H04L12/861

Switching of a transmit queue associated with a virtual machine
09742707 · 2017-08-22 · ·

Methods and systems for managing multiple transmit queues of a networking device of a host machine in a virtual machine system. The networking device includes multiple transmit queues that are used by multiple guests of the virtual machine system for the transmission of packets in a data communication. A hypervisor of the virtual machine system manages the switching from one or more transmit queues (i.e., old transmit queues) to one or more other queues (i.e., new transmit queues) by managing a flow of packets in the virtual machine system to maintain a proper sequence of packets and avoid a need to re-order the transmitted packets at a destination.

Method of data retransmission in collaborative service transmission and access network gateway thereof

The present invention discloses a method of data retransmission in coordination service transmission and access network gateway thereof. Wherein, the method includes: in coordination service transmission, access network gateway receives the service data requested by the coordination terminal, caches the data and transmits it to the corresponding destination terminal; the access network gateway executes retransmission strategy, and when decides data retransmission is needed, retransmits the cached data to the corresponding destination terminal. The access network gateway is used to receive the service data requested by the coordination terminal, to cache the data and transmit it to the corresponding destination terminal, to retransmit the cached data to the corresponding destination terminal when data retransmission is needed. Using the present invention, to the problem of service data retransmission in coordination service transmission, the service data transmission efficiency is effectively improved.

Method for setting capacity of buffer
09742706 · 2017-08-22 · ·

The present invention is directed to method for setting capacity of a buffer, the method including an initializing step of initializing a plurality of sub-buffers forming a main buffer, a comparison data reception step of receiving a storage frequency and a remaining capacity from the plurality of sub-buffers and comparing the storage frequency with the remaining capacity, a data comparison step of determining whether a current storage frequency of the plurality of sub-buffers and a past storage frequency are equal, a set capacity calculation step of calculating an allocation capacity of the plurality of sub-buffers, and a capacity re-setting step of re-setting the capacity of the plurality of sub-buffers using the calculated allocation capacity.

Hybrid tag matching

A method for communication includes posting, by a software process, a set of buffers in a memory of a host processor and creating in the memory a list of labels associated respectively with the buffers. The software process pushes a first part of the list to a network interface controller (NIC), while retaining a second part of the list in the memory under control of the software process. Upon receiving a message containing a label, sent over a network, the NIC compares the label to the labels in the first part of the list and, upon finding a match to the label, writes data conveyed by the message to a buffer in the memory. Upon a failure to find the match in the first part of the list, the NIC passes the message from the NIC to the software process for handling using the second part of the list.

Rate limiter for a message gateway

A hardware-implemented rate limiter is described. This implementation guarantees that messages containing a value v are not forwarded at a higher rate than a predefined threshold value r. More specifically, given a number of times x in a time interval y, which specifies a rate r defined by x/y, the rate limiter reports a violation by selectively setting an error value when v occurs more than x times during the time interval y. Moreover, the rate limiter may be able to keep track of multiple predefined threshold values for different rates. Furthermore, the rate limiter may keep track of 2.sup.b different values v, where b is the number of digits of the binary representation of v.

Method and system for storing packets for a bonded communication links

Method and system for storing packets received from a bonded communication links according to latency of the communication link that has the largest latency among all communication links of the bonded communication links. Embodiments of present inventions can be applied to bonded communication links, including wireless connection, Ethernet connection, Internet Protocol connection, asynchronous transfer mode, virtual private network, WiFi, high-speed downlink packet access, GPRS, LTE, and X.25. The present invention presents methods comprising the steps of estimating storage size of a queue, wherein the queue is for storage the one or more packets received from the bonded communication links. The storage size is based on one or more factors, including largest latency, bandwidth of each of the plurality of communication links, and allowed time duration of packet storage

Multi-function, multi-protocol FIFO for high-speed communication

Systems and methods are disclosed for buffering data using a multi-function, multi-protocol first-in-first-out (FIFO) circuit. For example, a data buffering apparatus is provided that includes a mode selection input and a FIFO circuit that is operative to buffer a data signal between a FIFO circuit input and a FIFO circuit output, wherein the FIFO circuit is configured in an operating mode responsive to the mode selection signal.

BUFFER ALLOCATION AND USE FOR PACKET CLONING AND MANGLING
20170230311 · 2017-08-10 ·

A method of cloning and mangling a received data packet in which an unused space of a receiving buffer can be used to accommodate at least some generated clone packets. Additional memory-use efficiencies can be realized by employing scatter-gather lists in the process of clone-packet generation when the size of the received data packet exceeds a predetermined threshold size. The method enables the corresponding network device to improve the packet-processing speed and memory use compared to those achievable with the use of conventional methods.

Proxy schemes for voice-over-LTE calls
09729474 · 2017-08-08 · ·

A method includes, in a wireless data network, monitoring communication conditions at an intermediate location between a wireless communication terminal and a network element that provides voice-call services over the network to the wireless communication terminal. Upon detecting that the communication conditions are expected to cause the wireless communication terminal to send a notification to the network element, an early notification is sent to the network element on behalf of the terminal. Another method includes detecting a notification in which a terminal notifies a network element of degraded reception performance. A modification, which the network element is expected to perform in a transmission characteristic to the terminal in response to the notification, is predicted. In-flight communication traffic, which is en-route to the terminal and whose transmission characteristic is not yet modified in response to the notification, is intercepted. The predicted modification is applied to the in-flight communication traffic.

METHOD, SERVER AND BASEBOARD MANAGEMENT CONTROLLER FOR INTERRUPTING A PACKET STORM
20170222955 · 2017-08-03 ·

A method for interrupting a packet storm in a server is implemented by a baseboard management controller (BMC) included in the server and includes the steps of: assigning a setting value included in firmware of the BMC to a first value so as to enable receipt of specific packets from a network, the specific packets being transmitted using a specific routing scheme; determining whether a packet storm has occurred according to a number of the specific packets that are received; and assigning the setting value to a second value so as to disable receipt of the specific packets when it is determined that the packet storm has occurred.