Patent classifications
H04L47/2491
Bandwidth throttling in vulnerability scanning applications
Apparatus and methods are disclosed for implementing bandwidth throttling to regulate network traffic as can be used in, for example, vulnerability scanning and detection applications in a computer network environment. According to one embodiment, a method of routing network packets in a networked device having plural network interfaces combines applying traffic class and network interface throttling for marking network packets with a differentiated service code based on input received from a profiler application, throttling the bandwidth of network packets based on a threshold for a designated network interface for the packet, throttling the bandwidth of the bandwidth-throttled packets based on a threshold for its respective differentiated service code, and emitting network packets on each respective designated network interface.
A METHOD, APPARATUS AND SYSTEM FOR ENABLING COMMUNICATION USING MULTI-PROTOCOL GATEWAY AND VIRTUAL RESOURCE MANAGER
A method, apparatus and system for transferring data from an apparatus called multi-protocol gateway in a network seamlessly that operates using a particular protocol, to another device that is either in the same network or outside operating in a totally different protocol is described. Today, to accomplish this requires external units, one per technology. For example, for supporting both WiFi and WiMAX devices today, we would require a WiFi access point, a WiMAX base station and a router. We provide plug-ins that would handle multiple protocols within the same gateway, to cater to devices that operate in those protocols. The apparatus translates between various protocols in the back end making it inexpensive and portable. The unit is scalable, grows with technology, and acts as a gateway to a local network. The device can be configured to address Quality of Service, Priority between technologies and fault- tolerance through management layer.
Satellite network service sharing
Methods, systems, and devices are described for providing network access services to mobile users via mobile terminals over a satellite system. In embodiments, dynamic multiplexing of traffic from fixed terminals and mobile users on the same satellite beam can take advantage of statistical multiplexing of large numbers of users and on different usage patterns between fixed terminals and mobile users. In embodiments, quality-of-service (QoS) is controlled for mobile devices at a per-user level. Mobile users may be provisioned on the satellite system according to a set of traffic policies based on their service level agreement (SLA). System resources of the satellite may be allocated to mobile users based on the demand of each mobile user and the set of traffic polices associated with each mobile user, regardless of which mobile terminal is used to access the system.
Satellite network service sharing
Methods, systems, and devices are described for providing network access services to mobile users via mobile terminals over a satellite system. In embodiments, dynamic multiplexing of traffic from fixed terminals and mobile users on the same satellite beam can take advantage of statistical multiplexing of large numbers of users and on different usage patterns between fixed terminals and mobile users. In embodiments, quality-of-service (QoS) is controlled for mobile devices at a per-user level. Mobile users may be provisioned on the satellite system according to a set of traffic policies based on their service level agreement (SLA). System resources of the satellite may be allocated to mobile users based on the demand of each mobile user and the set of traffic polices associated with each mobile user, regardless of which mobile terminal is used to access the system.
CLOUD-BASED COMPUTER WITH RUNTIME-MAPPED SOFTWARE VERSIONS
A computer that dynamically maps traffic to different versions of software is described. During operation, the computer may receive first traffic from a first tenant and second traffic from a second tenant, where the first traffic and the second traffic are addressed to a common computing environment that supports multiple, different tenants. Then, the computer may identify the first tenant based at least in part on first information included in the first traffic, and may identify the second tenant based at least in part on second information included in the second traffic. Moreover, the computer may dynamically map the first traffic to a first version of software and the second traffic to a second version of the software, where the dynamic mapping occurs at runtime. Note that the computer may concurrently execute the first version of the software and the second version of the software.
CLOUD-BASED COMPUTER WITH RUNTIME-MAPPED SOFTWARE VERSIONS
A computer that dynamically maps traffic to different versions of software is described. During operation, the computer may receive first traffic from a first tenant and second traffic from a second tenant, where the first traffic and the second traffic are addressed to a common computing environment that supports multiple, different tenants. Then, the computer may identify the first tenant based at least in part on first information included in the first traffic, and may identify the second tenant based at least in part on second information included in the second traffic. Moreover, the computer may dynamically map the first traffic to a first version of software and the second traffic to a second version of the software, where the dynamic mapping occurs at runtime. Note that the computer may concurrently execute the first version of the software and the second version of the software.
Device for retrieving data from wireless devices based on mapping of read request priorities
Embodiments of the present invention include systems and methods for providing Quality of service to RFID. In one embodiment the present invention includes a method of providing quality of service in an RFID network comprising storing RFID priority information corresponding to the RFID network, wherein the RFID network comprises one or more tags and one or more readers mapping the RFID priority information into priority information corresponding to a second network.
Method for enabling control of data packet flows belonging to different access technologies
The present invention relates to embodiments of nodes and methods in a node in a data telecommunication network. The method and embodiments thereof enables control of data packet traffic belonging to different access technologies to be sent with the same Quality of Service class over an aggregated encrypted Internet Security tunnel, IPsec tunnel. The received data packets are encrypted and encapsulated as payload in an IP data packet to be sent over an aggregated encrypted IPsec tunnel, which header is marked with an access technology index comprising a code for the identified access technology of the one or more received data packets encrypted and encapsulated as payload in the IPsec tunnel and a hash identifier code enabling enhanced scheduling and routing.
Data transmission method and communications device
A data transmission method and a communications device, wherein the method includes: processing, by a transmit end device, a data flow, where the processing includes: adding a flow identifier indication to the data flow, where the flow identifier indication is used to indicate whether a flow identifier is included; and sending, by the transmit end device, the processed data flow. A flow identifier indication is added to a data flow, where the flow identifier indication is used to indicate whether a flow identifier is included; and the data flow is transmitted according to the flow identifier indication, so that processing on the data flow is completed.
AVOIDING JITTER IN A COMMUNICATION SYSTEM
Avoiding jitter in a communication network. A method for avoiding jitter includes receiving, an ingress point of the communication network, a packet, wherein the packet is received at the ingress point at a time within a particular time slot. The method also includes the ingress point creating a modified packet that includes the received packet and a slot identifier indicating the particular time slot in which the packet was received, the ingress point transmitting (s406) the modified packet towards an egress point of the communication network.