H04L12/835

HANDOVER METHOD WITH LINK FAILURE RECOVERY, WIRELESS DEVICE AND BASE STATION FOR IMPLEMENTING SUCH METHOD
20210337429 · 2021-10-28 ·

For each target cell determined by a handover decision process, a first message is transmitted from a source base station (20S) to a target base station (20T) servicing that target cell. The first message includes an identifier of a wireless device (10) having a communication link with the source base station and information for obtaining authentication data for this wireless device. The authentication data depends on a secret key available to the wireless device and the source base station and on an identity of the target cell. Upon failure of the communication link, a cell is selected at the wireless device, which transmits to that cell a reestablishment request message including its identifier and authentication data depending on the secret key and on an identity of the selected cell. If the selected cell is a target cell serviced by a target base station that received a first message, conformity of the authentication data included in the reestablishment request message with the authentication data obtained from this first message is verified to authorize transfer of the communication link to the selected cell.

Methods and apparatus for memory allocation and reallocation in networking stack infrastructures

Methods and apparatus for memory allocation and reallocation in networking stack infrastructures. Unlike prior art monolithic networking stacks, the exemplary networking stack architecture described hereinafter includes various components that span multiple domains (both in-kernel, and non-kernel). For example, unlike traditional “socket” based communication, disclosed embodiments can transfer data directly between the kernel and user space domains. A user space networking stack is disclosed that enables extensible, cross-platform-capable, user space control of the networking protocol stack functionality. The user space networking stack facilitates tighter integration between the protocol layers (including TLS) and the application or daemon. Exemplary systems can support multiple networking protocol stack instances (including an in-kernel traditional network stack). Due to this disclosed architecture, physical memory allocations (and deallocations) may be more flexibly implemented.

FLOW CONTROL OF TWO TCP STREAMS BETWEEN THREE NETWORK NODES
20210328938 · 2021-10-21 ·

A system for forwarding packets between a first endpoint and a second endpoint, comprising one or more processors; a first network interface for communication with the first endpoint and a second network interface for communication with the second endpoint; and non-transitory memory comprising instructions. The instructions cause the one or more processors to receive a first packet from the first endpoint comprising a first data payload; generate a second packet, comprising the first data payload and an indicator of remaining buffer capacity different from an actual buffer capacity of the system; transmit the second packet to the second endpoint; receive a third packet from the second endpoint comprising a second data payload; generate a fourth packet, comprising the second data payload and an indicator of remaining buffer capacity different from an actual buffer capacity of the system; and transmit the fourth packet to the first endpoint.

User equipment and media streaming network assistance node

A user equipment includes a wireless interface for communication with a cellular communication network. The user equipment is operative to receive, via the wireless interface, network assistance information for a media streaming session, and to transmit media streaming session related information to the cellular communication network.

Fast data center congestion response

There is included in one example a switch, including: an ingress port to receive data from a source host; a first egress port to send data to a destination host; a second egress port to send data to the source host; and a congestion notification generator (CNG) including: a congestion detector to compute bandwidth consumption of a flow associated with a packet received on the ingress port and assigned to the first egress port, and determine based on the computed bandwidth consumption that the flow is congested; a flow extractor to extract a flow identifier of the flow from the packet; a throttle calculator to calculate a quantitative flow throttle value for the flow; and a header builder to build a congestion notification packet to instruct the source host to throttle the flow.

Methods and apparatus for sharing and arbitration of host stack information with user space communication stacks

Methods and apparatus for efficient data transfer within a user space network stack. Unlike prior art monolithic networking stacks, the exemplary networking stack architecture described hereinafter includes various components that span multiple domains (both in-kernel, and non-kernel). For example, unlike traditional “socket” based communication, disclosed embodiments can transfer data directly between the kernel and user space domains. Direct transfer reduces the per-byte and per-packet costs relative to socket based communication. A user space networking stack is disclosed that enables extensible, cross-platform-capable, user space control of the networking protocol stack functionality. The user space networking stack facilitates tighter integration between the protocol layers (including TLS) and the application or daemon. Exemplary systems can support multiple networking protocol stack instances (including an in-kernel traditional network stack).

Distributed load balancer health management using data center network manager

The disclosed technology relates to a load balancing system. A load balancing system is configured to receive health monitoring metrics, at a controller, from a plurality of leaf switches. The load balancing system is further configured to determine, based on the health monitoring metrics, that a server has failed and modify a load balancing configuration for the network fabric. The load balancing system is further configured to transmit the load balancing configuration to each leaf switch in the network fabric and update the tables in each leaf switch to reflect an available server.

Network configuration method and device

A network configuration method includes determining an end-to-end latency upper bound of data traffic between two end nodes, determining an end-to-end latency constraint of the data traffic between the two end nodes, determining, based on the end-to-end latency upper bound and the end-to-end latency constraint, for a first network shaper, at least one configuration parameter that satisfies the end-to-end latency constraint, and configuring the first network shaper for the data traffic based on the at least one configuration parameter such that the traffic after being shaped by the shaper satisfies the network latency constraint.

Dynamically adjusting extent of MU-MIMO service based on buffer occupancy
11146987 · 2021-10-12 · ·

Methods and systems for controlling application of MU-MIMO service by a base station are provided. The disclosure provides for determining a base station's buffer occupancy and then, based on the determined buffer occupancy, setting a maximum limit on a quantity of UEs that the base station will concurrently provide with MU-MIMO service. For instance, a system could determine that the base station's buffer occupancy is at least predefined threshold high and, based at least on that determination, could increase the maximum limit. Or, the system could determine that the base station's buffer occupancy is at least predefined threshold low and, based at least on that determination, could decrease the maximum limit.

Protocol layer tunneling for a data processing system

The present disclosure advantageously provides a system and method for protocol layer tunneling for a data processing system. A system includes an interconnect, a request node coupled to the interconnect, and a home node coupled to the interconnect. The request node includes a request node processor, and the home node includes a home node processor. The request node processor is configured to send, to the home node, a sequence of dynamic requests, receive a sequence of retry requests associated with the sequence of dynamic requests, and send a sequence of static requests associated with the sequence of dynamic requests in response to receiving credit grants from the home node. The home node processor is configured to send the sequence of retry requests in response to receiving the sequence of dynamic requests, determine the credit grants, and send the credit grants.