Patent classifications
H04L61/2567
Correlating packets in communications networks
A computing system may identify packets received by a network device from a host located in a first network and may generate log entries corresponding to the packets received by the network device. The computing system may identify packets transmitted by the network device to a host located in a second network and may generate log entries corresponding to the packets transmitted by the network device. Utilizing the log entries corresponding to the packets received by the network device and the log entries corresponding to the packets transmitted by the network device, the computing system may correlate the packets transmitted by the network device with the packets received by the network device.
Correlating packets in communications networks
A computing system may identify packets received by a network device from a host located in a first network and may generate log entries corresponding to the packets received by the network device. The computing system may identify packets transmitted by the network device to a host located in a second network and may generate log entries corresponding to the packets transmitted by the network device. Utilizing the log entries corresponding to the packets received by the network device and the log entries corresponding to the packets transmitted by the network device, the computing system may correlate the packets transmitted by the network device with the packets received by the network device.
Systems and methods for generating contextual labels
In one embodiment, an apparatus includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors. The one or more computer-readable non-transitory storage media include instructions that, when executed by the one or more processors, cause the apparatus to perform operations including receiving a user credential from a remote access client within a network and communicating the user credential to an authentication, authorization and accounting (AAA) server within the network. The operations also include receiving a user attribute from the AAA server and generating a contextual label based on the user attribute. The contextual label includes routing instructions associated with traffic behavior within the network. The operations further include advertising a control message, which includes the contextual label, to the remote access client.
Communications using the common object request broker architecture (CORBA)
Communications using the common object request broker architecture (CORBA) is disclosed. The communications are between a first computing device and a second computing device separated by a NAT device. The first computing device issues a request conforming to the CORBA protocol to obtain an IOR for an object from the second computing device. A first request interceptor on the first device adds a public IP address of the second computing device as user-defined data in the request. A second request interceptor on the second computing device extracts the IP address from the request and stores it. The second computing device builds the IOR for the object including embedding the public IP address of the second computing device in the IOR. The second computing device sends the IOR to the first computing device. The first computing device then establishes a successful connection to the public IP address received in the IOR.
High Availability Network Address Translation
A computing environment, such as a cloud computing environment, may include nodes performing NAT for a plurality of workloads. An active node performs NAT for the workloads, including maintaining a NAT table. The active node may create sub-interfaces for the workloads and function as a DHCP server. The NAT table and sub-interfaces may be recreated on a standby node. Upon detecting failure, a routing table is updated to direct workloads to connect to the standby node and traffic may continue to be processed by the standby node without disrupting network or application sessions.
NETWORK COMMUNICATION SYSTEM AND NETWORK-TRAVERSAL METHOD
A network-traversal method includes: receiving an address information of a network device from a link server; generating a port number sequence composed of port values according to an external port number of the address information; and sending a link packet to an external network address of the address information in an order of the port values in the port number sequence until receiving an acknowledgement packet from the network device. At least one of the port values is related to the external port number. A part of the rest port values is/are generated gradually based on the external port number, and the others of the rest port values is/are generated randomly.
Fiber-Based Distributed Data Center Architecture
Systems and methods use a fiber-based network to provide both network access services such as Internet, television, phone, and wide area networking services as well as distributed data processing services. Distributed computing nodes are provided in broadband gateways at homes and other premises in a fiber-based network to realize a distributed data center architecture. In a specific example, a provider deploys a number of broadband gateways in the homes of homeowners who agree to pay for network access (e.g., Internet, phone, television, etc.) that is received over a fiber-based (preferably point-to-point) network at the broadband gateways in the homes. Those broadband gateways also separately provide distributed workload processing. Providing both network access and distributed workload processing makes the deployment and use of the fiber-based network more economically and technically feasible.
Improved QOS in Data Stream Delivery
A system for managing a data stream between first and second networks is described in which a node entity transmits a data stream addressed to a destination device in the second network and a gateway entity receives the data stream from the first network. The gateway entity identifies at least one characteristic of the destination device and transmits it to the node entity in the first network in such a way that the characteristic is relatable to the data stream. The node entity receives the characteristic of the destination device from the gateway entity and relates it to the data stream and performs Quality of Service management on the data stream based on the at least one characteristic. A gateway device and a method of managing a data stream are also described. The system, gateway, node and method extend the application of QoS performance and management.
Methods, systems, and computer readable media for facilitating the resolving of endpoint hostnames in test environments with firewalls, network address translators (NATs), or clouds
Methods, systems, and computer readable media for facilitating the resolving of endpoint hostnames in test environments with firewalls, network address translators (NATs), or clouds is disclosed. According to one exemplary method, the method occurs at a registration server configured to operate in a public network. The method includes receiving, from a first endpoint, a packet including a payload containing a first address and a hostname associated with the first endpoint. The method also includes identifying a second address from a header of the packet. The method also includes initiating, using the second address, a connection to the first endpoint. The method also includes determining whether the connection is successful. The method further includes associating the hostname of the first endpoint with one of the first address and the second address based on results of the determination.
Remote control of equipment
A method for controlling selection of a communication method between an equipment control device belonging to a wide-area communication network and equipment belonging to a local communication network. The method includes the following steps relating to the control device: requesting the equipment to initiate a connection to the control device, the request being sent at the time of a routine connection of the equipment to the control device; determining whether the equipment can be reached by the control device using a direct method; and configuring the equipment if the equipment cannot be reached using a direct method.