H04L47/323

SYSTEMS AND METHODS FOR MANAGING TRANSMISSION CONTROL PROTOCOL (TCP) ACKNOWLEDGEMENTS

A client device in a wireless network accesses a queue comprising Transmission Control Protocol Acknowledgement (TCP ACK) packets. At least some packets include packet descriptors with a flow identifier indicating a corresponding TCP flow, and a TCP ACK Generation Count. The device inspects a packet descriptor of a first TCP ACK packet, and identifies a first flow identifier and a first TCP ACK Generation Count. The device accesses entries in a data structure that each includes a first field and a second field respectively storing a flow identifier and a TCP ACK Generation Count. The device determines that a condition is satisfied, comprising that an entry in the data structure includes a flow identifier and a TCP ACK Generation Count matching the first flow identifier and the first TCP ACK Generation Count, respectively. In response to the determination, the device marks the first TCP ACK packet to be dropped.

Method of Reducing Transmission Control Protocol Acknowledgement and Wireless Device Using The Same
20170366466 · 2017-12-21 ·

A method for a wireless device of a wireless system is disclosed. The method utilizes a byte-in-flight (BIF) value as an indicator to determine whether to drop the transmission control protocol acknowledgement (TCP ACK) packet according to the BIF value, where the BIF value is an amount of data of the wireless connection which is sent by the first device but not acknowledged yet when obtaining the TCP ACK packet. The wireless device establishes a wireless connection with a first device.

TRANSMISSION CONTROL PROTOCOL FLOW CONTROL METHOD AND DEVICE FOR PERFORMING THE METHOD

A transmission control protocol (TCP) flow control method is provided, which comprises: sending a data packet from a packet processor to a receiver and storing a copy of the data packet; receiving a current ACK packet with a current packet number; determining whether the current packet number is identical to a last packet number and whether a last substitute ACK packet generated by the input ACK filter exists; and performing steps respectively corresponding to different results of this determination to avoid TCP congestion control timely. A TCP flow control device performing the method is also disclosed.

Communication device, relay device, and communication system for controlling generation of a TCP acknowledgement (ACK)

A communication device includes, a controller that executes control to receive a data transmission packet from another communication device, create a reception confirmation packet indicating reception of the data transmission packet, and store the created reception confirmation packet in a transmission buffer, and a transmitter that transmits a part of reception confirmation packets stored in the transmission buffer to the other communication device but does not transmit reception confirmation packets other than the transmitted reception confirmation packet to the other communication device.

ADAPTING CONTROL PLANE POLICING PARAMETERS DYNAMICALLY

Aspects of the present disclosure are directed to dynamically adjusting control plane policing throughput of low (or lower) priority control plane traffic to permit higher throughput. The drop rate for low or lower priority control plane traffic can be determined to be above a threshold value. The processor utilization can be determined to be operating under normal utilization (or at a utilization within a threshold utilization value). The control plane policing for control plane traffic for the low or lower class of service can be increased (or decreased) to permit lower class of service control traffic to be transmitted using higher class of service resources without adjusting the priority levels for the lower class of service control traffic.

Management of channel state information reporting rate in a communication system

According to aspects of the disclosure, a method and system are provided for managing signaling in a wireless communication network. In some aspects, a base station serves a user equipment device (UE) over an air interface connection between the base station and the UE, and a bearer extends between the UE and a gateway. An example method may involve determining a quality of service (QoS) level of the bearer, and responsively selecting a channel state information (CSI) reporting rate based on the determined QoS level. Further, in some aspects, responsive to the selection of the CSI reporting rate, the method may involve causing the UE to periodically report CSI to the base station according to the selected CSI reporting rate. The method may be performed, in whole or in part, by the UE, the base station, and/or another entity in the wireless communication system.

SYSTEM AND METHOD FOR FACILITATING DATA-DRIVEN INTELLIGENT NETWORK WITH INGRESS PORT INJECTION LIMITS

Data-driven intelligent networking systems and methods are provided. The system can accommodate dynamic traffic while applying injection limits to different traffic classes at an ingress edge port. The system can maintain state information of individual packet flows, which can be set up or released dynamically based on injected data. Each flow can be provided with a flow-specific input queue upon arriving at a switch. Packets of a respective flow can be acknowledged after reaching the egress point of the network, and the acknowledgement packets can be sent back to the ingress point of the flow along the same data path. Furthermore, an edge switch can dynamically allocate the ingress port bandwidth among the traffic classes that are active at a given moment.

System and method for reducing bandwidth usage of a network

A method of reducing the bandwidth usage of a network comprises intercepting traffic between a TCP server and a TCP client using TCP protocols that use client acknowledgements; identifying client acknowledgements from the TCP protocols; identifying the sequence number of a last received client acknowledgements from the intercepted traffic; identifying the sequence number of a last sent client acknowledgement from the intercepted traffic; calculating an unacknowledged byte value based on the difference between the last received client acknowledgement sequence number and the last sent client acknowledgement sequence number; comparing the calculated unacknowledged byte value with a predetermined threshold value, to determine whether the calculated unacknowledged byte value is at least as great as the predetermined threshold value; and transmitting the identified client acknowledgements into the network when the compared unacknowledged byte value is at least as great as the predetermined threshold value.

Fine grain traffic shaping offload for a network interface card

A network interface card with traffic shaping capabilities and methods of network traffic shaping with a network interface card are provided. The network interface card and method can shape traffic originating from one or more applications executing on a host network device. The applications can execute in a virtual machine or containerized computing environment. The network interface card and method can perform or include several traffic shaping mechanisms including, for example and without limitation, a delayed completion mechanism, a time-indexed data structure, a packet builder, and a memory manager.

Method and system for storing packets for a bonded communication links

Method and system for storing packets received from a bonded communication links according to latency of the communication link that has the largest latency among all communication links of the bonded communication links. Embodiments of present inventions can be applied to bonded communication links, including wireless connection, Ethernet connection, Internet Protocol connection, asynchronous transfer mode, virtual private network, WiFi, high-speed downlink packet access, GPRS, LTE, and X.25. The present invention presents methods comprising the steps of estimating storage size of a queue, wherein the queue is for storage the one or more packets received from the bonded communication links. The storage size is based on one or more factors, including largest latency, bandwidth of each of the plurality of communication links, and allowed time duration of packet storage