Patent classifications
H04L47/263
Technologies for monitoring networked computing devices using deadman triggers
Technologies for monitoring networked computing devices using deadman triggers includes a network interface controller (NIC) configured to collect a pin state of at least one deadman trigger pin associated with a deadman trigger and determine whether a triggering event associated with the deadman trigger has been detected as a result of the comparison. The NIC is further configured to generate, in response to a determination that the triggering event has been detected, a status packet that is usable to identify the detected triggering event associated with the deadman trigger. Additionally, the NIC is configured to issue a stop transmission command to each of a plurality of egress packet transmission queues of the NIC and insert the generated status packet into at least one of the plurality of egress packet transmission queues for transmission to a target computing device. Other embodiments are described herein.
Method and system for resource-aware dynamic bandwidth control
Resource-aware dynamic bandwidth control uses information about current network state and receiver performance to avoid, minimize and/or recover from the effects of network spikes and data processing spikes. Linear models may be used to estimate a time required to process data packets in a data processing queue, and are thus useful to determine whether a data processing spike is occurring. When a data processing spike occurs, an alarm may be sent from a client to a server notifying the server that the client must drop packets. In response, the server can encode and transmit an independent packet suitable for replacing the queued data packets which can then be dropped by the client and the independent packet present to the processor instead.
System and method for determining cell congestion level
A metric of cell congestion is determined using an average physical resource block rate that is expected to be allocated for a very active user equipment bearer that is a persistent average rate. The average physical resource block rate is mapped to congestion levels and this information is exported to an application function or a radio access network function in order to mitigate congestion. An average bearer throughput for the user equipment can be calculated based on the average physical resource block rate.
System and method for peak flow detection in a communication network
A method includes determining a delivery performance of a data flow being transmitted from a first network equipment to a second network equipment over a network; determining whether the network is congested based on the determined delivery performance of the data flow being transmitted to the second network equipment; and pacing delivery of the data flow to the second network equipment by reducing a rate at which the data flow is delivered to the second network equipment when the network is determined to be congested.
FACILITATING COMMUNICATION OF DATA PACKETS USING CREDIT-BASED FLOW CONTROL
Apparatuses and methods are described that provide for credit based flow control in a network in which a public buffer is supported at a receiver node, where a transmitter node can control the use of the public buffer. In particular, the transmitter node determines a buffer credit value (TCRi) for each virtual lane of the transmitter node. The buffer credit value (TCRi) is negative (e.g., less than 0) in an instance in which a respective virtual lane private buffer is fully used and thus reflects a loan of credits from the public buffer. In addition, the transmitter node knows the needed buffer size per virtual lane for transmitting a packet in advance based on the round trip time (RTT) and maximum transmission unit (MTU) for the packet and is precluded from consuming more space on the public buffer than required to meet RTT.
Methods and apparatus for throttling unattended applications at user devices
Aspects of the present disclosure provide methods, apparatus and computer program products for throttling unattended applications at user devices (e.g., in an effort to limit transmission resource consumption by a user equipment (UE)). According to an aspect, the UE may receive an indication to restrict (throttle down) flow for traffic that appears to be unattended by a user. The UE may determine if a particular application is subject to flow restriction; and restrict flow of uplink traffic generated by the application, if the application is subject to flow restriction. Numerous other aspects are provided.
Bandwidth throttling in vulnerability scanning applications
Apparatus and methods are disclosed for implementing bandwidth throttling to regulate network traffic as can be used in, for example, vulnerability scanning and detection applications in a computer network environment. According to one embodiment, a method of routing network packets in a networked device having plural network interfaces combines applying traffic class and network interface throttling for marking network packets with a differentiated service code based on input received from a profiler application, throttling the bandwidth of network packets based on a threshold for a designated network interface for the packet, throttling the bandwidth of the bandwidth-throttled packets based on a threshold for its respective differentiated service code, and emitting network packets on each respective designated network interface.
Network security system with enhanced traffic analysis based on feedback loop and low-risk domain identification
It is known in the art to route client traffic to a network security gateway using the domain name system, or DNS. More specifically, a local DNS resolver on a private network may apply security intelligence to client DNS lookup requests, based on the domains that clients are seeking to resolve. If a requested domain represents a known security threat, the client can be blocked or directed to the network security gateway instead of to the desired host. This routing of the client request to the network security gateway can be accomplished by giving the client the IP address of the network security gateway instead of the actual IP address corresponding to the domain name, in response to a given DNS name query from the client. Request routing can be accomplished using other techniques, such as IP layer routing, as well.
SYSTEM AND METHOD FOR FACILITATING EFFICIENT PACKET FORWARDING IN A NETWORK INTERFACE CONTROLLER (NIC)
A network interface controller (NIC) capable of efficient packet forwarding is provided. The NIC can be equipped with a host interface, a packet generation logic block, and a forwarding logic block. During operation, the packet generation logic block can obtain, via the host interface, a message from the host device and for a remote device. The packet generation logic block may generate a plurality of packets for the remote device from the message. The forwarding logic block can then send a first subset of packets of the plurality of packets based on ordered delivery. If a first condition is met, the forwarding logic block can send a second subset of packets of the plurality of packets based on unordered delivery. Furthermore, if a second condition is met, the forwarding logic block can send a third subset of packets of the plurality of packets based on ordered delivery.
Modifying feedback information to control a source device
A non-transitory computer readable medium includes instructions which, when executed by one or more processors cause performance of operations, including: receiving feedback information related to a receipt of packets by a receiving device, the packets being transmitted by a source device, modifying the feedback information to obtain modified information related to the receipt of the packets by the receiving device, and transmitting, to the source device, the modified information related to the receipt of the packets by the receiving device.