Patent classifications
H04L47/115
Device and method for delivering acknowledgment in network transport protocols
A first network device is configured to: transmit data packets and poll messages to a second network device; and receive, in response to each poll message, at least one status message from the second network device. The at least one status message indicates which of the data packets sent before that poll message have been correctly received at the second network device and/or have been lost. The first network device is configured to adapt a rate of transmitting the poll messages based on a set of parameters. Further, a second network device is configured to: receive data packets from a first network device; and transmit at least one unsolicited status message to the first network device, in case of certain conditions.
Method and apparatus for correcting a packet delay variation
A method and system of correcting a packet delay variation, PDV, of express traffic comprising high-priority express packets interspersed at a transmitter (2) by a preemption mechanism with a best-effort traffic comprising low-priority best-effort packets, wherein the method comprises the steps of: calculating (S1) at the transmitter (2) a preemption delay value, PRDV, which indicates a preemption delay, PD, introduced by the preemption mechanism; writing (S2) the calculated preemption delay value, PRDV, into a delay header field of a header of a high-priority express packet transmitted by said transmitter (2) via a signal line (4) to a receiver (3); extracting (S3) the preemption delay value, PRDV, from the delay header field of the header of the high-priority express packet received by the receiver (3) via the signal line (4) from the transmitter (2); calculating (S4) at the receiver (3) a variation compensation delay, VCD, value by subtracting the extracted preemption delay value, PRDV, from a predetermined worst-case preemption delay value, PRDV.sub.worst; and applying (S5) at the receiver an additional delay to the high-priority express packet according to the calculated variation compensation delay, VCD, value to compensate the preemption delay, PD, introduced by the preemption mechanism at the transmitter (2).
METHOD FOR TRANSFERRING INFORMATION ACROSS A DATA CENTER NETWORK
Packets in a data communications network are encapsulated by an encapsulation module on a sending computer and decapsulated on the receiver computer, the trans-mission of data packets being controlled by credit sent by the receiving computer. When overloaded, network switches trim the payload from packets; trimmed packets inform the receiving computer of the demands of the sending computer.
Signalling congestion status
There is described an apparatus for a base station in a radio access network. The apparatus is configured to detect a change in a radio network congestion status associated with a cell or cell sector of the base station that is being used to serve a mobile device, the change being a change to a given one of a plurality of possible radio congestion levels. The apparatus starts a packet modification process to modify one or more packets in each of one or more uplink data flows from the mobile device to a core network of the radio access network, the one or more packets in each of the one or more uplink data flows being modified by the packet modification process to signal, to a server in the core network, the change in congestion status to the given one of the plurality of possible radio congestion levels.
CLOUD SCALE MULTI-TENANCY FOR RDMA OVER CONVERGED ETHERNET (RoCE)
Techniques and apparatus for data networking are described. In one example, a method includes receiving a first Layer-2 Remote Direct Memory Access (RDMA) packet which includes a virtual local area network (VLAN) tag and a quality-of-service (QoS) data field; converting the first Layer-2 RDMA packet to a first Layer-3 encapsulated packet; and forwarding the first Layer-3 encapsulated packet to a switch fabric. In this method, the converting includes adding at least one header to the first Layer-2 RDMA packet, where the at least one header includes: a virtual network identifier that is based on information from the VLAN tag, and a QoS value that is based on information from the QoS data field.
Technologies for congestion control for IP-routable RDMA over converged ethernet
Technologies for remote direct memory access (RDMA) congestion control include a requester device and a responder device in communication over an Ethernet network. The requester device sends routable RDMA packets to the responder device over the Ethernet network. The packets may be RDMA over Converged Ethernet version 2 (RoCEv2) packets. The responder device determines whether any of the received packets have been marked by the network with a congestion encountered codepoint. If so, the responder device sends an acknowledgment packet with an express congestion notification bit set in the RDMA base transport header. The requester device updates a congestion window as a function of a number of congested packets acknowledged and a total number of packets acknowledged. Those operations may be performed by a network controller of each of the requester device and the responder device. Other embodiments are described and claimed.
APPARATUS AND PROCESS FOR DETECTING NETWORK SECURITY ATTACKS ON IOT DEVICES
Some embodiments include a network attack detection process, including, for each of a plurality of IoT devices of a communications network: receiving corresponding network traffic data representing network traffic characteristics of a plurality of network traffic flows of the device; processing the network traffic data to generate a plurality of corresponding features for each of the network traffic flows; and applying a corresponding set of one-class flow classifiers to the generated features to classify network traffic flows of the device and assess whether the network traffic characteristics of the network traffic flows are indicative of the device being under attack or having been compromised; wherein the flow classifiers are trained with training data representing normal network traffic behaviour of the device in an uncompromised state.
Packet sending method and apparatus, and storage device
A packet sending method is applied to a data transmission system and comprising: receiving, by a network interface card of a second device, a first packet that is from a first QP of a first device and that is forwarded by using a switch; obtaining, by the network interface card of the second device, an instant rate of the first QP and a maximum sending rate of the first QP; determining, by the network interface card of the second device, an adjustment rate of the first QP based on the instant rate of the first QP and the maximum sending rate of the first QP; sending, by the network interface card of the second device, a congestion notification packet to the first device, where the congestion notification packet carries the adjustment rate of the first QP.
NOF-based read control method, apparatus, and system
A NOF-based read control method, apparatus, and system belong to the field of networked storage. The method includes: receiving, by a NOF engine by using a communication link, a read request sent by a host; sending at least one read command to an NVMe hard disk based on the read request; and when congestion occurs on the communication link, generating a congestion flag corresponding to the communication link, and sending the congestion flag to the NVMe hard disk, where the congestion flag is used to instruct the NVMe hard disk to suspend processing of the read command corresponding to the communication link.
Method for Advertising Bit Error and Related Devices
A method for advertising a bit error includes that an intermediate node in a first tunnel detects that a bit error rate of a packet sent through the first tunnel exceeds a threshold; and the intermediate node sends a first packet to an egress node in the first tunnel through the first tunnel, where the first packet indicates that a bit error has occurred in the first tunnel, the first packet further instructs the egress node to send a second packet to an ingress node in the first tunnel, and the second packet indicates that the bit error has occurred in the first tunnel. The foregoing method can be used to transfer bit error information, so as to implement associated protection switching of services.