Patent classifications
H04L47/286
Domain name access method and device
A domain name access method and a device are described. As described herein, a domain name server (DNS) server performs resolution on a domain name requested by the terminal device. The DNS server may then send an internet protocol (IP) address of an application server obtained through the resolution and use condition information to the terminal device. With this, communication efficiency of the terminal device can be improved, and waste of transmission resources in a communications system is also avoided.
First network node, second network node, and methods performed thereby for tracing a packet in a pipeline
Methods for tracing a packet in a pipeline comprising a set of tables, in an SDN using OpenFlow. The packet comprises a trace bit, and is provided with a TTL value. A first network node indicates to a second network node to have each flow table decrement the TTL value by 1, based upon the trace bit. The first network node initially sets the TTL to be 1, and then sends the packet to a first table in the second network node. The first network node receives the packet, from another table in the set, and for every remaining table, and one table at a time: a) increments the TTL value by 1, and b) repeats the sending, and the receiving, until a last table is reached or a criterion is met. The first network node then indicates a route followed by the packet.
Network message transmissions reduction systems and methods
Systems and methods for reducing the amount of messages transmitted in large-scale distributed mesh networks are disclosed. Network components include transceivers and memory storing instructions which, when executed by a processing unit, reduce transmissions made by the transceiver within the network. The instructions executed by processing unit could (1) create an expiration parameter to limit the number of times a signal is retransmitted, (2) form groups of network components from which one or a few of the group network components are designated to respond on behalf of the group, (3) keep advertising transmissions dormant by default until called upon, (4) employ a time delay parameter for a time interval in which no transmission may be made, and (5) include message IDs in control signals that are transmitted.
System and method to protect resource allocation in stateful connection managers
A computing system and related method protect a computer network connection manager's resources from attempted resource attacks by extracting SrcIP and TTL values from received data packet headers. Extracted SrcIP and TTL values are analyzed to determine the probability that a received data packet is malicious. If the probability exceeds a specified threshold, resources are denied, and the packet is dropped. If the specified threshold is not exceeded, resources are allocated to the received data packet. The SrcIP reputation score, TTL value frequency, SrcIP frequency, SrcIP geo-location, and resource occupancy may all be used in computing the probability of a malicious data packet. These factors may be weighted and summed to calculate the probability of a malicious data packet.
Determining a time-to-live budget for network traffic
A Time-To-Live budget can be determined for network packets and used to understand an impact of network expansion on dropped packets. Additionally, the TTL budget can be used to determine how network expansion impacts services provided in the data center. In one embodiment, agents executing on data center routers are used to transmit packet header data including a TTL budget to a collector server computer. The collector server computer can discern signal (production flows) from noise (traceroutes and probing traffic) to detect packets that are at risk of being dropped or have been dropped due to TTL expiration. Alerts can be generated for packet flows with dangerously low remaining TTL budget or no remaining budget, which are at high risk of expiring due to operational events resulting in traffic temporarily traversing slightly longer paths. A dashboard can be provided with historic TTL budget data and trends.
Method and system for node discovery and self-healing of blockchain networks
A method for automatic configuration of a communication network includes: generating a request message, the request message including a communication address associated; transmitting the generated request message as a broadcast message to a plurality of computing devices using a predefined user datagram protocol (UDP) port, the message being broadcast with a predetermined time to live; receiving agreement messages from computing devices transmitted by the respective computing device using the predefined UDP port, each agreement message including a communication address associated with the respective computing device and a specified transmission control protocol (TCP) port; identifying at least one of the one or more agreement messages for establishment of communication; and establishing a communication connection to the computing device associated with each identified agreement message using the specific TCP port.
Data management in an edge network
Generally discussed herein are systems, devices, and methods for data management in a reverse content data network (rCDN). A component of the rCDN may include a memory to hold content received from a first sensor device of a plurality of sensor devices of the rCDN and first attributes that describe properties of the content. The component may include processing circuitry to receive second content from a second sensor device of the plurality of sensor devices, the second content including a plurality of second attributes that describe properties of the second content, and forward, in response to a determination, based on the first and second attributes, that there is insufficient space to store the second content on the memory, the second content to a node of the rCDN that is fewer hops away from a backend cloud than the component.
Method for decoding secure socket layer for security of packet transmitted in preset operating system
Decoding includes sensing a packet related to SSL handshake for connecting a SSL between a client and a server after a TCP session has been established between the client and the server in an SSL decoding device. If the packet for an SSL handshake is transmitted in a preset operating system, an SSL between the client and the SSL decoding device and an SSL between the SSL decoding device and the server is established. A TCP session between a virtual client corresponding to the client and a virtual server corresponding to the server is also established. A packet transmitted/received between the virtual client and the virtual server is transmitted when the TCP session is established. If a first SSL packet transferred from the client to the SSL decoding device is received, the SSL packet is decoded and transmitted to the security device and to the server.
Systems and methods for detecting DNS communications through time-to-live analyses
A computerized method is disclosed that includes accessing domain name server (DNS) record data including a plurality of DNS records spanning a first time period, performing a time-to-live (TTL) analysis to determine a TTL run length distribution for the DNS record data, wherein the TTL analysis includes: generating a vector of the TTL values of each DNS record ordered sequentially in time, parsing the vector of the TTL values into segments, where a segment consists of one or more TTL values where a current TTL value is less than an immediately preceding TTL value, and determining the TTL run length distribution, determining whether DNS beaconing is present based on a result of the TTL analysis and in response to determining that DNS beaconing is present, generating an alert for a system administrator.
DEVICE AND METHOD FOR APPLICATION-REQUIREMENT AWARE MEDIUM ACCESS CONTROL
A device for medium access control in a node of a wireless communication network with time-shared medium includes a slot allocation module configured to allocate a timeslot for transmission from the node to a destination node over the time-shared medium; a validation module configured to validate a data packet before transmission to the destination node based on a latency requirement for the data packet, and an expected latency for the data packet based on the position in time of the timeslot, resulting in an approved data packet or a disapproved data packet; a scheduling module configured to schedule an approved data packet in the timeslot for transmission to the destination node.