H04L69/165

Hybrid HTTP and UDP content delivery
20220038558 · 2022-02-03 ·

A hybrid HTTP/UDP delivery protocol provides significant improvements for delivery of video and other content over a network, such as an overlay. The approach is especially useful to address problems (e.g., slow startup times, rebuffering, and low bitrates) for HTTP-based streaming. In general, the protocol has two phases: an HTTP phase, and a UDP phase. In the HTTP phase, the client sends an HTTP GET request to a server. The GET request contains a transport header informing the server that the client would like to use UDP-based transfer over the protocol. The server may refuse this mode and continue in ordinary HTTP mode, or the server may respond by sending an empty response with header information informing the client how to make the connection to enter the UDP phase. In the UDP phase, the client initiates a connection and receives the originally-requested content over UDP.

PERSONAL MONITORING USING A REMOTE TIMER

Method and apparatus for monitoring the status and location of personnel using a remote timer. In some embodiments, a method includes logging in, through a network accessible device, a geo position of a subject to initiate a monitored session associated with the subject. A countdown timer of a remote server is initiated to denote a monitored time interval, the remote server in communication with the network accessible device over a network. A notification is generated and transmitted across the network to a monitoring device responsive to a conclusion of the monitored time interval.

LOW-LATENCY FPGA FRAMEWORK BASED ON RELIABLE UDP AND TCP RE-ASSEMBLY MIDDLEWARE

A method and system of a low-latency FPGA framework based on reliable UDP and TCP re-assembly middleware is disclosed. The need for low-latency communication in digital systems has increased drastically. The disclosed FPGA framework enables low-latency communication as a hybrid framework that supports both UDP & TCP communication. As known in art, TCP provides error checking support hence making TCP more reliable as compared to UDP, while UDP is faster but not reliable. Hence the disclosed low-latency FPGA framework latency utilizes the advantage of both UDP and TCP by utilizing UDP for its speed, while switching to TCP in case of a missing sequence in UDP. Further, the disclosed system proposes a TCP re-assembly middleware architecture for processing TCP with a lower-latency, wherein the TCP re-assembly middleware is an independent middleware that is a modular and a plug-play independent middleware.

METHOD FOR MANAGING COMMUNICATION BETWEEN TERMINALS IN A COMMUNICATION NETWORK, AND DEVICES AND SYSTEM FOR IMPLEMENTING THE METHOD
20220272079 · 2022-08-25 ·

A method for communication in a network is disclosed, between a first and second terminal between which is established a first encrypted connection for transmitting data. The method comprises at the first terminal: storing, in association with the first connection, at least one second connection between the first terminal and the second terminal via an intermediate processing function intended to be applied between the first terminal and the second terminal to a part of the data referred to as eligible for the second connection, and a filter characterizing the data eligible for the second connection, the second connection being encrypted between the first terminal and the intermediate processing function, and sending, via the second connection, a message intended for the intermediate function and carrying data for the second terminal corresponding to the filter, the first message sent comprising information according to which the data are intended for the second terminal.

METHOD FOR MANAGING COMMUNICATION BETWEEN TERMINALS IN A COMMUNICATION NETWORK, AND DEVICES AND SYSTEM FOR IMPLEMENTING THE METHOD
20220272079 · 2022-08-25 ·

A method for communication in a network is disclosed, between a first and second terminal between which is established a first encrypted connection for transmitting data. The method comprises at the first terminal: storing, in association with the first connection, at least one second connection between the first terminal and the second terminal via an intermediate processing function intended to be applied between the first terminal and the second terminal to a part of the data referred to as eligible for the second connection, and a filter characterizing the data eligible for the second connection, the second connection being encrypted between the first terminal and the intermediate processing function, and sending, via the second connection, a message intended for the intermediate function and carrying data for the second terminal corresponding to the filter, the first message sent comprising information according to which the data are intended for the second terminal.

Concurrent process execution

Among other things, a node is enabled to participate, with other nodes, in forming and using transport layer features in a communication network, the transport layer features being extensible to support ten million or more simultaneous reliable conversations between or among applications running on respective participant nodes.

SYSTEMS AND METHODS FOR CONVERTING BETWEEN A LOSSY COMMUNICATION PROTOCOL AND A LOSSLESS COMMUNICATION PROTOCOL
20220239764 · 2022-07-28 ·

Disclosed herein are related to communication systems and methods for converting between lossy communication protocol packets and lossless communication protocol packets. In one aspect, the communication system includes a server, a set top box, and an intermediate node. In some embodiments, the intermediate node is configured to receive a lossy communication protocol packet from the server, convert the lossy communication protocol packet to a lossless communication protocol packet, and transmit the converted lossless communication protocol packet to the set top box.

Switching between network protocols for a data storage system
11212349 · 2021-12-28 · ·

In one embodiment, a method is provided. The method includes transmitting a first set of data from a data storage system to a computing device using a first network protocol. The method also includes analyzing network conditions of a network used by the computing device and the data storage system. The method further includes determining whether to use a second network protocol to transmit a second set of data to the computing device. The method further includes in response to determining that the second network protocol should be used to transmit the second set of data, transmitting the second set of data to the computing device using the second network protocol.

Communication protocols in integrated systems

A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces are presented via the touchscreen. The user interfaces include a security interface that provides control of functions of the security system and access to data collected by the security system, and a network interface that provides access to network devices. A camera at the premises is coupled to the touchscreen via a plurality of interfaces. A security server at a remote location is coupled to the touchscreen via a plurality of channels and a plurality of protocols. The channels include a short message service (SMS) channel, a remote control channel, and an asynchronous event channel. The security server comprises a client interface through which remote client devices exchange data with the touchscreen and the security system.

Multi-unicast discovery of devices on a network

Client and server devices identify each other over a LAN or similar network through a series of unicasts. Rather than broadcasting a service announcement or discovery request as a broadcast or multicast, for example, a device instead transmits a series of unicast messages using a finite set of recipient network addresses and port numbers. Responses to the unicast messages can be collected and tracked to thereby allow subsequent communications to occur via unicasts with only the recognized addresses, with a multicast to only the recognized addresses, and/or otherwise as desired. By allowing the clients and servers to communicate with a finite set of unicast messages, a “broadcast” type message can be sent on the network without a need for router configuration. Moreover, unicasts can be sent using different protocols (e.g., TCP) than the subsequent traffic (e.g., UDP), thereby making discovery of compatible devices on the network more reliable.