H04L12/701

Data processing system with routing tables

A data processing system with routing tables comprising an operating system for supporting processes, such that the process are associated with one or more resources and the operating system being arranged to police the accessing by processes of resources so as to inhibit a process from accessing resources with which it is not associated. Part of this system is an interface for interfacing between each process and the operating system and a memory for storing state information for at least one process. The interface may be arranged to analyze instructions from the processes to the operating system, and upon detecting an instruction to re-initialize a process cause state information corresponding to that pre-existing state information to be stored in the memory as state information for the re-initialized process and to be associated with the resource.

Flow-based adaptive private network with multiple WAN-paths

Systems and techniques are described which improve performance, reliability, and predictability of networks without having costly hardware upgrades or replacement of existing network equipment. An adaptive communication controller provides WAN performance and utilization measurements to another network node over multiple parallel communication paths across disparate asymmetric networks which vary in behavior frequently over time. An egress processor module receives communication path quality reports and tagged path packet data and generates accurate arrival times, send times, sequence numbers and unutilized byte counts for the tagged packets. A control module generates path quality reports describing performance of the multiple parallel communication paths based on the received information and generates heartbeat packets for transmission on the multiple parallel communication paths if no other tagged data has been received in a predetermined period of time to ensure performance is continually monitored. An ingress processor module transmits the generated path quality reports and heartbeat packets.

System and data card for stateless automatic configuration of IPv6 address and method for implementing the same
09729501 · 2017-08-08 · ·

Disclosed are a system and data card for stateless automatic configuration of an IPv6 address and the method for implementing the same, and the method includes: an IPv6 address configuration way of a data card is set and stored according to an IPv6 address allocation strategy of a current network, after successful establishment of an IPv6 dialup connection and reception of a router advertisement request message transmitted by a terminal for acquiring a prefix address, the data card determines the set IPv6 address allocation way, and when the set IPv6 address allocation way is a static configuration way, a router advertisement response message is discarded and a valid IPv6 global unicast address is reported to the terminal. By means of the system, data card and method, it is possible to solve a problem that data transmission can not be normally performed by an existing data card implementing dialup in an Ethernet link way when interface identifiers are allocated by a network.

Device and method for detecting bypass access and account theft

Disclosed is technology relating to a device and method for detecting bypass access and account theft. In the method for detecting bypass access from a client to a server according to the present invention: a server receives access data comprising data about hops on the route from the client to the server by using a route tracing agent; region data is extracted from the IP address(es) of the hop(s) comprised in the received access data; a judgment is made as to whether the extracted region data belongs to a pre-set access-permitted region; and the server detects whether the access from the client is bypass access, in accordance with the judgment results.

Parallel distributed network management

A method of parallel processing by networked devices, in which distributed data in a network is accessed in parallel to provide results. Commands and queries by a user station define a set of such distributed data. The networked devices access the distributed data in portions, individually process each portion, conduct peer-to-peer communication to aggregate results from processing each portion, and individually determine whether and when to report results. Making effective use of network assets (such as processing and storage at each node), making effective use of concurrency of network assets, limiting bandwidth use between network assets and user stations, and limiting use of assets (such as processing and storage) at user stations.

Policy-based data routing for a multi-mode device

Communication devices capable of at least two communication modes (e.g. WLAN, WMAN and WWAN and/or wired modes) can be configured to optimize communications using a policy-based mechanism to configure connections and routes. A rules engine evaluates its policies on a state change (e.g. network availability, time of day, etc.) to configure a routing table and, together with communication APIs, provides an appropriate connection to an application for its respective communications. Policies may be responsive to various factors such as Radio Access Technology (high/low bandwidth), cost, presence, time of day, location, application type and quality of service (QoS) requirements among others to optimize communications.

Link policy routing based on link utilization
09722928 · 2017-08-01 · ·

In one embodiment, a link utilization threshold is assigned to a first link. Link utilization of the first link and of one or more second links is monitored. The first link is considered to be out-of-policy (OOP) in the event that the link utilization of the first link surpasses the link utilization threshold. In response to the first link being considered OOP, action is taken. An excess utilization of the first link is determined. One or more prefixes currently routed over the first link whose collective per prefix utilization exceeds the excess utilization are determined. Provided that the collective per prefix utilization of the one or more prefixes currently routed over the first link, if added to the link utilization of the one or more second links, would not cause the one or more second links to be considered OOP, the one or more prefixes are redirected over them.

Probing technique for predictive routing in computer networks

In one embodiment, network information associated with a plurality of nodes in a network is received at a device in a network. From the plurality of nodes, a node is selected based on a determination that the selected node is an outlier among the plurality of nodes according to the received network information. Then, a probe is sent to the selected node, and in response to the probe, a performance metric is received from the selected node at the device.

Interfaces to manage last-mile connectivity for direct network peerings

Methods and apparatus for interfaces to manage last-mile connectivity and dynamic reconfiguration for direct network peerings. A system may include a data center, endpoint routers and a connectivity coordinator. The coordinator implements an interface defining connectivity operations. The coordinator receives a request for dedicated connectivity to data center resources, formatted according to the interface. The coordinator determines a connectivity provider to provide last-mile connectivity to the requester, and transmits a notification identifying the selected connectivity provider.

Message passing to assure deletion of label switched path

A label switched path through a network of nodes, is torn down by sending a message along the path from an ingress node. If there is a fault along the path, a path error message (2) is sent back along the path to the ingress node. The ingress node uses a different route bypassing the fault to alert (3) a further one of the nodes (NE5, NE6) on that path beyond the indicated fault, to cause that further node to continue the tearing down for other nodes on that path beyond the indicated fault by sending a further message (4) along the portion of the path beyond the indicated fault, to indicate to the other nodes to continue the tear down. This enables the ingress node to clean up the rest of the path beyond the fault, to avoid leaving unused capacity unavailable for reuse, and to avoid time consuming manual clean up.