DETECTING TARGET FILE BASED ON NETWORK PACKET ANALYSIS
An apparatus for detecting a target file includes an inverse indexing database unit configured to generate at least one file chunk by performing a chunking operation on a target file, and inversely index each of the at least one file chunk as a target file code, a network packet receiving unit configured to receive a network packet, a packet chunk processing unit configured to generate at least one packet chunk by performing a chunking operation on a network packet, a chunk query unit configured to generate a packet chunk query word for each of the at least one packet chunk and provide the packet chunk query word to the inverse indexing database unit to receive the detection target file code, and a file code determining unit configured to determine a most likely detection target file code in the network packet based on the received detection target file code.
PRESERVING QUALITY OF SERVICE (QoS) MARKINGS FOR DOWNSTREAM FLOWS
A network device receives an IPv4-in-IPv6 packet. An IPv6 header is removed. A first DSCP value in a TC field and a second DSCP value in a ToS field is stored in a database. The IPv4 packet is forwarded upstream and a return IPv4 packet is received. The returned IPv4 packet is encapsulated to form an IPv6 packet. The first DSCP value and the second DSCP value are retrieved from the database. Based on the at least one policy, the second DSCP value is inserted into an IPv4 ToS field and into an IPv6 TC field, the retrieved second DSCP value is inserted into the IPv4 ToS field and the first DSCP value is inserted into the IPv6 TC field, or the first DSCP value is inserted into the IPv6 TC field and into the IPv4 ToS field. The network device then forwards the IPv6 packet downstream.
PRESERVING QUALITY OF SERVICE (QoS) MARKINGS FOR DOWNSTREAM FLOWS
A network device receives an IPv4-in-IPv6 packet. An IPv6 header is removed. A first DSCP value in a TC field and a second DSCP value in a ToS field is stored in a database. The IPv4 packet is forwarded upstream and a return IPv4 packet is received. The returned IPv4 packet is encapsulated to form an IPv6 packet. The first DSCP value and the second DSCP value are retrieved from the database. Based on the at least one policy, the second DSCP value is inserted into an IPv4 ToS field and into an IPv6 TC field, the retrieved second DSCP value is inserted into the IPv4 ToS field and the first DSCP value is inserted into the IPv6 TC field, or the first DSCP value is inserted into the IPv6 TC field and into the IPv4 ToS field. The network device then forwards the IPv6 packet downstream.
Opportunistic content delivery using delta coding
Systems and methods are described for avoiding redundant data transfers using delta coding techniques when reliably and opportunistically communicating data to multiple user systems. According to embodiments, user systems track received block sequences for locally stored content blocks. An intermediate server intercepts content requests between user systems and target hosts, and deterministically chucks and fingerprints content data received in response to those requests. A fingerprint of a received content block is communicated to the requesting user system, and the user system determines based on the fingerprint whether the corresponding content block matches a content block that is already locally stored. If so, the user system returns a set of fingerprints representing a sequence of next content blocks that were previously stored after the matching content block. The intermediate server can then send only those content data blocks that are not already locally stored at the user system according to the returned set of fingerprints.
Opportunistic content delivery using delta coding
Systems and methods are described for avoiding redundant data transfers using delta coding techniques when reliably and opportunistically communicating data to multiple user systems. According to embodiments, user systems track received block sequences for locally stored content blocks. An intermediate server intercepts content requests between user systems and target hosts, and deterministically chucks and fingerprints content data received in response to those requests. A fingerprint of a received content block is communicated to the requesting user system, and the user system determines based on the fingerprint whether the corresponding content block matches a content block that is already locally stored. If so, the user system returns a set of fingerprints representing a sequence of next content blocks that were previously stored after the matching content block. The intermediate server can then send only those content data blocks that are not already locally stored at the user system according to the returned set of fingerprints.
GROUPING DATA PACKETS AT A MODEM
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a device may receive, at a modem of the device, a plurality of data packets associated with one or more connections. The device may group, at the modem of the device, data packets, of the plurality of data packets, associated with a connection, of the one or more connections, into a container based at least in part on one or more characteristics associated with the modem or the data packets. The device may transmit, from the modem to a processor of the device, the container of grouped data packets. Numerous other aspects are provided.
CLOCK SKEW DETERMINATION IN A NETWORK
Network devices that (a) test that GPS-clock enabled network devices have synchronized clocks, (b) identify non-GPS-clock enabled network devices with symmetric latencies as likely to be synchronized to GPS-clock enabled neighbor devices, (c) determine clock skews of remaining network devices not identified in (a) or (b) against the network devices identified in (a) and (b), and re-evaluate latencies of the GPS-clock enabled network devices, the non-GPS-clock enabled network devices, and the remaining devices based on the results of (a)-(c).
Packet Forwarding Method, Device, and System
Embodiments of this application provide a packet forwarding method. In the method, a first network device generates a first packet, where the first packet includes a segment list corresponding to a forwarding path of the first packet, the segment list includes a plurality of sequentially arranged compressed segment identifiers, a length of each of the plurality of compressed segment identifiers is less than 128 bits, the plurality of compressed segment identifiers include a first-type compressed segment identifier and a second-type compressed segment identifier, a length of the first-type compressed segment identifier is a first length, a length of the second-type compressed segment identifier is a second length, and the first length is less than the second length. The first network device sends the first packet based on the segment list.
Packet Forwarding Method, Device, and System
Embodiments of this application provide a packet forwarding method. In the method, a first network device generates a first packet, where the first packet includes a segment list corresponding to a forwarding path of the first packet, the segment list includes a plurality of sequentially arranged compressed segment identifiers, a length of each of the plurality of compressed segment identifiers is less than 128 bits, the plurality of compressed segment identifiers include a first-type compressed segment identifier and a second-type compressed segment identifier, a length of the first-type compressed segment identifier is a first length, a length of the second-type compressed segment identifier is a second length, and the first length is less than the second length. The first network device sends the first packet based on the segment list.