H04L12/819

Multiplexing and congestion control
10447544 · 2019-10-15 · ·

Methods, systems and devices for network congestion control exploit the inherent burstiness of network traffic, using a wave-based characterization of network traffic and corresponding multiplexing methods and approaches.

Redistribution policy engine

Approaches, techniques, and mechanisms are disclosed for assigning paths to network packets. The path assignment techniques utilize path state information and/or other criteria to determine whether to route a packet along a primary candidate path selected for the packet, or one or more alternative candidate paths selected for the packet. According to an embodiment, network traffic is at least partially balanced by redistributing only a portion of the traffic that would have been assigned to a given primary path. Move-eligibility criteria are applied to traffic to determine whether a given packet is eligible for reassignment from a primary path to an alternative path. The move-eligibility criteria determine which portion of the network traffic to move and which portion to allow to proceed as normal. In an embodiment, the criteria and functions used to determine whether a packet is redistributable are adjusted over time based on path state information.

Link state determination method, apparatus and computer storage medium

Disclosed in present invention is a link state control method. The method includes: within a setting time window, determining the reset fixed code word of a received data stream; according to the situation that each cell corresponding to the data stream is received correctly or incorrectly, determining the leaky bucket value of a link in real time; according to the determined reset fixed code word and the determined leaky bucket value, determining the state of the link. Moreover, the present invention also discloses a link state control apparatus and computer storage medium.

SYSTEM AND METHOD FOR STREAMING DATA
20190292895 · 2019-09-26 ·

A system and method to conform data flow are provided. The system includes a queue configured to receive at least one data stream, and a processor configured to convert the at least one data stream to a continuous data stream, and output the continuous data stream at a constant rate.

COMMUNICATIONS METHODS, SYSTEMS AND APPARATUS FOR PROTECTING AGAINST DENIAL OF SERVICE ATTACKS AND EFFICIENT ALLOCATION OF BANDWIDTH
20190281021 · 2019-09-12 ·

The present invention relates to methods, systems and apparatus for providing efficient packet flow fillrate adjustments and providing protection against distributed denial of service attacks. One exemplary embodiment in accordance with the invention is a method of operating a communication system including the steps of receiving, at a session border controller, a first SIP invite request message; making a decision, at the session border controller, as to whether the first SIP invite request originated from an Integrated Access Device or an IP-PBX device; generating, at the SBC, a packet flow fillrate based on said decision as to whether the SIP invite request originated at an Integrated Access Device or an Internet Protocol-Private Branch Exchange (IP-PBX) device.

Data transfer

A data transfer method and system includes at least one switch device (102) configured, in use, to transfer data, directly or indirectly, between a plurality of computing devices (104). The at least one switch device is configured to provide a plurality of Virtual Local Area Networks (VLAN), each said VLAN being configured as a Virtual Channel (VC) by receiving data from a said computing device designated as a sole source of data over the VC. The VC data is transmitted from the sole source computing device as Ethernet frames (200) tagged with a VLAN tag (202). The VCs are routed through the at least one switch device according to a VLAN Id field of the VLAN tag of a said frame, with fixed and pre-determined routing of the frame being determined by configuration of the at least one switch device.

Transmission apparatus and transmission processing method
10404602 · 2019-09-03 · ·

There is provided a transmission apparatus including at least one memory in which a first data including a first destination information and a second data including a second destination information are stored, and at least one processor coupled to the at least one memory and the at least one processor configured to control the at least one memory to output the first data and the second data stored in the at least one memory according to a set rate, and control the set rate to output one of the first data and the second data according to a priority degree.

NETWORK TRAFFIC FLOW LOGGING IN DISTRIBUTED COMPUTING SYSTEMS
20190268270 · 2019-08-29 ·

In various embodiments, methods and systems for implementing network traffic flow logging in a distributed computing system are provided. At a high level, the network traffic flow logger is implemented using a network traffic flow logger framework that includes a plurality of modular network traffic flow logging objects for adjustable processing of network flow events. In operation, a plurality of tokens is counted at a first throttling rate. The first throttling rate is associated with a maximum number of tokens threshold. The maximum number of tokens threshold is an adjustable threshold. A flow event is accessed, where flow events are quantified based on tokens. The flow event is queued, based on a count of the plurality of tokens or the maximum number of tokens threshold. Based on queueing the flow event, the first throttling rate is adjusted to a second throttling rate based on a queue length of the queue.

Forwarding tables for virtual networking devices
10374878 · 2019-08-06 · ·

Systems, methods, and non-transitory computer-readable storage media for forwarding tables for virtual networking devices. The system first identifies local virtual machines hosted on a local host connected to the system, the system having virtual tunneling capabilities. The system then generates a forwarding table for the system. Next, the system populates the forwarding table with local entries including bindings for the local virtual machines hosted on the local host and adds a default route in the forwarding table pointing to a default forwarder function, wherein the default route is configured to handle all non-local traffic relative to the system and the local host.

ALERT THROTTLING

In one embodiment, methods, systems, and apparatus are described in which data to be used by a processor is stored in a memory. Network communications with a data center are enabled via a network interface. The processor maintains a reporting policy for reporting anomalous events to the data center, the reporting policy having at least one rule for determining a reporting action to be taken by the processor in response to an anomalous event. The processor further monitors the IoT device for a report of an occurrence of the anomalous event. The processor performs the reporting action according to the at least one rule, in response to the report of the occurrence of the anomalous event. An episodic update to the reporting policy from the data center may be received at the processor, which modifies the reporting policy in accordance with the update. Related methods, systems, and apparatus are also described.