H04L12/893

Packet classification using multi-dimensional splitting

A computer-implemented method classifies a packet received from a network. The method comprises receiving the packet having header information and a rule-set that indicates a plurality of actions to perform on the packet. A geometric representation of the rule-set is constructed having a plurality of dimensions and rule boundaries. At least one rule boundary and dimension of the geometric representation is split to form a search structure having a plurality of nodes. Each node in the plurality of nodes is constrained to a predetermined memory threshold. The search structure is searched using the header information to obtain a rule in the rule-set that indicates an action to take on the packet.

NETWORK ENDPOINT SPOOFING DETECTION AND MITIGATION

Endpoint security systems and methods include a distance estimation module configured to calculate a travel distance between a source Internet Protocol (IP) address and an IP address for a target network endpoint system from a received packet received by the target network endpoint system based on time-to-live (TTL) information from the received packet. A machine learning model is configured to estimate an expected travel distance between the source IP address and the target network endpoint system IP address based on a sparse set of known source/target distances. A spoof detection module is configured to determine that the received packet has a spoofed source IP address based on a comparison between the calculated travel distance and the expected travel distance. A security module is configured to perform a security action at the target network endpoint system responsive to the determination that the received packet has a spoofed source IP address.

Transmission control protocol (TCP) throughput optimization in mobile wireless networks

A device establishes a first transmission control protocol (TCP) connection with a client device associated with a wireless network, and establishes a second TCP connection with a server device associated with the wireless network. The device also provides a first TCP window size to the client device via the first TCP connection, and provides a second TCP window size to the server device via the second TCP connection, where the first TCP window size is different than the second TCP window size.

Transparent middlebox with graceful connection entry and exit

Methods for removing a middlebox from a network connection include determining a degree of mismatch between a sequence number in a first connection between the middlebox and a client and a sequence number in a second connection between the middlebox and a server, delaying acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch, and establishing a direct connection between the client and the server without mediation by the middlebox when the degree of mismatch is zero.

TELEGRAM SPLITTING TRANSMISSION METHOD FOR BIDIRECTIONAL NETWORKS

A data transmitter is provided, having: a generator for generating transmission data packets, configured to split a first data packet destined for a first data receiver into at least two transmission data packets, wherein each of the transmission data packets destined for the first data receiver is shorter than the first data packet; a transmission element for transmitting data packets, configured to transmit the at least two transmission data packets destined for the first data receiver via a communications channel with a time gap; wherein the transmission element for transmitting data packets is configured to transmit at least one further transmission data packet to the first data receiver or a second data receiver in the time gap between the at least two transmission data packets destined for the first data receiver.

Telegram splitting transmission method for bidirectional networks

A data transmitter is provided, having: a generator for generating transmission data packets, configured to split a first data packet into at least three transmission data packets, each of the transmission packets being shorter than the first data packet, the generator being configured to channel-encode the at least three transmission packets such that only a portion thereof is required for decoding the first data packet; a transmission element for transmitting data packets, configured to transmit the at least three transmission packets in a frequency channel via a communications channel with a time gap; a monitor element for monitoring the frequency channel, configured to recognize an interference or transmission of a further data transmitter in the frequency channel; the transmission element being configured not to transmit via the communications channel a packet, waiting for transmission, of the at least three transmission packets if an interference or transmission from a further data transmitter is recognized by the monitor element at the time of transmitting the transmission data packet.

Communication control method, user terminal, and communication apparatus

A communication control method comprises transmitting, by a user terminal to a base station, a message including information, where the information indicates a frequency used for receiving a discovery signal from another user terminal in a discovery procedure for discovering a proximal terminal. The communication control method further comprises notifying, by the user terminal, the base station of a resource used in the discovery procedure and included in system information of a cell different from a serving cell of the user terminal.

SYSTEM AND METHOD FOR REDUCING BANDWIDTH USAGE OF A NETWORK

A method of reducing the bandwidth usage of a network comprises intercepting traffic between a TCP server and a TCP client using TCP protocols that use client acknowledgements; identifying client acknowledgements from the TCP protocols; identifying the sequence number of a last received client acknowledgements from the intercepted traffic; identifying the sequence number of a last sent client acknowledgement from the intercepted traffic; calculating an unacknowledged byte value based on the difference between the last received client acknowledgement sequence number and the last sent client acknowledgement sequence number; comparing the calculated unacknowledged byte value with a predetermined threshold value, to determine whether the calculated unacknowledged byte value is at least as great as the predetermined threshold value; and transmitting the identified client acknowledgements into the network when the compared unacknowledged byte value is at least as great as the predetermined threshold value.

Transmission control protocol proxy in long term evolution radio access network

A system, a method, a device, and a computer program product for transmission of data packets between a user device and a server. A transmission control protocol proxy component for establishing a communication link between the user device and the server in accordance with a transmission control protocol for transmission of a data packet between the user device and the server is provided. The data packet is transmitted utilizing the transmission control protocol.

PACKET CLASSIFICATION USING MULTI-DIMENSIONAL SPLITTING

A computer-implemented method classifies a packet received from a network. The method comprises receiving the packet having header information and a rule-set that indicates a plurality of actions to perform on the packet. A geometric representation of the rule-set is constructed having a plurality of dimensions and rule boundaries. At least one rule boundary and dimension of the geometric representation is split to form a search structure having a plurality of nodes. Each node in the plurality of nodes is constrained to a predetermined memory threshold. The search structure is searched using the header information to obtain a rule in the rule-set that indicates an action to take on the packet.