H04L47/2475

DYNAMIC TRAFFIC HANDLING FOR LOW LATENCY TRAFFIC IN A LAYER 2 MODEM
20220239599 · 2022-07-28 ·

A layer 2 (L2) modem provides traffic handling for low latency (LL) traffic. A filter is selected from an application traffic filter list. The filter determines LL traffic that is received and uses a DSC messaging process is used add a classifier for directing the LL traffic to the LL SF. If LL traffic associated with an LL traffic filter of the classifier begins to buildup in a queue, the LL traffic filter is removed from the classifier. This information is provided to a LL controller server that refines the application traffic filter list used to create the classifier. When LL traffic has not been received for a predetermined time, the classifier is removed. Once LL traffic is again detected by the L2 modem filters, a classifier is again added.

Flow Tagging for Service Policy Implementation

A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications.

Data Flow Classification Method and Packet Forwarding Device
20210409334 · 2021-12-30 ·

A data flow classification method includes obtaining, by a packet forwarding device, a plurality of data flows, extracting, by the packet forwarding device, address information and time information of each of the data flows, selecting, by the packet forwarding device, a data flow set that is generated when a first client device accesses a plurality of services, determining, by the packet forwarding device, a service set that includes a first service and a second service and that is accessed by the first client device based on the address information of the data flows, determining, by the packet forwarding device, a correlation between services in the service set based on time information of each data flow in the data flow set, and determining, by the packet forwarding device, that the first service and the second service implement a first application.

Bandwidth-control policers in a network adapter
20220231953 · 2022-07-21 ·

A network adapter includes a network interface, a host interface and processing circuitry. The network interface is configured to connect to a communication network. The host interface is configured to communicate with a host processor running multiple application programs. The processing circuitry includes one or more bandwidth-control policers, and is configured to receive from the communication network a packet destined to a given application program among the application programs running on the host processor, to associate a bandwidth-control policer with the packet, selected from among the bandwidth-control policers, and to apply the selected bandwidth-control policer to the packet to produce a policer result.

Methods and apparatus for classification of flow metadata with user space communication stacks

Methods and apparatus for efficient data transfer within a user space network stack. Unlike prior art monolithic networking stacks, the exemplary networking stack architecture described hereinafter includes various components that span multiple domains (both in-kernel, and non-kernel). For example, unlike traditional “socket” based communication, disclosed embodiments can transfer data directly between the kernel and user space domains. Direct transfer reduces the per-byte and per-packet costs relative to socket based communication. A user space networking stack is disclosed that enables extensible, cross-platform-capable, user space control of the networking protocol stack functionality. The user space networking stack facilitates tighter integration between the protocol layers (including TLS) and the application or daemon. Exemplary systems can support multiple networking protocol stack instances (including an in-kernel traditional network stack).

METHODS OF AND DEVICES FOR EXECUTING POLICY RULES ON A PER APPLICATION BASIS IN A TELECOMMUNICATIONS SYSTEM

Implementation of an application rule for an application to be accessed by a User Equipment, UE, in a user session in a Service Based Architecture, SBA, domain in a core network of a telecommunications system is disclosed. The SBA, among others, comprises a Policy Control Function, PCF (6), an Application Function, AF (5), and a Session Management Function, SMF (9). The method comprising the steps of receiving, by the PCF (6), an application rule comprising an AF Identifier, AF-ID, identifying the application rule, an Application Identifier, App-ID, identifying the application, and at least one service requirement for processing the application in the SBA domain. The PCF (6) instructing the SMF (9) to execute the at least one service requirement to all present and future user sessions pertaining to the respective application. Complementary methods of supporting the execution of the application rule and devices are also presented.

SIMULTANEOUS MULTI-PATH UPLINK TRANSMISSIONS TO A TELECOMMUNICATIONS NETWORK
20210400533 · 2021-12-23 ·

This disclosure describes systems, devices, and computer-implemented methods that facilitate the simultaneous transmission of subsets of user plane data to a telecommunications network via two or more uplink transmission paths. More specifically, a mobile device may detect user plane data within a buffer pool and in doing so, transmit a resource allocation request for the uplink transmission of the user plane data. In response, the mobile device may receive a set of control plane data associated with the uplink transmission via two or more uplink transmission paths. The mobile device may simultaneously transmit subsets of user plane data to the telecommunications network via multiple base station nodes, based at least in part on the control plane data.

SYSTEM AND METHOD FOR MANAGING VIDEO STREAMING CONGESTION
20210385168 · 2021-12-09 ·

A system and method for managing video streaming on a computer network based at least in part on a state of a video streaming traffic flow. The method includes: reviewing a traffic flow to determine whether the traffic flow is a video streaming traffic flow; if the traffic flow is a video streaming traffic flow, determine at least one video characteristic associated with the video streaming traffic flow; determining a state of the video streaming traffic flow; determining a priority of the video streaming traffic flow based on the characteristics and the state of the video streaming traffic flow; and allocating bandwidth to the video streaming traffic flow based on the priority; otherwise, if the traffic flow is not a video streaming traffic flow, allowing the traffic flow to continue with the traffic flow's current priority.

Communication device, communication method, communication computer program product, and communication system
11197190 · 2021-12-07 · ·

An electronic apparatus includes processing circuitry functioning as an acquisition part and a change part, and includes communication circuitry. The acquisition part acquires a control command regarding the volume of traffic per unit time. The change part changes a communication parameter to reduce the volume of traffic per unit time in accordance with the control command. The communication circuitry performs multi-hop wireless communications with the volume of traffic according to the changed communication parameter.

TRAFFIC CLASS-BASED ESP SEQUENCE
20210377176 · 2021-12-02 ·

An electronic device includes a sequence generator module that generates a sequence in a predetermined order based on a traffic class of data to be sent. The sequence is written into a portion of a sequence header of an outgoing data packet that corresponds to the traffic class. A traffic class identifier is also written into a header of the packet that indicates the traffic class of the data. The electronic device sends the packet to another electronic device over one of multiple channels of multiple priorities. The other electronic device determines the traffic class of the data based on the traffic class identifier, extracts the sequence from the portion of the sequence header that corresponds to the traffic class, and compares the sequence to a previously extracted sequence of a previously received packet of the same traffic class to determine whether a replay attack has occurred.