H04L43/0811

Data processing method and apparatus, and computer

A method includes extracting packet information of a data packet to be transmitted through a Transmission Control Protocol (TCP) connection. If the packet information does not match information in a first data flow table, a first compliance detection is performed on the data packet. A state machine of the TCP connection is obtained if the first compliance detection is successful. The method also includes recording the packet information in the first data flow table, recording a connection status of the TCP connection in a first connection tracking table, and sending the data packet to a receiving end of the TCP connection. If the packet information matches the information in the first data flow table, a second compliance detection is performed on the data packet and, if the second compliance detection fails, the connection status of the TCP connection is adjusted and the data packet is discarded.

Determining path information in a computing network

In one implementation, a non-transitory machine-readable storage medium may store instructions that upon execution cause a processor to: determine, by a network device, path information for a plurality of paths in a computing fabric, the path information identifying alternative paths to access namespaces; determine, by the network device, a first portion of the path information that is associated with a first host; and provide, by the network device the first portion of the path information to the first host.

Determining path information in a computing network

In one implementation, a non-transitory machine-readable storage medium may store instructions that upon execution cause a processor to: determine, by a network device, path information for a plurality of paths in a computing fabric, the path information identifying alternative paths to access namespaces; determine, by the network device, a first portion of the path information that is associated with a first host; and provide, by the network device the first portion of the path information to the first host.

Synchronization of logical network state between global and local managers

Some embodiments provide a method for a global manager that manages a logical network configuration for multiple datacenters that each have a local manager for managing the logical network configuration within the datacenter. Based on detecting that a connection to a particular local manager of a particular datacenter has been restored after a period of unavailability, the method identifies a portion of the logical network configuration that is relevant to the particular datacenter. In a series of transactions, the method transfers the identified portion of the logical network configuration to the particular local manager. During the series of transactions, the method identifies modifications to the identified portion of the logical network configuration to be included in the series of transactions. Upon completion of the series of transactions, the method transfers a notification to the particular local manager indicating completion of the series of transactions.

SECURELY MANAGING NETWORK CONNECTIONS
20230055052 · 2023-02-23 ·

The disclosure relates generally to methods, systems, and apparatuses for managing network connections. An example method includes receiving one or more messages from a plurality of computing devices connected through a network, the one or more messages indicating actual connections among the plurality of computing devices. The example method further includes comparing, by one or more processors, the actual connections to a list of expected connections indicated by a connections master file that comprises connection information for the plurality of computing devices. The method further includes, responsive to detecting one or more differences between the list of expected connections and the actual connections, providing a notification indicating the one or more differences to a log file or a notification area of a user interface.

SECURELY MANAGING NETWORK CONNECTIONS
20230055052 · 2023-02-23 ·

The disclosure relates generally to methods, systems, and apparatuses for managing network connections. An example method includes receiving one or more messages from a plurality of computing devices connected through a network, the one or more messages indicating actual connections among the plurality of computing devices. The example method further includes comparing, by one or more processors, the actual connections to a list of expected connections indicated by a connections master file that comprises connection information for the plurality of computing devices. The method further includes, responsive to detecting one or more differences between the list of expected connections and the actual connections, providing a notification indicating the one or more differences to a log file or a notification area of a user interface.

MANAGEMENT APPARATUS, METHOD FOR ALLOCATING IDENTIFICATION INFORMATION OF ONBOARD APPARATUS, ONBOARD SYSTEM, AND DATA STRUCTURE
20230058027 · 2023-02-23 ·

Provided is a management apparatus that assigns identification information to an onboard apparatus connected to an onboard network including a reception unit configured to receive, from an onboard apparatus, a request frame with identification information assigned including a unique ID for the onboard apparatus; a generation unit configured to generate a response frame including identification information allocated to the request frame received by the reception unit; and a transmission unit configured to transmit the response frame generated by the generation unit to the onboard apparatus which is a transmission source of the request frame.

Quantum Key Distribution Network Security Survivability

Quantum key distribution network security survivability can be provided by receiving, at a software defined networking controller operating in a control layer of a network, a recommendation from a global analytics service operating in an application layer of the network, the recommendation for replacing a failed communication link in a quantum key distribution layer of the network, the failed communication link being detected by a quantum edge computing device operating in the quantum key distribution layer. The software defined networking controller can generate a command to cause a quantum key distribution resource to perform an action to mitigate impact from the failed communication link. The command can be sent to the quantum key distribution resource and the quantum key distribution resource can perform the action to mitigate the impact from the failed communication link.

SYSTEM AND METHODS OF MOBILE AND PLUG-AND-PLAY CELL NETWORKS
20230056096 · 2023-02-23 ·

A mobile cell (mCell) for use in a wireless communication system is disclosed. The mCell may include a wireless network cell node attached to a mobile carrier. The mCell may have one or more processors operable to: assign physical cell identity (PCI) and root sequence index (RSI) for allowing the mCell to join the network in a plug-and-play manner and to maintain connectivity with the system while moving; provide wireless application access for user equipment (UE) and wireless data relay and xHaul for neighboring cells nodes while the mCell is moving; and communicatively couple with other cells and network elements of the system, thereby forming a mesh network for extending and enhancing wireless communication within the system.

Troubleshooting multi-layered networks using datapath analysis

In various embodiments, the techniques and supporting systems implement a recursive routing mechanism in hierarchical topological addressed environments to analyze and determine the presence of packet-forwarding errors within an IP network comprising a plurality of network-connected devices. This includes receiving, at a software defined network device, an indication of a potential packet-forwarding error between a first and second device of the plurality of network-connected devices and injecting, by the software defined network device, a test packet at an ingress to the first device. The test packet includes an initial ingress interface location identifying the first device, an alternate ingress interface location identifying the software defined network device and an egress interface location identifying the second device. A determination may then be made as to whether the test packet is received at the second device, thus indicating the existence or lack of routing errors.