H04L69/162

REVIEW AND RETRY FOR MINIMUM SPEED PORT CHANNEL
20220321268 · 2022-10-06 ·

A review and retry mechanism ensures a port channel can be configured to provide and maintain a minimum data speed. A timer-based review sequence reviews the constituent interfaces of a port channel to determine if a minimum speed requirement is met. If the minimum speed cannot be fulfilled, the port-channel member interfaces are un-programmed and removed from the port-channel, rendering the port-channel functionally inactive, thereby preventing network traffic loss. A timer-based retry sequence attempts to program the constituent interfaces. The minimum speed requirement of the interfaces is checked in the next review cycle. If the minimum speed requirement is met, then the review and retry mechanism halts and the port channel continues to remain active; otherwise, the interfaces are un-programmed and the process repeats.

Systems and methods to pre-provision sockets for serverless functions
11645098 · 2023-05-09 · ·

Methods and systems may be associated with a cloud computing environment. A serverless function orchestrator may execute a socket activation for a VM to pre-provision a TCP socket (e.g., setting up virtual interfaces and creating socket structures) before the VM hosts any serverless function associated with the pre-provisioned TCP socket. After this socket activation, the orchestrator may receive a request for a first serverless function and, responsive to the received request, start the first serverless function on the VM using the pre-provisioned TCP socket. After the activation and prior to starting the first serverless function, the system may queue packets received in connection with the pre-provisioned TCP socket. In some embodiments, multiple TCP sockets, each associated with a VM, may activated before any serverless functions are hosted and the first serverless function is started on a VM selected based on information in a serverless function experience data store.

Network packet processing method and apparatus and network server

The application discloses a network packet processing method and a network server. The method discloses that a network apparatus receives a first TCP packet sent by a client, where the first TCP packet includes a first quintuple and then the network apparatus determines a first thread that processes the first TCP packet according to the first quintuple and processes the first TCP packet by using the first thread.

NON-HTTP LAYER 7 PROTOCOL APPLICATIONS RUNNING IN THE BROWSER
20230199055 · 2023-06-22 ·

A server receives from a browser executing on a client device an HTTP request. The server transmits a response to the HTTP request to the browser. The response includes code that when executed by the browser, executes a non-HTTP layer 7 protocol client that communicates with a non-HTTP layer 7 protocol service at an external network. The server receives, from the non-HTTP layer 7 protocol client executing in the browser, data related to the non-HTTP layer 7 protocol service. The server proxies the data related to the non-HTTP layer 7 protocol service over a layer 4 tunnel that is interfaced with the non-HTTP layer 7 protocol service. The server logs event data received from the non-HTTP layer 7 protocol client executing in the browser.

UMA/GAN keep-alive mechanism in wireless communication networks

A wireless communication terminal (100) includes a TCP connection keep-alive timer, and a controller configured to optimize keep-alive timer operation by reducing the frequency with which the terminal transmits keep-alive messages. In one implementation, the controller re-sets the keep-alive timer, before expiration thereof, upon sending or receiving a message at the terminal during a TCP connection, wherein the terminal transmits a TCP connection keep-alive message only upon expiration of the keep-alive timer. The terminal may transmit a register request message indicating whether the terminal supports optimized keep-alive timer operation.

Detecting encrypted tunneling traffic

Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server.

MEDICAL DEVICE COMMUNICATION METHOD

A medical device communication method that may be implemented within a variety of medical devices including but not limited to infusion pumps. The method may be implemented with a protocol stack for at least intra-device communication. Embodiments provide connection-oriented, connectionless-oriented, broadcast and multicast data exchange with priority handling of data, fragmentation, and reassembly of data, unique static and dynamic address assignment and hot swap capability for connected peripherals or subsystems.

Scalable brokerless messaging strategy with sidecar security container stack
11677726 · 2023-06-13 · ·

A scalable brokerless messaging network includes a service mesh implementing a plurality of service nodes in signal communication with one another to exchange a plurality of messages. A control plane is in signal communication with the plurality of service nodes and is configured to register an application service associated with a given service node included in the service mesh. The plurality of service nodes define a messaging middleware layer that establishes several point-to-point connections between each service in the network via transmission control protocol (TCP) sockets.

Unified network service that connects multiple disparate private networks and end user client devices operating on separate networks

A unified network service that connects multiple disparate private networks and end user client devices operating on separate networks is described. The multiple disparate private networks and end user client devices connect to a distributed cloud computing network that provides routing services, security services, and performance services, and that can be controlled consistently regardless of the connection type. The unified network service provides uniform access control at the L3 layer (e.g., at the IP layer) or at a higher layer using user identity information (e.g., a zero-trust model). The disparate private networks are run on top of the distributed cloud computing network. The virtual routing layer of the distributed cloud computing network allows customers of the service to have private resources visible only to client devices (e.g., user devices of the customer and/or server devices of the customer) of the organization while using address space that potentially overlaps with other customers of the distributed cloud computing network.

Mediated active call initiation in browsers

An efficient computer-implemented method that allows an owner of a website to initiate voice and/or video calls with clients that are visiting the website of the owner in a manner that is simple for the visitor and can use fewer network resources than in prior approaches. The visit of the client to the website causes creating a socket connection between the client and the server. The server executes an application program to maintain a list of connected clients, and various metadata about the clients, which is presented to the website owner in an interface display. The owner can select any particular client among all the clients in the list, to initiate a peer-to-peer connection with that particular client and begin a call with them. The process executes without the client explicitly requesting a call. Consequently, a visitor to a website, and a representative of the website, can establish an audiovisual call rapidly and efficiently, then immediately begin addressing questions, requests, or requirements of the visitor.