Patent classifications
H04L69/321
Data Communication Using Constrained Application Protocol Over Local Area Network
A system for data communication between electronic devices comprises a first electronic device that is a resource-constrained device; and a second electronic device that exchanges data with the first electronic device. One of the first electronic device and the second electronic device generates a message in a data unit frame complying with a protocol stack that includes a Constrained Application Protocol (CoAP) message on a data link layer in the absence of a User Datagram Protocol (UDP) layer.
In-band management interface with user space datapath
A method of utilizing the same hardware network interface card (NIC) in a gateway of a datacenter to communicate datacenter tenant packet traffic and packet traffic for a set of applications that execute in the user space of the gateway and utilize a network stack in the kernel space of the gateway. The method sends and receives packets for the datacenter tenant packet traffic through a packet datapath in the user space. The method sends incoming packets from the NIC to the set of applications through the datapath in the user space, a user-kernel transport driver connecting the kernel network stack to the datapath in the user space, and the kernel network stack. The method receives outgoing packets at the NIC from the set of applications through the kernel network stack, the user-kernel transport driver, and the data path in the user space.
In-band management interface with user space datapath
A method of utilizing the same hardware network interface card (NIC) in a gateway of a datacenter to communicate datacenter tenant packet traffic and packet traffic for a set of applications that execute in the user space of the gateway and utilize a network stack in the kernel space of the gateway. The method sends and receives packets for the datacenter tenant packet traffic through a packet datapath in the user space. The method sends incoming packets from the NIC to the set of applications through the datapath in the user space, a user-kernel transport driver connecting the kernel network stack to the datapath in the user space, and the kernel network stack. The method receives outgoing packets at the NIC from the set of applications through the kernel network stack, the user-kernel transport driver, and the data path in the user space.
Online application layer processing of network layer timestamps
Computer-readable media, systems and methods may propagate lower layer data, in headers that would otherwise be deleted, to upper layers in a network protocol stack that uses a multi-layer communication model. For example, high precision network-level timestamps that indicate a time that binary data is received at a network switch may be propagated upward for online application-level processing. Network switches may ordinarily insert network-level timestamps in frame headers that are ordinarily removed prior to propagation upward. The network-level timestamps may be propagated via in-band propagation or out-of-band propagation.
Online application layer processing of network layer timestamps
Computer-readable media, systems and methods may propagate lower layer data, in headers that would otherwise be deleted, to upper layers in a network protocol stack that uses a multi-layer communication model. For example, high precision network-level timestamps that indicate a time that binary data is received at a network switch may be propagated upward for online application-level processing. Network switches may ordinarily insert network-level timestamps in frame headers that are ordinarily removed prior to propagation upward. The network-level timestamps may be propagated via in-band propagation or out-of-band propagation.
Software defined data security layer
A software defined data security level method, computer program product, and data processing system. One embodiment may comprise intercepting, by a processor at a data security layer, an input/output (IO) request from a local software application, wherein the IO request includes a header and a data payload, analyzing, by the processor at the data security layer, the data payload of the IO request relative to a service level agreement (SLA), assigning, by the processor at the data security layer, a security level to the IO request based on the analysis.
Data transmission method and apparatus, and terminal
The embodiments of the present disclosure provide a data transmission method and apparatus, and a terminal. The method includes a terminal sending a first preamble to a base station and receiving a first random access response message sent by the base station. The method further includes the terminal acquiring an uplink transmission resource based on the first random access response message and transmitting first uplink data on the uplink transmission resource. The size of the uplink transmission resource supports the transmission of the first uplink data.
Controller area network traffic flow confidentiality
A transmitter device of a bus-based communication system may add one or more padding bits, associated with providing traffic flow confidentiality for communication of a payload on a communication bus, either to the payload on a transport layer, or to one or more first frames on a data link layer. The one or more first frames may include a transport layer payload associated with the payload. The transmitter device may transmit one or more second frames, including a data link layer payload associated with the one or more first frames, on the communication bus. A receiver device of the bus-based communication system may receive the one or more second frames on the communication bus. The receiver device may process the one or more padding bits from either the one or more first frames on the data link layer, or from the payload on the transport layer.
Information processing apparatus
An information processing apparatus including a control unit. In a case where a first physical layer network identifier for identifying a first network to which an apparatus in question belongs is determined to match a second physical layer network identifier for identifying a second network to which the apparatus in question does not belong, the control unit changes a first physical layer network identifier. Then, the control unit transmits the change information relating to the change to another information processing apparatus. Further, in a case where change information for changing a first physical layer network identifier for identifying a first network to which the apparatus in question belongs is received from another information processing apparatus which belongs to the first network, the control unit changes a condition for terminating reception processing of a packet on the basis of the change information in a middle of the reception processing.
Information processing apparatus
An information processing apparatus including a control unit. In a case where a first physical layer network identifier for identifying a first network to which an apparatus in question belongs is determined to match a second physical layer network identifier for identifying a second network to which the apparatus in question does not belong, the control unit changes a first physical layer network identifier. Then, the control unit transmits the change information relating to the change to another information processing apparatus. Further, in a case where change information for changing a first physical layer network identifier for identifying a first network to which the apparatus in question belongs is received from another information processing apparatus which belongs to the first network, the control unit changes a condition for terminating reception processing of a packet on the basis of the change information in a middle of the reception processing.