Patent classifications
H04L12/801
Method and apparatus for dynamic bandwidth allocation for optimizing network utilization
An apparatus is configured to receive at a time a datum associated with use of a network by a set of compute devices using the network. The apparatus is also configured to calculate at least one threshold value based, at least in part, on the datum and a bandwidth capacity of the network at the time. The apparatus is also configured to receive a usage value associated with bandwidth use of a compute device from the set of compute devices and associated with a time period immediately preceding the time. The apparatus is further configured to compare the usage value with the at least one threshold value to determine a usage category associated with the compute device. The apparatus is configured to limit bandwidth use of the network for the compute device based on the usage category.
Control plane protection for various tables using storm prevention entries
The present disclosure discloses a method and network device for control plane protection for various tables using storm prevention entries. Specifically, the disclosed system receives a first packet, and creates an inactive entry in a table. The system then forwards the first packet from a first processor to a second processor for processing. Also, the system associates the inactive entry with a timestamp indicating when the first packet is forwarded to the second processor, and determines a configured interval (CI) associated with the table. Further, the system compares a difference between a current timestamp and the timestamp associated with the inactive entry against the CI upon receiving a second packet. If the difference is longer than the CI, the system associates the inactive entry with the current timestamp, and forwards the second packet to the second processor for processing. Otherwise, the system discards the second packet.
Systems and methods for implementing bearer call-back services
The present disclosure is directed at systems, methods and media for providing bearer call-back services for bearers that have been rejected or pre-empted by a network apparatus in a core network. In some embodiments, if a network apparatus enters a state in which it becomes necessary to reject or pre-empt a bearer associated with a user equipment (UE) (e.g., due to load conditions in a radio access network, the core network, or an application server), the network apparatus can send to the UE a call-back message when the network apparatus exits the state that precipitated the bearer rejection or pre-emption. By sending a call-back message, the network apparatus can save the UE from multiple unsuccessful attempts to establish a bearer, or from waiting an unnecessarily long time before establishing a bearer.
Predictive time allocation scheduling for TSCH networks
In one embodiment, a device in a network receives one or more time slot usage reports regarding a use of time slots of a channel hopping schedule by nodes in the network. The device predicts a time slot demand change for a particular node based on the one or more time slot usage reports. The device identifies a time frame associated with the predicted time slot demand change. The device adjusts a time slot assignment for the particular node in the channel hopping schedule based on predicted demand change and the identified time frame associated with the predicted time slot demand change.
System and method for efficient transport of large data files
Telecommunication networks are under stress due to rapid traffic increase cause mostly by large file transfers. Disclosed herein is a cross-layer transport protocol specifically designed to efficiently handle large transactions. Traffic generated from large transactions is shaped into a periodic succession of fixed-size data frames. Each transaction can then be scheduled for transmission using a two-way reservation protocol. Exemplary results show that the proposed approach is capable of significantly improving goodput and end-to-end delay relative to TCP, improving efficiency of bandwidth utilization by over 40%.
System and method for an energy efficient network adaptor with security provisions
In accordance with an embodiment, a network device includes a network controller and at least one network interface coupled to the network controller that includes at least one media access control (MAC) device configured to be coupled to at least one physical layer interface (PHY). The network controller may be configured to determine a network path comprising the at least one network interface that has a lowest power consumption and minimum security attributes of available media types coupled to the at least one PHY.
CONGESTION AVOIDANCE IN A NETWORK DEVICE
A network device receives a packet is received from a network, and determines at least one port, among a plurality of ports of the network device, via which the packet is to be transmitted. The network device also determines an amount of free buffer space in a buffer memory of the network device, and dynamically determines, based at least in part on the amount of free buffer space, respective thresholds for triggering ones of multiple traffic management operations to be performed based on the packet. Using the respective thresholds, the network device determines whether or not to trigger ones of the multiple traffic management operations with respect to the packet. The network device performs one or more of the traffic management operations with respect to the packet determined to be triggered based on the corresponding one of the respective thresholds.
Traffic Management in a Network Switching System with Remote Physical Ports
A switching system includes a port extender device coupled to a central switching device. Packets processed by the central switching device are forwarded to the port extender device and enqueued in ones of a plurality of egress queues in the port extender device for transmission of the packets via the front ports of the port extender device. Respective egress queues in the port extender device have a queue depth that is less than a queue depth of corresponding respective egress queues in the central switching device. A flow control message indicative of congestion in a particular egress queue of the port extender device is generated and transmitted to the central switch device to control transmission of packets from the central switching device to the particular egress queue of the port extender device.
LINK STATE CONTROL METHOD, APPARATUS AND COMPUTER STORAGE MEDIUM
Disclosed in present invention is a link state control method. The method includes: within a setting time window, determining the reset fixed code word of a received data stream; according to the situation that each cell corresponding to the data stream is received correctly or incorrectly, determining the leaky bucket value of a link in real time;
according to the determined reset fixed code word and the determined leaky bucket value, determining the state of the link. Moreover, the present invention also discloses a link state control apparatus and computer storage medium.
METHOD FOR OPTIMIZING THROUGHPUT OF A NETWORK
A method for optimizing throughput of a network with stations adapted to transmit data to an access point includes the step of determining a respective required throughput for each station based on: respective time periods required for decreasing a count of a respective back-off counter associated with each of the stations, a transmission packet length of the respective station, and a probability of successful transmission for of the respective station. The respective required throughput so determined is a function of a respective transmission attempt rate for the station. The method further includes the step of determining the respective transmission attempt rate for each station for maximizing a sum of the respective required throughput such that a respective fixed throughput is provided for inelastic data flow in the network, a respective proportional throughput ratio is provided for elastic data flow in the network, and the throughput of the network is maximized.