H04L2101/663

Per-application split-tunneled proxy

Disclosed are various embodiments for providing split-tunneled network connectivity on a per-application basis. A request to make a connection, such as a transmission control protocol (TCP) or a universal datagram protocol (UDP) connection, to a remote host specified by an internet protocol (IP) address in the request is received from a network driver. A hostname lookup table is queried to determine a hostname associated with the IP address for the remote host. A policy is identified based on the hostname associated with the IP address for the remote host. Then, the connection is routed based on the policy.

TRANSPORT LAYER SECURITY EXTENSION FOR HYBRID INFORMATION CENTRIC NETWORKING
20210120038 · 2021-04-22 ·

Presented herein is a solution in which a Producer that provides Transport Layer Security (TLS) over a hybrid Information Centric Network (hICN) announces two different hICN prefixes or namespaces. One hICN prefix is for performing a TLS handshake (also called a handshake prefix or handshake namespace) and another hICN prefix (also called a secure prefix or secure namespace) is to publish content in a secure, and confidential manner with a Consumer that correctly performs a TLS handshake. While the handshake prefix is public and shared by multiple Consumers, a secure prefix is uniquely assigned to a Consumer after the TLS handshake successfully terminates. Content published under the secure prefix is encrypted with the encryption key established during the TLS handshake. Names used in the secure namespace are private, meaning only the Consumer and Producer that perform the handshake can infer any information about a content by looking on the name.

ALTERNATE CONTROL CHANNEL FOR NETWORK PROTOCOL STACK
20210119963 · 2021-04-22 ·

Methods, systems, and computer-readable mediums for an alternate control channel for a network protocol stack are disclosed. In some embodiments a controller device provides instructions to one or more source devices. The controller device instructions the one or more source devices to override network parameters associated with network communication performed by the source devices. The network parameters to be overridden may include transport level source ports, source network addresses, or source link level addresses. In some embodiments, a range of override values are specified. In some of these aspects, a source device may perform time division multiplexing via the multiple override values, such that data generated by a single device may appear to be transmitted by multiple devices.

Systems, methods, and apparatus to monitor mobile internet activity

Systems, methods, and apparatus to monitor mobile Internet activity are disclosed. An example system includes at least one processor, and memory including instructions, when executed, cause the at least one processor to in response to obtaining first panelist demographic information associated with a first panelist and second panelist demographic information associated with a second panelist, assign a first port of a proxy server to a first mobile device associated with the first panelist and a second port of the proxy server to a second mobile device associated with the second panelist, the first port different from the second port, transmit configuration information to the first mobile device to instruct the first mobile device to transmit requests for media including a first request to the first port, and in response to obtaining the first request at the first port, store an association between the first panelist demographic information and the media.

Content delivery from home networks

A method for retrieving content on a network comprising a first device and a second device is described. The method includes receiving in the network a request for content from the first device, the request identifying the content using an IPv6 address for the content, and determining whether the content is stored in a cache of the second device. Upon determining the content is stored in the cache of the second device, a request is sent to the second device for the content using the IPv6 address of the content. The content is forwarded to the first device from the second device, wherein the first and second devices are part of the same layer 2 domain. Methods of injecting content to a home network and packaging content are also described.

LSB based symmetric receive-side scaling
10944717 · 2021-03-09 · ·

A computer-implemented method includes generating a hash key using a number of least significant bits (LSBs) for indexing an indirection table in a computing system including multiple processing cores. In generating the hash key, symmetry constraints for a request packet and a response packet through a same communication channel are computed. The symmetry constraints include at least a condition where the LSBs of a hash value corresponding to a source or destination IP address of the request packet are equal to the LSBs of a hash value corresponding to a destination or source IP address of the response packet, wherein the LSBs of the hash value of the request and response packets are of a number same as the number of LSBs used for indexing the indirection table. A string of bits are subjected to the symmetry constraints and adjusted to satisfy the symmetry constraints to generate the hash key.

SMART FILTERING OF FRAMES TO IMPROVE LOW-POWER TIME
20210055774 · 2021-02-25 ·

Some implementations of the disclosure are directed to a media access controller (MAC) of a mobile satellite terminal that may autonomously determine whether or not wake up a software processor of the mobile satellite terminal depending on information contained in a packet received from a user device. The MAC may receive a frame contained in a packet transmitted by a user device to the mobile satellite terminal; automatically determine whether to accept or drop the frame by applying one or more programmed filters to the frame; if the frame is accepted: store the frame in the memory, and cause a power controller to power on the software processor to process the stored frame; and if the frame is not accepted: drop the frame without causing the power controller to power on the software processor.

Message segmentation

A system including a network interface layer, and a physical network connection configured to connect with a networking medium, wherein the network interface layer is configured to: A) receive a user datagram protocol (UDP) message for sending, the UDP message having a length L, and a desired maximum network message size (MSS), B) segment the UDP message in accordance with the MSS into a plurality of message segments, each message segment having a size no greater than MSS, and adjust information in each of the plurality of message segments, and C) send the plurality of message segments via the physical network connection to a networking medium. Related apparatus and methods are also provided.

Techniques to interface and route packets in C-V2X devices

Aspects of the present disclosure provide techniques for routing internet protocol (IP) and non-IP packets in cellular vehicle-to-everything devices that can be transmitted over the air via cellular or side-link device-to-device (D2D) communication systems without the need for the applications (e.g., automotive applications) to modify its operations. Specifically, an application (automotive application or web browser) may use default Application Programming Interface (API) that is typically used for regular cellular communication without modifying its operations to differentiate between IP and non-IP packets. Instead, in accordance with present disclosure, logical data paths may be dynamically adjusted to map services associated with the packets with an appropriate media access control (MAC) flow such that the modem receiving the packet may process and route the packet to target end-destination.

Direct file send from storage to end client by transferring socket information to the storage

A method begins by sending, by a user computing device of a storage network, a read request regarding data to a host computing device of the storage network in accordance with a transport layer protocol, where the read request includes data retrieval information associated the data. The method continues with determining, by the host computing device, a storage entity of the storage network that is storing the data based on the data retrieval information. The method continues with sending, by the host computing device, socket information and data retrieval information to the storage entity. The method continues with sending, by the storage entity, the data directly to the user computing device in accordance with the socket information and using the session identifier.