Patent classifications
H04L69/162
Packet switched service identification method and terminal
A packet switched (PS) service identification method and a terminal, where a weight of at least one socket corresponding to a PS service is determined, a key socket is determined from the at least one socket according to the weight of the at least one socket, and an identifier of the key socket is sent to a network side such that the network side formulates a policy and charging control (PCC) rule according to the 5-tuple. In this PS service identification process, because the terminal does not encrypt the PS service, the terminal can accurately identify the PS service.
System and Method for Improving Content Fetching by Selecting Tunnel Devices
A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.
Port mapping
Systems, apparatuses, and methods are described for auto-discovery of port-to-port connectivity through correlative analysis on performance metrics. Statistical data corresponding to each port of routers and transport devices may be collected. The collected data may be processed such that missing data may be patched and time frames may be aligned. Statistical analysis may be performed on the collected data. Such statistical analysis may comprise generating a waveform based on the data and determining, e.g., correlations in the data. If the analyzed data of one port matches analyzed data of another port, the two ports may be determined to be connected to one another. A match may be based on meeting various criteria and/or thresholds.
METHOD AND SYSTEM FOR NETWORK HANDOVER ON TRANSPORT LAYER
Disclosed herein is a method and network handover system for handling a data session in a user equipment (UE). The method comprises initiating a data session of at least one application from a plurality of applications with a first communication interface using a first socket of the UE having a first socket file descriptor (SOCKFD) for the data session, detecting a deterioration in a network connection of the first communication interface, identifying a second communication interface, establishing a second socket having a second SOCKFD associated with the second communication interface and migrating the data session from the first communication interface to the second communication interface by mapping the first SOCKFD corresponding to the first socket to the second SOCKFD corresponding to the second socket.
Socket peering
A socket service may be used to link a peer socket to another peer socket. The peer socket is for communicating data to and from a client device and the other peer socket is for communicating data to and from another client device. If a socket opens and the corresponding peer socket is not yet open then the socket waits for the corresponding peer socket to open. When a client device requests a socket to be opened, the client device requests a particular client-defined function mapping to be associated with the socket. When the socket is opened, the endpoint specified in the client-defined function mapping is invoked. An identifier associated with the client device is sent to the endpoint. If the endpoint returns a socket identifier for another socket, then the socket service links the peer socket to the other peer socket, linking the client device to another client device.
BLOCKCHAIN COMMUNICATION ARCHITECTURE
Multiple blockchains are created to interact/communicate with each other, each blockchain containing aggregated information from detailed transaction logs from existing transaction managers, the aggregation being performed agnostic of data source. The data aggregated on the blockchains is organized, like a database, into tables and records by the use of crawlers that exist on the top of blockchains. Event describers are tuned to focus on particular events, such as whether a record being built by the crawlers meets a set criteria. The event describers may collect data meeting the criteria and push information gained to a socket, creating a new spinoff blockchain. A completed audit trail of time-capsuled data can be created in an existing system without the need for prerequisite programming of version control.
Direct file send from storage to end client by transferring socket information to the storage
A method begins by sending, by a user computing device of a storage network, a read request regarding data to a host computing device of the storage network in accordance with a transport layer protocol, where the read request includes data retrieval information associated the data. The method continues with determining, by the host computing device, a storage entity of the storage network that is storing the data based on the data retrieval information. The method continues with sending, by the host computing device, socket information and data retrieval information to the storage entity. The method continues with sending, by the storage entity, the data directly to the user computing device in accordance with the socket information and using the session identifier.
SYSTEMS AND METHODS FOR CLIENT COLLABORATED MIGRATION OF LIVE TLS CONNECTION
Described is an improved approach to ensure high availability for established sessions (e.g., application layer sessions) over network connections that negotiates and renegotiates encryption keys (e.g., TLS/SSL) at clean boundaries to ensure in-transit data are properly handled during migration of an application (e.g., a reverse proxy server instance). Connected TCP sessions may be handed off to another application (e.g., from existing proxy server to new/upgraded proxy server) and after establishing a new TLS session with a new encryption key, data transfer may be resumed between a client and a server using the new/upgraded application in a client-server architecture.
TCP Packet Processing Method, Toe Component, and Network Device
A TOE component obtains a first storage address, where the first storage address is an address of a first storage block in a memory, the first storage block stores a target TCP packet, and the target TCP packet includes a packet header and a TCP payload. The TOE component obtains the packet header from the first storage block based on the first storage address. The TOE component performs TCP-related protocol processing based on the packet header, where the TCP payload is not read out of the first storage block by the TOE component when the TOE component performs TCP-related protocol processing based on the packet header.
PROVIDING MULTIPLE NAMESPACES
This disclosure describes techniques for providing multiple namespace support to application(s) in containers under Kubernetes without breaking containment boundaries or escalating privileges of the application(s). A namespace service executing on a physical server may communicate with contained processes executing on the physical server by utilizing a Unix Domain Socket (UDS) endpoint in the filesystem of each of the containers. the namespace service may execute on the physical server with escalated privileges, allowing the namespace service to create a socket in a namespace and provide access and rights to utilize the socket to process(es) in a separate namespace.