Patent classifications
H04L12/1877
Bum traffic control method, related apparatus, and system
Embodiments of the present disclosure disclose a BUM traffic control method, a related apparatus, and a system. A traffic controller receives, through a tunnel, a BUM packet encapsulated by a network device in a target broadcast domain. The traffic controller collects, based on the received BUM packet, statistics about a BUM traffic value of a target object within a preset time period, and determines whether the BUM traffic value is greater than a preset BUM traffic threshold of the target object. If the BUM traffic value is greater than the preset BUM traffic threshold, the traffic controller controls BUM traffic of the target object, to reduce the BUM traffic of the target object. The foregoing solution can resolve a problem of BUM packet flooding caused by an increase in a quantity of hosts or an increase in a quantity of network devices in a communications network.
Apparatus, system, and method for flow-level switchover of video streams
A disclosed method may include (1) measuring a quality level of a first instance of a video flow received via a first link within a network, (2) measuring a quality level of a second instance of the video flow received via a second link within the network, (3) determining that the quality level of the second instance of the video flow is better than the quality level of the first instance of the video flow, and then in response to determining that the quality level of the second instance of the video flow is better, (4) performing a flow-level switchover from the first instance of the video flow to the second instance of the video flow by (A) activating the second instance of the video flow and (B) deactivating the first instance of the video flow. Various other apparatuses, systems, and methods are also disclosed.
LOOP DETECTION AND PREVENTION
Various systems and methods for preventing loops. For example, one method involves receiving a multicast data packet at a node. The node is coupled to a local area network (LAN). An internet protocol (IP) prefix is assigned to the LAN. The method involves determining whether a source address included in the packet is covered by the IP prefix. Depending on the direction of travel of the multicast data packet and whether or not the source address is covered by the IP prefix, the node determines whether a loop exists.
Encoding method, decoding method, apparatus, and device
A polar code encoding/decoding method in a communications system is provided, including: determining an information bit location set or a frozen bit location set of a polar code based on an interleaving operation or a corresponding de-interleaving operation; and encoding or decoding the polar code based on the determined information bit location set or frozen bit location set.
Communication apparatus, method of controlling communication apparatus, and program
The present invention is directed to a communication apparatus that can notify other communication apparatuses that do not receive a multicast signal, of information on a function provided by the communication apparatus when the communication apparatus sends the multicast signal to notify the information on the function provided by the communication apparatus. The communication apparatus according to an embodiment of the present invention sends a unicast packet containing the information about the function together with the multicast packet to another communication apparatus which does not receive the multicast packet, but does not send the unicast packet together with the multicast packet to another communication apparatus determined as receiving the multicast packet.
Method of Enhanced Application Specific Congestion Control for Data Communication Mechanism
AT commands are used for controlling Mobile Termination (MT) functions and GSM/UMTS network services from a Terminal Equipment (TE) through Terminal Adaptor (TA). Application specific access control is an application/service specific access control mechanism for the operator to allow/prevent new access attempts from particular, operator-identified applications/services in the UE in idle mode. However, a TE does not always know the applicability of application specific access control. In accordance with one novel aspect, a new AT command interface that can report application specific access control status to the TE is proposed. It reduces wasteful signaling overhead by retries from the TE. Through the new AT command interface, the TE can query application specific access control status. Via unsolicited result code (URC), the MT can detect application specific access control applicability status change and report updated status to the TE.
Content stream integrity and redundancy system
A system can include one or more content distribution sites to provide content to one or more content satellite offices for delivery toward a set of destination devices for display. A content distribution site, of the one or more content distribution sites, can include one or more streamer devices. The one or more streamer devices can be associated with a single spoofed Internet protocol (IP) address. The spoofed IP address can facilitate failover among the one or more streamer devices. The one or more streamer devices can be configured to provide the content toward the set of destination devices using multicast with forward error correction (FEC). A content satellite office, of the one or more content satellite offices, can be configured to subscribe to a multicast group associated with the one or more streamer devices. The multicast group can be associated with the spoofed IP address to facilitate the failover among the one or more streamer devices.
Method and system for adaptive virtual broadcasting of digital content
The virtual broadcast system of the present invention optimizes the routing of digital content among nodes along overlay networks that are dynamically reconfigured based upon forecasts of frequently-changing congestion levels of component interconnections within an underlying network. In the context of delivering streaming video over the Internet to large numbers of concurrent users, the present invention makes efficient use of the limited capacity of congested ASN peering points by employing deep learning techniques to forecast congestion levels across those ASN peering points and, based on those forecasts, to optimize the routing of video content along dynamically reconfigured overlay networks. The virtual broadcast system handles unscheduled as well as scheduled events, streams live as well as pre-recorded events, and streams those events in real time with minimal delay in a highly scalable fashion that maintains a consistent QoE among large numbers of concurrent viewers.
IMPLICIT TRAFFIC ENGINEERING
Briefly, methods and/or apparatuses for implicit traffic engineering, such as for the Internet, are described.
Preventing multicast outages in ring networks
Examples disclosed herein relate to a method comprising determining, at a first node, that a first Ethernet Ring Protection Switching (ERPS) port of the first node is down, wherein the first node belongs to a plurality of network nodes connected in a ring topology to form an access network. The method includes determining, at the first node, that the first ERPS port is a querier port, wherein the first ERPS port is paired with a second ERPS port of the first node and marking the second ERPS port as the querier port of the first node. The method includes transmitting, by the first node, an IGMP join message to a device part of a multicast implementation, wherein the multicast implementation covers at least the ring topology.