H04L12/841

Minimizing number of synchs

Systems and methods are provided for synchronizing messages. The systems and methods include operations for: receiving, from a server by a client device, a set of synchronization data representing changes since a previous time the client device synchronized with the server; comparing, by the client device, the set of synchronization data to a local state of the synchronization data; identifying a difference between the set of synchronization data and the local state of the synchronization data; and transmitting, to the server by the client device, a request for content corresponding to the difference between the set of synchronization data and the local state of the synchronization data.

Resource allocation for reconfigurable processors

A system is described that has a node and runtime logic. The node has a plurality of processing elements operatively coupled by interconnects. The runtime logic is configured to receive target interconnect bandwidth, target interconnect latency, rated interconnect bandwidth and rated interconnect latency. The runtime logic responds by allocating to configuration files defined by the application graph: (1) processing elements in the plurality of processing elements, and (2) interconnects between the processing elements. The runtime logic further responds by executing the configuration files using the allocated processing elements and the allocated interconnects.

SYSTEM AND METHOD FOR USING REAL-TIME PACKET DATA TO DETECT AND MANAGE NETWORK ISSUES

A system and method is disclosed of extracting information from real-time network packet data to analyze connectivity data for client devices in a network. The method includes: detecting when client devices initiate a connectivity event; after detecting a connectivity event, waiting a period of time for the client device to either reach or fail to reach a network connected state; after waiting a period of time, recording connectivity event information; and sending the recorded connectivity event information to an analytics system for network incident and/or network congestion analysis.

PROBABILISTIC SERVICE LEVEL AGREEMENTS (SLA)

Regulating transmission of data packets between a first network and a second network over a datalink. Embodiments include determining a first plurality of token bucket rate (TBR) parameters, each TBR parameter corresponding to a one of a first plurality of packet drop precedence (DP) levels and one of a first plurality of timescales (TS). The determination of the first plurality of bucket rate parameters is based on a peak rate requirement, the data link capacity, and a nominal speed requirement associated with the data link. Embodiments also include determining a second plurality of TBR parameters based on the first plurality of TBR parameters and a guaranteed rate requirement, the second plurality comprising a further DP level than the first plurality. Embodiments also include regulating data packets sent between the first network and the second network via the data link based on the second plurality of TBR parameters.

Area efficient traffic generator
11196647 · 2021-12-07 · ·

A packet and inspection system for monitoring the performance of one or more flows on a packet network comprises a processor and memory coupled to each other and to a network bus. The memory stores instructions to be executed by the processor and data to be modified by the execution of the instructions. A processor-controlled arbiter is coupled with the processor and the network bus, and upon reception of a packet on the bus or prior to transmission of a packet on the bus for one of said flows, the arbiter requests execution by the processor of selected instructions stored in the memory by providing the processor with the address of the selected instructions in the memory. The memory provides the processor with data associated with the selected instructions, and the processor modifies the data upon execution of the selected instructions.

Method for reporting channel state information in wireless access system supporting unlicensed bands, and apparatus supporting same

A method for transmitting channel state information (CSI) by a user equipment in a wireless communication system is discussed. The method includes receiving a transmission burst; measuring the CSI based on the transmission burst; and transmitting the measured CSI, wherein the transmission burst is received in at least a first time resource and a second time resource, wherein the first time resource is configured as a first number of orthogonal frequency divisional multiplexing (OFDM) symbols, wherein the second time resource is configured as a second number of OFDM symbols, wherein the first number is smaller than the second number, and wherein the first time resource is considered to be an invalid time resource for the CSI.

PREEMPTIVE PACKET TRANSMISSION
20210377180 · 2021-12-02 ·

Disclosed herein is technology to reduce latency of frames through a network device supporting various priorities. In an implementation, a method comprises configuring one or more priorities with a preemptive right over other one or more of said plurality of priorities; receiving frames in a sequence, each of the frames having a frame priority comprising of one of said plurality of priorities; queuing the received frames in a predetermined order based on a frame arrival time and the frame priority; transmitting a current frame based on a current frame priority and current frame arrival time; stopping transmission of the current frame when a later frame in the sequence is received that has a later frame priority with preemptive right over the current frame priority; transmitting an invalid frame check sequence; transmitting the later frame; and restarting the transmission of the current frame after transmitting the later frame.

SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS

A method provides for receiving network traffic from a host having a host IP address and operating in a data center, and analyzing a malware tracker for IP addresses of hosts having been infected by a malware to yield an analysis. When the analysis indicates that the host IP address has been used to communicate with an external host infected by the malware to yield an indication, the method includes assigning a reputation score, based on the indication, to the host. The method can further include applying a conditional policy associated with using the host based on the reputation score. The reputation score can include a reduced reputation score from a previous reputation score for the host.

DATA MANAGEMENT IN AN EDGE NETWORK

Generally discussed herein are systems, devices, and methods for data management in a reverse content data network (rCDN). A component of the rCDN may include a memory to hold content received from a first sensor device of a plurality of sensor devices of the rCDN and first attributes that describe properties of the content. The component may include processing circuitry to receive second content from a second sensor device of the plurality of sensor devices, the second content including a plurality of second attributes that describe properties of the second content, and forward, in response to a determination, based on the first and second attributes, that there is insufficient space to store the second content on the memory, the second content to a node of the rCDN that is fewer hops away from a backend cloud than the component.

SYSTEM AND METHOD TO OPTIMIZE WORKFLOW
20210377177 · 2021-12-02 · ·

The present disclosure describes a system and method to reduce the overall time taken to complete distributed process workflows. Each workflow can include multiple actions that are completed by or at different client devices. The actions of a workflow can be dependent on prior actions in the workflow. For example, a second client device may not be able to complete a second action until a first client device completes a first action in the workflow. The system can predict time periods and the geolocations where client devices are most likely to complete an assigned action. Using the selected time periods and geolocations, the system can transmit notifications to the client devices when the action is most likely to be completed.