Patent classifications
H04L49/9005
Method for setting capacity of buffer
The present invention is directed to method for setting capacity of a buffer, the method including an initializing step of initializing a plurality of sub-buffers forming a main buffer, a comparison data reception step of receiving a storage frequency and a remaining capacity from the plurality of sub-buffers and comparing the storage frequency with the remaining capacity, a data comparison step of determining whether a current storage frequency of the plurality of sub-buffers and a past storage frequency are equal, a set capacity calculation step of calculating an allocation capacity of the plurality of sub-buffers, and a capacity re-setting step of re-setting the capacity of the plurality of sub-buffers using the calculated allocation capacity.
SYSTEM AND METHOD FOR FACILITATING EFFICIENT PACKET FORWARDING IN A NETWORK INTERFACE CONTROLLER (NIC)
A network interface controller (NIC) capable of efficient packet forwarding is provided. The NIC can be equipped with a host interface, a packet generation logic block, and a forwarding logic block. During operation, the packet generation logic block can obtain, via the host interface, a message from the host device and for a remote device. The packet generation logic block may generate a plurality of packets for the remote device from the message. The forwarding logic block can then send a first subset of packets of the plurality of packets based on ordered delivery. If a first condition is met, the forwarding logic block can send a second subset of packets of the plurality of packets based on unordered delivery. Furthermore, if a second condition is met, the forwarding logic block can send a third subset of packets of the plurality of packets based on ordered delivery.
Method, device, and terminal for controlling jitter in network communication
Embodiments of the application can provide a method, a device, and a terminal for controlling a jitter in network communication, belonging to the technical field of communication. The method includes: generating trigger information, where the trigger information is for triggering switching of a jitter control strategy for the network communication, the jitter control strategy includes a first control strategy based on a first cached data amount and a second control strategy based on a second cached data amount, and the first cached data amount is smaller than the second cached data amount; switching the jitter control strategy to a target control strategy in response to the trigger information; and controlling the jitter in the network communication by using the target control strategy, where the target control strategy is the first control strategy or the second control strategy corresponding to the trigger information.
Method, device, and terminal for controlling jitter in network communication
Embodiments of the application can provide a method, a device, and a terminal for controlling a jitter in network communication, belonging to the technical field of communication. The method includes: generating trigger information, where the trigger information is for triggering switching of a jitter control strategy for the network communication, the jitter control strategy includes a first control strategy based on a first cached data amount and a second control strategy based on a second cached data amount, and the first cached data amount is smaller than the second cached data amount; switching the jitter control strategy to a target control strategy in response to the trigger information; and controlling the jitter in the network communication by using the target control strategy, where the target control strategy is the first control strategy or the second control strategy corresponding to the trigger information.
Proxy schemes for voice-over-LTE calls
A method includes, in a wireless data network, monitoring communication conditions at an intermediate location between a wireless communication terminal and a network element that provides voice-call services over the network to the wireless communication terminal. Upon detecting that the communication conditions are expected to cause the wireless communication terminal to send a notification to the network element, an early notification is sent to the network element on behalf of the terminal. Another method includes detecting a notification in which a terminal notifies a network element of degraded reception performance. A modification, which the network element is expected to perform in a transmission characteristic to the terminal in response to the notification, is predicted. In-flight communication traffic, which is en-route to the terminal and whose transmission characteristic is not yet modified in response to the notification, is intercepted. The predicted modification is applied to the in-flight communication traffic.
DATA REASSEMBLY METHOD AND APPARATUS
This application provides a data reassembly method and an apparatus, to reassemble packet fragments in combination with local reassembly and cloud reassembly, so as to obtain a reassembled packet. This improves reassembly efficiency, reduces a packet reassembly delay, and reduces power consumption of an OLT. The method includes: a first OLT receives a plurality of packet fragments of a first packet that are sent by an optical network unit ONU; and if the first OLT determines that an upload condition is met, the first OLT sends the plurality of packet fragments to a cloud reassembly device, so that after receiving the plurality of packet fragments, the cloud reassembly device reassembles the plurality of packet fragments to obtain a second packet.
DATA REASSEMBLY METHOD AND APPARATUS
This application provides a data reassembly method and an apparatus, to reassemble packet fragments in combination with local reassembly and cloud reassembly, so as to obtain a reassembled packet. This improves reassembly efficiency, reduces a packet reassembly delay, and reduces power consumption of an OLT. The method includes: a first OLT receives a plurality of packet fragments of a first packet that are sent by an optical network unit ONU; and if the first OLT determines that an upload condition is met, the first OLT sends the plurality of packet fragments to a cloud reassembly device, so that after receiving the plurality of packet fragments, the cloud reassembly device reassembles the plurality of packet fragments to obtain a second packet.
METHODS AND DEVICES FOR POLICING TRAFFIC FLOWS IN A NETWORK
Devices and methods for policing traffic flows in a network are described herein. For example, a network device can include a processing unit and a memory operably coupled to the processing unit. The network device can be configured to provide an input port and an output port, the input and output ports being configured to process a traffic flow received at the network device. The network device can also be configured to queue the traffic flow using a plurality of buffers associated with the output port, cyclically direct the traffic flow from the input port to each of the plurality of buffers according to a queuing schedule, and enforce a policer policy synchronized to the queuing schedule. The policer policy can ensure that the traffic flow does not exceed a predetermined bandwidth.
RESOURCE USAGE ANONYMIZATION
One embodiment of a method, executed by one or more processors, includes receiving a request from a client for a network resource, selecting a previously-serviced client as a proxy client, forwarding the request to the proxy client, receiving the network resource from the proxy client, and forwarding the network resource to the client. In another embodiment, the method includes receiving a request from a client for a network resource, selecting a proxy client from a dynamic pool of proxy clients that are each capable of requesting the network resource, and directing the request from the client to the proxy client. The selected proxy client may be the client whose request immediately preceded the current request. A computer system and computer program product corresponding to the method are also disclosed herein.
PACKET COLORING IN WIRELESS COMMUNICATION SYSTEMS
A buffer stores only packets in one or more high-priority traffic flows in a first portion. The size of the first portion is determined based on an estimated maximum volume of traffic in the at least one high-priority traffic flow. The buffer stores packets in either the one or more high-priority traffic flows or one or more low-priority traffic flows in a second portion. The buffer stores only packets in the one or more low-priority traffic flows in a third portion. A processor marks the packets in the first portion and the second portion with a high-priority color prior to transmission of the packets. The processor marks the packets in the third portion with a low-priority color prior to transmission of the packets.