Patent classifications
H04L12/743
Decentralized content fabric
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized system for security and access control associated with digital content. In some implementations, a software stack is executed to provide fabric nodes of an overlay network. A transaction encrypted with a private key of a client can be recorded in a ledger identifying addresses of fabric nodes of the overlay network. The transaction can be identified by a transaction identifier (ID), and the private key can be part of a public/private key pair representing an account of the client on the ledger. A digital contract can be invoked, where the digital contract represents one or more terms of access for digital content stored in the overlay network. Controlled client access to the digital content can be based on an authorization token obtained from the client.
Multi-stage prefix matching enhancements
Approaches, techniques, and mechanisms are disclosed for maintaining efficient representations of prefix tables for utilization by network switches and other devices. In an embodiment, the performance of a network device is greatly enhanced using a working representation of a prefix table that includes multiple stages of prefix entries. Higher-stage prefixes are stored in slotted pools. Mapping logic, such as a hash function, determines the slots in which a given higher-stage prefix may be stored. When trying to find a longest-matching higher-stage prefix for an input key, only the slots that map to that input key need be read. Higher-stage prefixes may further point to arrays of lower-stage prefixes. Hence, once a longest-matching higher-stage prefix is found for an input key, the longest prefix match in the table may be found simply by comparing the input key to lower-stage prefixes in the array that the longest-matching higher-stage prefix points to.
Chained lookups and counting in a network switch
A network switch using a search engine to generate chained table lookup requests. After the search engine executes a first lookup, the next-pass logic in the search engine uses the first lookup result and information in the master key to generate a second lookup key as well as other parts of a second lookup request. A next-pass crossbar routes the second lookup request to a target memory, and the search logic executes the second lookup. The first lookup request may originate from a processing engine coupled to the search engine. The first and the second lookup results, if any, can then be returned back to the processing engine for further processing or decision making. The chain of lookups can be configured by software by specifying various operational parameters of the processing engines and the next-pass logic, including specifying a key construction mode for the second lookup.
CONTENT SET BASED DELTACASTING
Methods, apparatuses, and systems are provided for improving utilization of the satellite communications system through various “deltacasting” techniques for handling content sets (e.g., feeds or websites). Embodiments operate in a client-server context, including a server optimizer, a client optimizer, and, in some embodiments, a pre-positioning client. Within this client-server context, content sets are multicast (e.g., anticipatorily pre-positioned in a local dictionary) to end users of the communications system and are handled at the content set level, according to set-level metadata and/or user preferences. In some embodiments, when locally stored information from the content sets is requested by a user, deltacasting techniques are used to generate fingerprints for use in identifying and exploit multicasting and/or other opportunities for increased utilization of links of the communications system.
Highly probable identification of related messages using sparse hash function sets
Methods, systems, and apparatus for network monitoring and analytics are disclosed. The methods, systems, and apparatus for network monitoring and analytics perform highly probable identification of related messages using one or more sparse hash function sets. Highly probable identification of related messages enables a network monitoring and analytics system to trace the trajectory of a message traversing the network and measure the delay for the message between observation points. The sparse hash function value, or identity, enables a network monitoring and analytics system to identify the transit path, transit time, entry point, exit point, and/or other information about individual packets and to identify bottlenecks, broken paths, lost data, and other network analytics by aggregating individual message data.
Template-compatible encoding for content chunk aggregation and mapping
A method of enabling access to content in a network implementing Internet Protocol version 6 (IPv6) is described, the method including accessing a content addressing file including entries each comprising a content portion location associated with the content portion. The content portion location associated with the content portion is extracted for an entry and, based on the content portion location, a section of an IPv6 address for the content portion is formed. Methods of addressing content for storage and retrieving content are also described.
TECHNOLOGIES FOR MANAGING A FLEXIBLE HOST INTERFACE OF A NETWORK INTERFACE CONTROLLER
Technologies for processing network packets by a host interface of a network interface controller (NIC) of a compute device. The host interface is configured to retrieve, by a symmetric multi-purpose (SMP) array of the host interface, a message from a message queue of the host interface and process, by a processor core of a plurality of processor cores of the SMP array, the message to identify a long-latency operation to be performed on at least a portion of a network packet associated with the message. The host interface is further configured to generate another message which includes an indication of the identified long-latency operation and a next step to be performed upon completion. Additionally, the host interface is configured to transmit the other message to a corresponding hardware unit scheduler as a function of the subsequent long-latency operation to be performed. Other embodiments are described herein.
Load balancing method, apparatus, and device
This application discloses a load balancing method and apparatus, and a device, and relates to the field of network technologies. The method includes: after a packet sent by a server is received, determining whether the packet is a first packet of a flowlet, if the packet is the first packet of the flowlet, determining a destination switch based on a destination address of the packet, determining a weight value of at least one equal-cost path associated with the destination switch in a stored equal-cost path weight table, where the equal-cost path weight table stores a correspondence between the at least one equal-cost path and the weight value, and scheduling, based on the weight value of the at least one equal-cost path, the packet onto a corresponding equal-cost path for transmission.
System and method for decay-based content provisioning
Systems and methods for content aggregation creation are disclosed herein. The system can include memory having a content database and an aggregation database. The system can include a user device having a first network interface and a first I/O subsystem. The system can include a server that can: provide content to the user device via a first electrical signal; receive a selection of a portion of the provided content from the user device via a second electrical signal; automatically extract sentences from the selected portion of the provided content via a natural language processor; automatically generate a parse tree for one of the automatically extracted sentences; identify noun phrases from the part of speech tags within the parse tree; place content associated with one of the noun phrase in a content aggregation; and output the content aggregation to the user device.
System and method for automatic content aggregation evaluation
Systems and methods for content aggregation creation are disclosed herein. The system can include memory having a content database and an aggregation database. The system can include a user device having a first network interface and a first I/O subsystem. The system can include a server that can: provide content to the user device via a first electrical signal; receive a selection of a portion of the provided content from the user device via a second electrical signal; automatically extract sentences from the selected portion of the provided content via a natural language processor; automatically generate a parse tree for one of the automatically extracted sentences; identify noun phrases from the part of speech tags within the parse tree; place content associated with one of the noun phrase in a content aggregation; and output the content aggregation to the user device.