Patent classifications
H04L47/193
Memory allocator for I/O operations
Some embodiments provide a novel method for sharing data between user-space processes and kernel-space processes without copying the data. The method dedicates, by a driver of a network interface controller (NIC), a memory address space for a user-space process. The method allocates a virtual region of the memory address space for zero-copy operations. The method maps the virtual region to a memory address space of the kernel. The method allows access to the virtual region by both the user-space process and a kernel-space process.
AUTOMATIC LINK SECURITY
Systems, methods, and computer-readable storage media for automatic link security. A cloud controller can receive a signal indicating that an unauthenticated device is requesting private network resources, establish a connection between the unauthenticated device and the cloud controller, and determine that the unauthenticated device is associated with a private network. The cloud controller can facilitate the negotiation of security material between the device and the network and automatically establish a secure link between the device and the private network. The cloud controller can cause the security material to be sent to the device and can transmit a policy instruction that is effective to cause a switch port to automatically bypass a default access policy and automatically adopt a trusted policy for device to access the private network.
METHOD AND APPARATUS FOR MANAGING OVER-THE-TOP VIDEO RATE
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, including monitoring network traffic to determine a transmission control protocol traffic pattern, determining a target video rate from the transmission control protocol traffic pattern, and modifying an over-the-top video delivery service network according to the target video rate. Other embodiments are disclosed.
METHOD AND APPARATUS FOR MANAGING OVER-THE-TOP VIDEO RATE
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, including monitoring network traffic to determine a transmission control protocol traffic pattern, determining a target video rate from the transmission control protocol traffic pattern, and modifying an over-the-top video delivery service network according to the target video rate. Other embodiments are disclosed.
Traffic scheduling method, device, and system
A traffic scheduling method includes determining, by a first network device, first traffic scheduling information and a transmission path of a first data stream based on a first talker attribute message received from a talker device and a listener attribute message received from a listener device, and then sending, by the first network device, a first traffic scheduling message to a network device on the transmission path. The first traffic scheduling message includes the first traffic scheduling information. The first traffic scheduling information indicates the network device on the transmission path to generate a gate control list. The gate control list indicates the network device on the transmission path to control, based on the gate control list, a state of a port used to transmit the first data stream.
Traffic scheduling method, device, and system
A traffic scheduling method includes determining, by a first network device, first traffic scheduling information and a transmission path of a first data stream based on a first talker attribute message received from a talker device and a listener attribute message received from a listener device, and then sending, by the first network device, a first traffic scheduling message to a network device on the transmission path. The first traffic scheduling message includes the first traffic scheduling information. The first traffic scheduling information indicates the network device on the transmission path to generate a gate control list. The gate control list indicates the network device on the transmission path to control, based on the gate control list, a state of a port used to transmit the first data stream.
Congestion control
In an embodiment, header information of messages is altered to specify a window within which to receive information, so that the messages sent by a remote device will be sent at a rate that a network can receive messages. The sending of acknowledgements of messages are paced to control window growth. Bandwidth is allocated to a plurality of flows such that the satisfied flows require less bandwidth than an amount of bandwidth allocated to each unsatisfied flow.
Congestion control
In an embodiment, header information of messages is altered to specify a window within which to receive information, so that the messages sent by a remote device will be sent at a rate that a network can receive messages. The sending of acknowledgements of messages are paced to control window growth. Bandwidth is allocated to a plurality of flows such that the satisfied flows require less bandwidth than an amount of bandwidth allocated to each unsatisfied flow.
Distributed resilient load-balancing for multipath transport protocols
Techniques are described for providing a distributed application load-balancing architecture that supports multipath transport protocol for client devices connecting to an application service. Rather than having client devices generate new network five-tuples for new subflows to the application servers, the techniques described herein include shifting the burden to the application servers to ensure that the new network five-tuples land in the same bucket in the consistent hashing table. The application servers may receive a hashing function utilized by the load balancers to generate the hash of the network five-tuple. By having the application servers generate the hashes, the load balancers are able to continue stateless, low-level processing of the packets to route them to the correct application servers. In this way, additional subflows can be opened for client devices according to a multipath transport protocol while ensuring that the subflows are routed to the correct application server.
SYSTEMS AND METHODS FOR MANAGING TRANSMISSION CONTROL PROTOCOL (TCP) ACKNOWLEDGEMENTS
A client device in a wireless network accesses a queue comprising Transmission Control Protocol Acknowledgement (TCP ACK) packets, at least some of which include packet descriptors, each with a flow identifier indicating a TCP flow associated with the packet, and a TCP ACK Generation Count. The device inspects a packet descriptor of a first TCP ACK packet, and identifies a first flow identifier and a first TCP ACK Generation Count. The device accesses entries in a data structure that each includes a first field and a second field respectively storing a flow identifier and a TCP ACK Generation Count. The device determines that a first entry in the data structure includes a flow identifier and a TCP ACK Generation Count matching the first flow identifier and the first TCP ACK Generation Count, respectively. In response to the determination, the device marks the first TCP ACK packet to be dropped.