Patent classifications
H04L12/815
Traffic shaping based on request resource usage
A current request for a server to perform work for a user profile can be received and processed at the server. It can be determined whether server usage by the profile exhibits a sufficient trend toward a threshold value to warrant performing traffic shaping for the user profile. If so, then a delay time can be calculated based on, or as a function of, server resources used in processing the current request, and a response to the current request can be delayed by the delay time.
METHOD FOR TRAFFIC SHAPING OF DATA FRAMES IN NETWORK AND DEVICE AND COMPUTER PROGRAM PRODUCT THEREFOR
The present invention relates to packet-switched networks, such as Ethernet, and more particularly to a method for traffic shaping of data frames to transmit in such a telecommunication network, the frames to transmit being distinguished between: express frames, needing to be sent within predetermined time windows, and normal frames, intended to be sent at times outside said time windows. More particularly, for a current normal frame, the method comprises the steps of: determining whether said normal frame can be fragmented, and if yes: determining whether a remaining time to a next time window opening is enough to transmit one or several fragments of said normal frame, and if yes: transmitting said one or several fragments.
PACKET TRANSFER DEVICE AND METHOD FOR SETTING COUNTER
There is provided a packet transfer device including a memory, and a processor coupled to the memory and the processor configured to detect a first packet of a predetermined size, detect a second packet whose data in a predetermined area matches a specific pattern, the second packet being included in a group of the first packet, and count a number of the second packet.
Automated discovery and forwarding of relevant network traffic with respect to newly connected network tools for network tool optimizers
Network tool optimizers and related methods are disclosed that provide automated discovery and configuration of network tool devices. The disclosed embodiments include tool processors having tool discovery engines and tool configuration engines that provide discovery of tool information and generation of rules for filter engines within the network tool optimizer (NTO) so that relevant network traffic received by the NTO is forwarded to network tool devices connected to the NTO. New network traffic sources connected to the NTO can also be automatically configured to forward relevant traffic to the network tool devices based upon the discovered tool information. Further, a database of tool information can be stored within the NTO and can be used by the NTO in determining relevant traffic for connected tool devices. A variety of different implementations can use the automatic tool discovery and configuration embodiments.
Bandwidth throttling in vulnerability scanning applications
Apparatus and methods are disclosed for implementing bandwidth throttling to regulate network traffic as can be used in, for example, vulnerability scanning and detection applications in a computer network environment. According to one embodiment, a method of routing network packets in a networked device having plural network interfaces combines applying traffic class and network interface throttling for marking network packets with a differentiated service code based on input received from a profiler application, throttling the bandwidth of network packets based on a threshold for a designated network interface for the packet, throttling the bandwidth of the bandwidth-throttled packets based on a threshold for its respective differentiated service code, and emitting network packets on each respective designated network interface.
SWITCH ACCESS MODULE, CELL ENCAPSULATION METHOD, SWITCHING NETWORK SYSTEM AND COMPUTER STORAGE MEDIUM
A switch access module, a cell encapsulation method, a switching network system and a computer storage medium are described. The method includes that: the switch access module determines accumulated unsent data corresponding to a destination address according to the destination address of a received data packet, the accumulated unsent data corresponding to the destination address including the data packet received by the switch access module and unsent data cached by the switch access module and corresponding to the destination address; and the accumulated unsent data corresponding to the destination address is filled into at least one cell according to a preset cell minimum length and a length of the accumulated unsent data corresponding to the destination address.
FORWARD ERROR CORRECTION FOR LOW-DELAY RECOVERY FROM PACKET LOSS
An encoder receives a sequence of packets. For each packet, the encoder selects a window of at least previous packets in the sequence of packets. The encoder identifies in the window one or more earlier packets among the previous packets and one or more later packets separated from the one or more earlier packets by a gap including gap packets. The encoder encodes the one or more earlier packets and the one or more later packets into a forward error correction (FEC) packet corresponding to the packet, without using any of the gap packets, and transmits the FEC packet and the packet.
Method and system for enforcing multiple rate limits with limited on-chip buffering
The present application describes a system and method for rate limiting traffic of a virtual machine (VM). In this regard, a VM bypasses a hypervisor and enqueues a packet on an assigned transmission queue. Based on information contained in the packet, the NIC determines whether the packet is to be delayed or transmitted immediately. If the NIC determines that the packet is to be transmitted immediately, the packet is moved to one of a plurality of primary output queues to be transmitted to the external network. If the packet is to be delayed, the packet is moved to one of a plurality of rate limited secondary output queues. In this regard, the NIC classifies the packets, thereby improving performance by allowing high-rate flows to bypass the hypervisor.
TRAFFIC SHAPER WITH POLICER(S) AND ADAPTIVE TIMERS
Apparatuses, methods and storage medium associated with a traffic shaper having one or more policers and adaptive timers are disclosed herein. The traffic shaper is to shape packet traffics of a plurality of regulated traffic generating entities. The policer is to process incoming packets of the regulated traffic generating entities and determine whether to forward or temporarily hold the packets. A buffer is to store the packets to be temporarily held; and the timer task manager is to process timer tasks of the regulated traffic generating entities and determine whether to discard the timer tasks or forward to regulate release of held packets of the regulated traffic generating entities. Other embodiments may be disclosed or claimed.
Predictive networking architecture for next-generation multiservice, multicarrier WANs
In one embodiment, network traffic data is received regarding traffic flowing through one or more routers in a network. A future traffic profile through the one or more routers is predicted by modeling the network traffic data. Network condition data for the network is received and future network performance is predicted by modeling the network condition data. A behavior of the network is adjusted based on the predicted future traffic profile and on the predicted network performance.