Patent classifications
H04L69/30
Segmentation of PWS-message and associated area-information
A network node obtains (302) a message to be transmitted as a public warning system notification to multiple UEs, via one or more SIBs, and obtains (304) area information corresponding to the message. The area information indicates an area for which the message is relevant. The network node determines (306) how many SIBs are needed for transmitting the area information and segments (308) the message into a plurality of segments, based on how many SIBs are needed for transmitting the area information. The network node transmits (310) the message and the area information via SIBs, such that a segment of the message is included in each SIB and such that each portion of the area information included in a SIB is accompanied by a segment of the message. A UE receives the SIBs and assembles the message and area information, displaying the message if it is relevant.
Segmentation of PWS-Message and Associated Area-Information
A network node obtains a message to be transmitted as a public warning system notification to multiple UEs, via one or more SIBs, and obtains area information corresponding to the message. The area information indicates an area for which the message is relevant. The network node determines how many SIBs are needed for transmitting the area information and segments the message into a plurality of segments, based on how many SIBs are needed for transmitting the area information. The network node transmits the message and the area information via SIBs, such that a segment of the message is included in each SIB and such that each portion of the area information included in a SIB is accompanied by a segment of the message. A UE receives the SIBs and assembles the message and area information, displaying the message if it is relevant.
Kernel event triggers for content item security
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
Kernel event triggers for content item security
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
MULTI-TENANT OFFLOADED PROTOCOL PROCESSING FOR VIRTUAL ROUTERS
A message indicating an auxiliary task associated with traffic transmitted via a virtual router between a pair of isolated networks is received at an offloading device. A stack multiplexer at the offloading device selects a protocol stack instance to process the message. A result of the auxiliary task is obtained by the multiplexer from the selected protocol stack instance and transmitted to the virtual router, where it is used to transmit a packet between the isolated networks.
Thread over Internet Protocol
Techniques and devices for determining a preferred physical layer for communication by a node in a Thread network are described. The node transmits a first IPv6 over Low power Wireless Personal Area Networks, 6LoWPAN, frame to a neighbor node using a first physical layer and transmits the first 6LoWPAN frame to the neighbor node using a second physical layer. The node determines a first preference value for the neighbor node using the first physical layer and determines a second preference value for the neighbor node using the second physical layer. The node compares the first preference value and the second preference value to determine the preferred physical layer for communication and transmits a second 6LoWPAN frame to the neighbor node using the preferred physical layer.
Communication Device, Gateway Node and Methods for Preparing a Point-to-Point Session
A method performed by a first communication device, for preparing a point-to-point, Pt2Pt, session with a second communication device is provided. The first communication device receives (202) from the second communication device, information about one or more communication protocol stacks that are supported by the second communication device for use in the Pt2Pt session. The first communication device obtains (208) a first communication protocol stack that is compatible with at least one out of the one or more protocol stacks that are supported by the second communication device. The first communication protocol stack will be used in the Pt2Pt session with the second communication device. The first communication device then re-configures (209) the first communication device to use the first communication protocol stack in the Pt2Pt session, and sends (210) a message to the second communication device. The message comprises information about said compatible first communication protocol stack which is to be used in the Pt2Pt session.
METHOD AND SYSTEM FOR PROVIDING EFFICIENT RECEIVE NETWORK TRAFFIC DISTRIBUTION THAT BALANCES THE LOAD IN MULTI-CORE PROCESSOR SYSTEMS
Systems and methods for improved received network traffic distribution in a multi-core computing device are presented. A hardware classification engine of the computing device receives a data packet comprising a portion of a received network traffic data flow. Packet information from the data packet is identified. Based in part on the packet information, the classification engine determines whether a core of a multi-core processor subsystem is assigned to the data flow of which the packet is a part. In embodiments, this determination may be made based on one or more criteria, such as a work load of the core(s) of the processor subsystem, a priority level of the data flow, etc. Responsive to the determination that a core is not assigned to the data flow, a core of the multi-core processor is assigned to the data flow and the data packet is sent to the first core for processing.
Traffic distribution method, device, and system
The present invention relates to a traffic distribution method, apparatus, and system. The method includes: receiving a current packet sent by a first entity; acquiring layer 7 application information according to the current packet; if the layer 7 application information is acquired, matching the current packet with a layer 7 traffic distribution policy according to the layer 7 application information; and sending the current packet to a service server after the current packet matches the layer 7 traffic distribution policy. In this way, the present invention implements traffic distribution based on the layer 7 application information, enhances performance of a traffic distribution device, and reduces deployment costs of an operator.
TCP/IP-based communication system and associated methodology providing an enhanced transport layer protocol
A more secure TCP/IP protocol stack is provided having an enhanced transport layer. Encryption and decryption logic is arranged on the transmission side and on the reception side for processing a payload of a transport layer protocol, such as TCP or UDP. By employing this enhanced transport layer, a cryptograph process communication can be realized by dissolving various kinds of restrictions which a conventional IPsec or SSL possesses without affecting upper layer processing, and, at the same time, maintaining compatibility with the IP layer.