Patent classifications
H04L47/286
Prepopulation of Caches
A system, process, and computer-readable medium for updating an application cache using a stream listening service is described. A stream listening service may monitor one or more data streams for content relating to a user. The stream listening service may forward the content along with time-to-live values to an application cache. A user may use an application to obtain information regarding the user’s account, where the application obtains information from a data store and/or cached information from the application cache. The stream listening service, by forwarding current account information, obtained from listening to one or more streams, to the application cache, reduces traffic at the data store by providing current information from the data stream to the application cache.
Method and device for downloading file
A method for downloading a file for use in a first mobile terminal, includes: determining at least one second mobile terminal, connected with the first mobile terminal, as a receiving mobile terminal; sending a request for splitting and downloading a file for a server to split the file into a plurality of subfiles and send at least one of the plurality of subfiles to the receiving mobile terminal; after the receiving mobile terminal completes receiving of the subfile, acquiring the subfile from the receiving mobile terminal; and after all of the plurality of subfiles are acquired, combining the plurality of subfiles into the file and saving the file.
Beacon interval with boundary time points (BTPS) to improve latency for time sensitive traffic (TST) in extremely high throughout (EHT) WLANS
Embodiments of a beacon interval with boundary time points (BTPs) to improve latency for time sensitive traffic (TST) in Extremely High Throughout (EHT) WLANS are disclosed herein. In some embodiments, a non-access point (AP) station (STA) is configured to decode a beacon frame received from an AP STA. The beacon frame may indicate one or more BTPs within a beacon interval (BI). The non-AP STA may obtain a transmission opportunity (TXOP) for a transmission to the AP STA. The TXOP may be bounded by the one or more BTPs. The non-AP STA may encode a PPDU for transmission to the AP STA during the TXOP.
Performing path-oriented systems management
A method is disclosed for transmitting system management requests to computer systems along a network path using a network control protocol, such as RSVP. For example, an originating node may send a single system management request along a path to a destination node using a network control protocol. Each computer system along the network path may analyze the network control protocol message to determine whether the message contains a system management request. If a system management request is found in the message, the computer system may perform the system management function identified in the request, and respond to it.
Detection of latency, packet drops, and network hops through a tunnel by tracing hops therein
Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented. Systems and methods include receiving a request, from a client, for a trace of the tunnel; causing the trace inside the tunnel; obtaining results of the trace inside the tunnel; and sending the results of the trace inside the tunnel to the client so that the client aggregates these details with details from one or more additional legs to provide an overall view of a service path between the client and a destination.
Content delivery network video content invalidation through adaptive bitrate manifest manipulation
A method for invalidating content segments of a bitstream. The method comprises a step of delivering a manifest file from an origin server to a content delivery network. The manifest file may have a time-to-live value and may be redelivered based on the time-to-live value. The method comprises a step of delivering one or more content segments from the origin server to the content delivery network. The manifest file may contain pointers to the content segments. The method comprises a step of modifying the manifest file at the origin server to include invalidation information based on an input signal. The method comprises a step of invalidating the content segments throughout the content delivery network based on the invalidation information.
QOS POLICY PROVISIONING ON RESOURCE CONSTRAINED NETWORK DEVICES
Embodiments herein describe techniques for prioritizing applications based on application usage data. The space in the TCAM in many network devices is limited. That is, there may be more applications (and corresponding QoS settings) than there is space in the TCAM. In the embodiments herein, a netflow collector monitors the traffic flows in the network devices. A application usage tracker can identify which applications generate traffic in which network devices. That is, the application usage tracker can identify, based on the information provided by the netflow collector, the application usage of each network device. The central management tool can prune the applications that are not used by the network device and generate QoS settings only for applications that are used by the network device.
SECURITY MECHANISMS FOR PREVENTING RETRY OR REPLAY ATTACKS
Embodiments include apparatuses, methods, and systems for managing security of a communication network. A message, formatted based on a stateless communication protocol for a communication network, may be received from a first computing device and by a second computing device. The second computing device generates a fingerprint of the message based on at least a portion of a header of the message or a portion of a body of the message. In addition, the second computing device detects whether the generated fingerprint of the message has a duplicated fingerprint already stored in the storage device, where the message is a retried message or replayed message of a message having the duplicated fingerprint. In embodiments, the fingerprint may be generated using a hash function based on the message.
PLAYBACK SYNCHRONIZATION AMONG ADAPTIVE BITRATE STREAMING CLIENTS
In one embodiment, a method provides a manifest for a media program to a client. The manifest includes a set of bitrate representation links that correspond to a set of bitrates. A pointer is maintained to at least a portion of a current segment that is currently being presented in the media program. A request is received using a bitrate representation link in the set of bitrate representation links. The method then selects at least the portion of the current segment using the pointer for the bitrate that corresponds to the bitrate representation and sends the at least the portion of the current segment to the client.
METHOD AND APPARATUS FOR NODE TO DETERMINE TIME TO LIVE OF PATH
A method for determining time to live (TTL) of a path of a node including receiving a routing control packet, which includes a first link quality indicating a link quality of a path from the neighbor node to a source node transmitting the routing control packet, from a neighbor node of the node, acquiring a third link quality indicating a link quality of a path from the node to the source node according to a second link quality indicating a link quality of a path from the node to the neighbor node and the first link quality, and determining the TTL of the path from the node to the source node according to the third link quality may be provided. Accordingly, the TTL of the path can be determined more accurately according to a link quality of the path, thereby contributing to ensuring performance and stability of a routing algorithm.