Patent classifications
H04L43/0894
LATENCY EVALUATION AND MANAGEMENT RESOLUTION
One or more computing devices, systems, and/or methods for latency evaluation and management resolution are provided. A fingerprint for traffic flow over a communication network from an application executing on a device to a multi-access edge (MEC) server instance hosted by a MEC platform may be identified. The fingerprint may be used to track the traffic flow between the application and the MEC server in order to measure round trip time latencies of the traffic flow. In response to a round trip time latency violating a latency management policy, segment latencies along segments of a communication travel path of the traffic flow from the device to the MEC platform may be measured. A management resolution function may be performed based upon one or more of the segment latencies exceeding a threshold.
Grade of service control closed loop
Systems and methods for managing network traffic receives, at a grade of service device, network traffic information for a plurality of network traffic channels from a network device separate from the grade of service device. The network traffic information is compared to a threshold to determine a behavior value for each network traffic channel. Each network traffic channel is mapped to a grade of service according to the behavior value.
Grade of service control closed loop
Systems and methods for managing network traffic receives, at a grade of service device, network traffic information for a plurality of network traffic channels from a network device separate from the grade of service device. The network traffic information is compared to a threshold to determine a behavior value for each network traffic channel. Each network traffic channel is mapped to a grade of service according to the behavior value.
Systems, apparatuses and methods for network packet management
Methods and systems are provided for latency-oriented router. An incoming packet is received on a first interface. The type of the incoming packet is determined. Upon the detection that the incoming packet belongs to latency-critical traffic, the incoming packet is duplicated into one or more copies. Subsequently, the duplicated copies are sent to a second interface in a delayed fashion where the duplicated copies are spread over a time period. The duplicated copies are received and processed at the second interface.
Systems, apparatuses and methods for network packet management
Methods and systems are provided for latency-oriented router. An incoming packet is received on a first interface. The type of the incoming packet is determined. Upon the detection that the incoming packet belongs to latency-critical traffic, the incoming packet is duplicated into one or more copies. Subsequently, the duplicated copies are sent to a second interface in a delayed fashion where the duplicated copies are spread over a time period. The duplicated copies are received and processed at the second interface.
Communication system and method for integrating a data distribution service into a time sensitive network
A method in a communication network includes determining a transmission schedule for a plurality of data sources. The transmission schedule is configured to meet communication requirements of both time-sensitive traffic and non-time-sensitive traffic of the plurality of data sources. The method may also include transmitting data according to the determined schedule by shaping the time-sensitive traffic and the non-time-sensitive traffic at the plurality of data sources according to the determined schedule and receiving a communication change command. The method may further include determining a new transmission schedule for the plurality of data sources, the new transmission schedule being configured to meet the communication requirements of both the time-sensitive traffic and the non-time-sensitive traffic in the changed communication network. The method may further include transmitting data according to the new transmission schedule.
Determining transmission path based on pre-stored quality information from client devices
A data transmission method according to an embodiment is performed by a computing device including one or more processors and a memory in which one or more programs to be executed by the one or more processors are stored. The data transmission method includes receiving, from connected client devices, peer-to-peer (P2P) network information of the client devices, extracting one or more of information on whether network access is successful and network quality information, which are matched with the P2P network information and pre-stored, and determining one of a first data transmission path and a second data transmission path as a data transmission path for the client devices based on one or more of the information on whether network access is successful and the network quality information.
Determining transmission path based on pre-stored quality information from client devices
A data transmission method according to an embodiment is performed by a computing device including one or more processors and a memory in which one or more programs to be executed by the one or more processors are stored. The data transmission method includes receiving, from connected client devices, peer-to-peer (P2P) network information of the client devices, extracting one or more of information on whether network access is successful and network quality information, which are matched with the P2P network information and pre-stored, and determining one of a first data transmission path and a second data transmission path as a data transmission path for the client devices based on one or more of the information on whether network access is successful and the network quality information.
Detection and mitigation DDoS attacks performed over QUIC communication protocol
A method and system for protecting against quick UDP Internet connection (QUIC) based denial-of-service (DDoS) attacks. The system comprises extracting traffic features from at least traffic directed to a protected entity, wherein the traffic features demonstrate behavior of QUIC user datagram protocol (UDP) traffic directed to the protected entity, wherein the extract traffic features include at least one rate-base feature and at least one rate-invariant feature, and wherein the at least traffic includes QUIC packets; computing at least one baseline for each of the at least one rate-base feature and the at least one rate-invariant feature; and analyzing real-time samples of traffic directed to the protected entity to detect a deviation from each of the at least one computed baseline, wherein the deviation is indicative of a detected QUIC DDoS attack; and causing execution of at least one mitigation action when an indication of the detected QUIC DDoS attack is determined.
Methods and apparatus for detecting internet connection problems
A method of determining a problem with data packet transmission speed over a first communication medium coupled between a plurality of content servers and an ISP communication device. The method comprises repeatedly measuring the data packet transmission speed over the first communication medium coupled between each of the plurality of content servers and the ISP communication device, and determining there is a problem with the data packet transmission speed over the first communication medium coupled between one of the plurality of content servers and the ISP communication device when the repeatedly measured data packet transmission speeds over the first communication medium coupled between the one of the plurality of content servers and the ISP communication device is substantially different from the repeatedly measured data packet transmission speeds over the first communication medium coupled between other of the plurality of content servers and the ISP communication device.