H04L12/835

Data writing method, system, device and computer-readable storage medium

Embodiments of the present application provide techniques for writing data into a buffer of a protocol stack. The disclosed techniques include determining whether to-be-transmitted data are detected; acquiring a stream control parameter from the protocol stack of a computing device in response to a determination that the to-be transmitted data are detected; and determining whether the to-be-transmitted data are able to be written into the buffer of the protocol stack based on the stream control parameter and a predetermined threshold value, wherein the stream control parameter is associated with a capability of receiving data by a data receiving terminal, and the predetermined threshold value is a predetermined ratio of a size value of an empty area of the buffer of the protocol stack to the stream control parameter.

Methods and apparatus for regulating networking traffic in bursty system conditions

Methods and apparatus for efficient data transfer within a user space network stack. Unlike prior art monolithic networking stacks, the exemplary networking stack architecture described hereinafter includes various components that span multiple domains (both in-kernel, and non-kernel). For example, unlike traditional “socket” based communication, disclosed embodiments can transfer data directly between the kernel and user space domains. Direct transfer reduces the per-byte and per-packet costs relative to socket based communication. A user space networking stack is disclosed that enables extensible, cross-platform-capable, user space control of the networking protocol stack functionality. The user space networking stack facilitates tighter integration between the protocol layers (including TLS) and the application or daemon. Exemplary systems can support multiple networking protocol stack instances (including an in-kernel traditional network stack).

Methods and apparatus for dynamic packet pool configuration in networking stack infrastructures

Methods and apparatus for dynamic packet pool configuration in networking stack architectures. Unlike prior art monolithic memory allocations, embodiments of the present disclosure enable packet pools associated with non-kernel space applications to dynamically allocate additional memory allocations to a given non-kernel space application, or conversely, de-allocate memory allocations to a given non-kernel space application. Variants also disclose the splitting up of a memory allocation into device accessible portions and kernel accessible portions. Other variants disclose sizing certain segment allocations so as to be a multiple of a physical address page size. Such a variant enables a single input/output (I/O) bus address lookup for the given segment so as to minimize look up costs associated with an I/O lookup for the given segment.

LAYERED MULTICAST AND FAIR BANDWIDTH ALLOCATION AND PACKET PRIORITIZATION
20210281895 · 2021-09-09 ·

Embodiments include an overlay multicast network. The overlay multicast network may provide a set of features to ensure reliable and timely arrival of multicast data. The embodiments include a congestion control system that may prioritize designated layers of data within a data stream over other layers of the same data stream. Each data stream transmitted over the network may be given an equal share of the bandwidth. Addressing in routing tables maintained by routers may utilize summarized addressing based on the difference in location of the router and destination address. Summarization levels may be adjusted to minimize travel distances for packets in the network. Data from high priority data stream layers may also be retransmitted upon request from a destination machine to ensure reliable delivery of data.

Method and apparatus for transmitting control message in software defined network-based mobile communication system
11109265 · 2021-08-31 · ·

The present invention relates to a method for transmitting a control message by a control entity in a software defined network-based mobile communication system, the method comprising the steps of: detecting the occurrence of at least one event associated with at least one terminal; buffering the at least one event until a predetermined condition is satisfied; and transmitting, to a switching entity, a control message corresponding to the at least one buffered event when the predetermined condition is satisfied. However, the present invention is not limited to the above embodiment, and other embodiments are possible.

Communication control device, switching device, out-of vehicle communication device, communication control method and communication control program

A communication control device used in an on-vehicle communication system including an out-of-vehicle communication device being one of a plurality of function units provided in a vehicle and being capable of communicating with an external device outside the vehicle, and a switching device being capable of relaying communication data from one of the function units to another one of the function units, comprises: an acquisition unit that acquires status information indicating a status of a queue for storing in the switching device at least communication data from the out-of-vehicle communication device; and a control unit that determines restriction of transmission of communication data from the external device to the out-of-vehicle communication device based on the status information acquired by the acquisition unit.

Handover method with link failure recovery, a wireless device and a base station for implementing such method
11089509 · 2021-08-10 · ·

For each target cell determined by a handover decision process, a first message is transmitted from a source base station (20S) to a target base station (20T) servicing that target cell. The first message includes an identifier of a wireless device (10) having a communication link with the source base station and information for obtaining authentication data for this wireless device. The authentication data depends on a secret key available to the wireless device and the source base station and on an identity of the target cell. Upon failure of the communication link, a cell is selected at the wireless device, which transmits to that cell a reestablishment request message including its identifier and authentication data depending on the secret key and on an identity of the selected cell. If the selected cell is a target cell serviced by a target base station that received a first message, conformity of the authentication data included in the reestablishment request message with the authentication data obtained from this first message is verified to authorize transfer of the communication link to the selected cell.

Exporting real time network traffic latency and buffer occupancy

Techniques are presented herein to facilitate the monitoring of occupancy of a buffer in a network device. Packets are received at a network device. Information is captured describing occupancy of the buffer caused by packet flow through the buffer in the network device. Analytics packets are generated containing the information. The analytics packets from the network device for retrieval of the information contained therein for analysis, replay of buffer occupancy, etc.

Use of mapping options for logical channels and transport channels for wireless networks

There is provided a method comprising receiving, at a user device, control information usable for determining whether at least one uplink logical channel is to be transmitted using at least one of a first uplink transport channel and a second uplink transport channel, determining, in dependence on said information, a mapping between the at least one uplink logical channel and at least one of the first uplink transport channel and second uplink transport channel and causing the at least one uplink logical channel to be transmitted using the at least one uplink transport channel to which the at least one uplink logical channel is mapped.

Methods and apparatus for virtualized hardware optimizations for user space networking

Methods and apparatus for efficient data transfer within a user space network stack. Unlike prior art monolithic networking stacks, the exemplary networking stack architecture described hereinafter includes various components that span multiple domains (both in-kernel, and non-kernel). For example, unlike traditional “socket” based communication, disclosed embodiments can transfer data directly between the kernel and user space domains. Direct transfer reduces the per-byte and per-packet costs relative to socket based communication. A user space networking stack is disclosed that enables extensible, cross-platform-capable, user space control of the networking protocol stack functionality. The user space networking stack facilitates tighter integration between the protocol layers (including TLS) and the application or daemon. Exemplary systems can support multiple networking protocol stack instances (including an in-kernel traditional network stack).