H04L2101/663

SECURE MULTIPLEXED ROUTING
20220060506 · 2022-02-24 · ·

Methods and systems for managing data transmissions. The methods disclosed herein may involve receiving requests for a first and a second service, and routing communications with the second service through the first service without requiring the firewall to be reconfigured to allow communications with the second service.

METHOD AND APPARATUS FOR MANAGING MULTIPATH TRANSMISSION CONTROL PROTOCOL

Methods and systems for managing a Multipath Transmission Control Protocol (MPTCP) in an electronic device during data transport between the electronic device (client device) and other electronic device (host device) are described. The method includes monitoring one or more factors associated with the MPTCP implemented in the client device. Further, based on the one or more factors that are monitored, the method includes determining whether to enable the MPTCP in the electronic device for a current data transport. Thereafter, the method includes determining a mode, among a plurality of modes provided for the MPTCP, to control a plurality of subflows of the MPTCP when the MPTCP is enabled for the current data transport. The method further includes dynamically switching the mode of the MPTCP during the current data transport based on the one or more factors being monitored during the current data transport.

MAPPING BETWEEN CLASSICAL URLs AND ICN NETWORKS
20170302576 · 2017-10-19 ·

A method for routing a request for content from a content provider through an IPv6 network is described, the IPv6 network being an information centric network (ICN) in which content is directly addressed using at least a portion of an IPv6 address. The method includes receiving, at an IPv6 network, a request for content, determining that the request does not comprise an ICN address. The method further includes intercepting the request, and translating the request into an IPv6 address in which at least a portion of the address is directed to or associated with the piece of content. Systems and methods described herein address problems arising from the interaction between IP and ICN networking models.

System and method for detecting a compromised computing system
09787713 · 2017-10-10 · ·

A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.

Logical router with multiple routing components

Some embodiments provide a method for implementing a logical router in a network. The method receives a definition of a logical router for implementation on a set of network elements. The method defines several routing components for the logical router. Each of the defined routing components includes a separate set of routes and separate set of logical interfaces. The method implements the several routing components in the network. In some embodiments, the several routing components include one distributed routing component and several centralized routing components.

Increased port address space
09781075 · 2017-10-03 · ·

Managing network ports is disclosed. Network session identification information is received. The network session identification information is associated with a destination IP address and a destination network port. An available source network port is determined using a data structure that is based on the destination IP address and the destination network port.

Method of Synchronizing User Setting Data Among Multiple Centers
20170279886 · 2017-09-28 ·

Disclosed herein is a method of synchronizing data among multiple EMS centers. The method may include updating user setting data by a client in a main center; transmitting the user setting data from the main center to a secondary center; and synchronizing the user setting data between the main center and the secondary center.

NETWORK TRAFFIC CAPTURE ANALYSIS
20170250886 · 2017-08-31 ·

A method relates to receiving, by a processing device, a plurality of data items, wherein each data item of the plurality of data items comprises at least part of a network packet captured at a network access point, identifying a group of data items representing network packets having a common source Open Systems Interconnect (OSI) layer 3 (network layer) address and a common destination network layer address, identifying a plurality of subsets of the identified group, wherein all data items comprised by a particular subset of the plurality of subsets represent network packets that share a common sequence number, determining a packet retransmission rate in view of a number of data items in the group and a total number of data items in the identified plurality of subsets, determining that the packet retransmission rate exceeds a threshold value, and causing an alert message to be presented via a user interface, the alert message indicating a high packet retransmission rate between the common source network layer address and the common destination network layer address.

Span out load balancing model

This document describes techniques for transporting at least a portion of the data for a remote presentation session via datagrams. In particular, a span-out model is described whereby a remote presentation session can be associated with multiple channels and each channel can be routed through a different gateway computer system. As such, a connectionless oriented channel for a client may be routed through a first gateway computer system and a connection oriented channel for the client may be routed through a second gateway computer system. In addition to the foregoing, other techniques are described in the claims, the attached drawings, and the description.

Systems and methods for automatically providing Whois service to top level domains

Methods and systems are disclosed for quickly providing Whois services to a new top level domain after it is provisioned in a registry. In one embodiment, domain data is received at a first system regarding a top level domain (TLD). The domain data is assigned an authoritative port of a Whois server and is provisioned in a registry database. In certain embodiments, the Whois server provides information relating to domain name registrations of the TLD in the database, according to the authoritative port. The Whois server determines that a Whois query is received at the authoritative port for the queried TLD and responds with the queried information. To the requester, the responses appear as if they are sent from a unique Whois server for each TLD, but the Whois server is actually shared among the TLDs.