Patent classifications
H04L43/02
ROUND-TRIP PACKET LOSS MEASUREMENT IN A PACKET-SWITCHED COMMUNICATION NETWORK
In a method for exchanging packets between first and second nodes of a packet-switched network, each packet comprises two fields settable to an idle value or measurement value. The first node transmits to the second node first packets having a filed set to measurement value. Upon reception of each first packet, the second node transmits back to the first node a second packet having a field set to measurement value. Upon reception of each second packet, the first node transmits to the second node a third packet having another field set to measurement value. A packet loss measurement is calculated as a difference between the number of first packets and the number of third packets.
ROUND-TRIP PACKET LOSS MEASUREMENT IN A PACKET-SWITCHED COMMUNICATION NETWORK
In a method for exchanging packets between first and second nodes of a packet-switched network, each packet comprises two fields settable to an idle value or measurement value. The first node transmits to the second node first packets having a filed set to measurement value. Upon reception of each first packet, the second node transmits back to the first node a second packet having a field set to measurement value. Upon reception of each second packet, the first node transmits to the second node a third packet having another field set to measurement value. A packet loss measurement is calculated as a difference between the number of first packets and the number of third packets.
Verifying media stream quality for multiparty video conferences
Embodiments are directed to verifying media stream quality for multiparty video conferences. A verification video may be generated based on verification goals for a video provided by a video service. A marker may be embedded in the verification video. A video conference may be established using video stations such that the video conference may be provided by a video service. The verification video may be streamed to a video input of each video station. The video may be streamed to a video output buffer of each video station such that the video provides a view of the video conference and such that the marker that corresponds to each video station may be included in the video. Video information may be captured from the video output buffer of the video stations. The video service may be classified based on the video information from each video station.
Measuring metrics of a computer network
A method of measuring (100) metrics of a computer network, comprising the steps of: —from a data source collecting (110) sets of data points during a sampling time period, wherein the set of data points constitute a sample, and uploading (120) each sample to a server for further processing (130), wherein from each sample, a tractile information instance is produced (131), wherein the tractile information has a type and each data source is associated (110a) with a fractile information type.
Measuring metrics of a computer network
A method of measuring (100) metrics of a computer network, comprising the steps of: —from a data source collecting (110) sets of data points during a sampling time period, wherein the set of data points constitute a sample, and uploading (120) each sample to a server for further processing (130), wherein from each sample, a tractile information instance is produced (131), wherein the tractile information has a type and each data source is associated (110a) with a fractile information type.
System, security and network management using self-organizing communication orbits in distributed networks
A method is provided of managing a non-static collection of machines. A first client machine runs a first communication protocol. The non-static collection of machines includes a first linear communication orbit, the first linear communication orbit comprising a sequence of machines that run the first communication protocol, and a second linear communication orbit, the second linear communication orbit comprising a sequence of machines that run a second communication protocol distinct from the first communication protocol. The first client machine receives an instruction from a server to install the second communication protocol, installs the second communication protocol, and then submits a registration request to the server. The first client machine receives, from the server, contact information of a list of potential neighbors. The first client machine then, proactively constructs and maintains a respective local segment of the second linear communication orbit.
System, security and network management using self-organizing communication orbits in distributed networks
A method is provided of managing a non-static collection of machines. A first client machine runs a first communication protocol. The non-static collection of machines includes a first linear communication orbit, the first linear communication orbit comprising a sequence of machines that run the first communication protocol, and a second linear communication orbit, the second linear communication orbit comprising a sequence of machines that run a second communication protocol distinct from the first communication protocol. The first client machine receives an instruction from a server to install the second communication protocol, installs the second communication protocol, and then submits a registration request to the server. The first client machine receives, from the server, contact information of a list of potential neighbors. The first client machine then, proactively constructs and maintains a respective local segment of the second linear communication orbit.
PERFORMACE MEASUREMENT BY A USER COMMUNICATION DEVICE
It is disclosed a performance measurement application for a user communication device. The device runs at least one user application which exchanges at least one packet flow with a packet-switched communication network. When executed, the performance measurement application receives from an owner of the user communication device a request for performing a performance measurement. In response to such request, the performance measurement application activates a marking functionality comprising marking upstream packets of the packet flow to be measured and inducing the network node originating the downstream packets of the packet flow to be measured to mark them. The performance measurement application then provides performance parameter(s) relating to the marked upstream packets as transmitted and/or the marked downstream packets as received and, based on such parameter(s), provides a performance measurement. The measurement results are then shared with a measurement management server.
Network traffic monitoring or storage using a signed uniform resource locator
A network monitoring device may receive flow-tap information that identifies a traffic flow characteristic and a signed URL associated with a signed URL platform from a mediation device. The network device may map the traffic flow characteristic to the signed URL in an entry of a flow-tap filter that is maintained within a data structure of the network device. The network device may analyze, using the flow-tap filter, network traffic of the network to detect a traffic flow that is associated with the traffic flow characteristic. The network device may generate, based on detecting the traffic flow in the network traffic, a traffic flow copy that is associated with the traffic flow. The network device may provide, based on the signed URL, the traffic flow copy to the signed URL platform, wherein the traffic flow copy is to be accessible to an authorized user device via the signed URL.
In situ triggered function as a service within a service mesh
The present technology is directed to a system and method for automatic triggering of relevant code segments corresponding to a sequence of code segments or function codes having a preferred execution order. The automatic triggering action is based on the snooping of a response generated from an execution of a previous code segment. Information with respect to the next code segment in the preferred execution order may be obtained by directing a network proxy, such as Envoy to snoop the Uniform Resource Identifier (URI) field of a response packet being forwarded to a client entity. In this way, a network proxy may preemptively spawn and instantiate the following function codes (pointed to by the snooped Uniform Resource Identifier) prior to receiving the corresponding client request. As such, by the time a client request for the subsequent function code is received the code ready for execution.