Patent classifications
H04L43/18
Network communication device and operating method for a network mapping table
A network communication device includes a plurality of ports, a memory, and a processor. The plurality of ports is configured to receive a packet. A memory is configured to store a first lookup table and a second lookup table. An entry of the first lookup table includes a flag field. An entry of the second lookup table includes an entry address of the first lookup table. The processor is coupled to the memory and the plurality of ports. The network communication device is configured to: analyze the packet by a software or hardware to obtain a source Media Access Control (MAC) address; obtain, according to the source MAC address of the packet, the entry of the first lookup table; read the flag field of the entry; and determine, according to the flag field, whether the entry is referred by the second lookup table.
Financial network
A network system that facilitates financial transactions. A software defined network may operate to provide a variety of trading related services to a variety of customers with a low latency. Core or processor affinity for routing processes may improve speeds of routing. Data capture through a shared memory space may allow for a variety of analytics without introducing unacceptable delay.
Financial network
A network system that facilitates financial transactions. A software defined network may operate to provide a variety of trading related services to a variety of customers with a low latency. Core or processor affinity for routing processes may improve speeds of routing. Data capture through a shared memory space may allow for a variety of analytics without introducing unacceptable delay.
Security surveillance system and security surveillance method
A security surveillance system for a mobile device with a wireless interface and a control unit that is connected to the wireless interface comprises a security controller that is coupled to the wireless interface and that inspects at least data traffic incoming via the wireless interface at the mobile device according to a number, i.e. one or more, of predefined data rules, wherein the security controller generates a warning signal if the data traffic violates one of the predefined data rules, and a warning indicator that is coupled to the security controller and that generates a warning indication based on the warning signal.
Security surveillance system and security surveillance method
A security surveillance system for a mobile device with a wireless interface and a control unit that is connected to the wireless interface comprises a security controller that is coupled to the wireless interface and that inspects at least data traffic incoming via the wireless interface at the mobile device according to a number, i.e. one or more, of predefined data rules, wherein the security controller generates a warning signal if the data traffic violates one of the predefined data rules, and a warning indicator that is coupled to the security controller and that generates a warning indication based on the warning signal.
Providing and Using Different Update Times for a Resource
Methods, systems, computer-readable media, and apparatuses are described for sending different update times corresponding to a same version of a resource. A computing device may provide a version of a resource in response to requests from a plurality of different devices, and may indicate different update times for the version of the resource. The different update times may be based on times associated with the requests from the plurality of different devices.
Routers and methods for traffic management
A router including a communication device, a first processor, and a second processor. The communication device is configured to receive a plurality of first packets of a connection and at least one second packet of the connection subsequent to the first packets The first processor, coupled to the communication device, and configured to analyze the first packets to determine at least part of a plurality of transport-layer parameters associated with the connection, receive a traffic control rule associated with the connection, and offload processing of the at least one second packet of the connection to a second processor after the at least part of the transport-layer parameters is determined. The second processor is configured to perform traffic control on the second packet according to the traffic control rule and the at least part of the transport-layer parameters.
Routers and methods for traffic management
A router including a communication device, a first processor, and a second processor. The communication device is configured to receive a plurality of first packets of a connection and at least one second packet of the connection subsequent to the first packets The first processor, coupled to the communication device, and configured to analyze the first packets to determine at least part of a plurality of transport-layer parameters associated with the connection, receive a traffic control rule associated with the connection, and offload processing of the at least one second packet of the connection to a second processor after the at least part of the transport-layer parameters is determined. The second processor is configured to perform traffic control on the second packet according to the traffic control rule and the at least part of the transport-layer parameters.
SYSTEM AND METHOD FOR EXTRACTING IDENTIFIERS FROM TRAFFIC OF AN UNKNOWN PROTOCOL
Systems and methods for extracting identifiers from traffic of an unknown protocol are provided herein. An example method can include receiving communication traffic transferred over a communication network in accordance with a communication network. A data item that matches a predefined pattern can be identified in the communication traffic, irrespective of the communication protocol. The identified data item can then be extracted from the communication traffic.
SYSTEM AND METHOD FOR EXTRACTING IDENTIFIERS FROM TRAFFIC OF AN UNKNOWN PROTOCOL
Systems and methods for extracting identifiers from traffic of an unknown protocol are provided herein. An example method can include receiving communication traffic transferred over a communication network in accordance with a communication network. A data item that matches a predefined pattern can be identified in the communication traffic, irrespective of the communication protocol. The identified data item can then be extracted from the communication traffic.