Patent classifications
H04L69/30
Optimizing stream-mode content cache
A hybrid modular appliance or electronic device allows a user to plug a number of snap-together component modules of different types into a base device, so that the resulting assembly performs a custom-designed functionality. With no attached component modules, the base device functions as a standalone consumer or office appliance. At least one component module has its functionality not supporting the functionality of the base device, thereby allowing the resulting assembly a hybrid device. Examples of the hybrid modular devices include a TV-Wi-Fi-router, and a TV-storage-DVR-Wi-Fi-router. A hybrid modular device can serve as a videoconference device, a music jukebox, or a home theater unit.
Method and system for core network support of access network protocols in multi-homed redundancy groups
In one embodiment, a method according to the present disclosure includes receiving a topology change advertisement at a remote core edge node and performing a network address information removal operation. The topology change advertisement is received from a core edge node that is in communication with an access network. The topology change advertisement indicates that a topology change has occurred in the access network. The network address information removal operation removes network address information stored by the remote core edge node. The network address information is used by the remote core edge node in participating in communications with the core edge node.
Method and system for core network support of access network protocols in multi-homed redundancy groups
In one embodiment, a method according to the present disclosure includes receiving a topology change advertisement at a remote core edge node and performing a network address information removal operation. The topology change advertisement is received from a core edge node that is in communication with an access network. The topology change advertisement indicates that a topology change has occurred in the access network. The network address information removal operation removes network address information stored by the remote core edge node. The network address information is used by the remote core edge node in participating in communications with the core edge node.
System and method for network protocol offloading in virtual networks
An embodiment method of network protocol offloading for a packet traveling along a path having a plurality of hops in a virtual network includes checking, for each of the plurality of hops, that a virtual receiver node is safe for network protocol offloading and, when safe, deferring a network protocol processing task, forwarding the packet to a next hop among the plurality of hops, executing the network protocol processing task at a first earliest hop along the path where the virtual receiver node is unsafe for network protocol offloading, and executing the network protocol processing task at a second earliest hop along the path where the virtual receiver node includes a physical network interface that is safe for network protocol offloading.
DATA TRANSMISSION METHOD AND APPARATUS FOR TERMINAL
Embodiments of the present invention disclose a data transmission method and apparatus for a terminal. The terminal exchanges data of an application with a server through a first port by using a first access node; when one port in a second port set is in an enabled state, the terminal accesses one access node in a candidate access node set through the enabled port in the second port set, and exchanges, based on the Multipath TCP, the data of the application with the server by using an access node corresponding to the enabled port.
Systems and methods for SSL session management in a cluster system
The present invention is directed towards systems and methods for managing one or more SSL sessions. A first node from a cluster of nodes intermediary between a client and a server may receive a first request from the client to use a first session established with the server. The first request may include a session identifier of the first session. The first node may determine that the first session is not identified in a cache of the first node. The first node may identify, via a hash table responsive to the determination, an owner node of the first session from the cluster using a key. The key may be determined based on the session identifier. The first node may send a second request to the identified owner node for session data of the first session. The session data may be for establishing a second session with the server.
EMPLOYING SESSION LEVEL RESTRICTIONS TO LIMIT ACCESS TO A REDIRECTED INTERFACE OF A COMPOSITE DEVICE
Session level restrictions can be implemented to limit access to a redirected interface of a composite device. These session level restrictions can be defined within a policy of a directory service, such as Active Directory, to facilitate the dynamic application of the restrictions to the appropriate remote sessions. In this way, access restrictions can be applied to individual interfaces of a redirected composite device so that a particular interface will only be accessible from specified remote sessions.
Background pre-loading and refreshing of applications with audio inhibition
A user device (24) includes a display (56), audio circuitry (58) and a processor (44). The processor is configured to run an application that includes visual content and audio content, by: (i) before a user of the user device invokes the application, running the application in a background mode in which the visual content is not visible on the display, and inhibiting the audio content from being played by the audio circuitry, and (ii) after the user invokes the application, switching to run the application in a foreground mode in which the visual content is visible on the display, and permitting the audio content to be played by the audio circuitry.
Heterogeneous multi-protocol stack method, apparatus, and system
A heterogeneous multi-protocol stack system including a plurality of heterogeneous protocol stack instances is described. Resource allocation between the protocol stack instances is unbalanced, and algorithms are independently configured, so that QoS capacities of different protocol stack instances are different. Data packets of applications or connections with different QoS requirements can be dispatched by a dispatcher to corresponding protocol stack instances at a high speed. When system resources are limited, the heterogeneous multi-protocol stack system is capable of simultaneously supporting classification optimization processing performed on data of a high-concurrency application, a high-throughput application, and a low-delay application, so as to meet QoS requirements of different types of applications, thereby improving user experience.
REDUCING MEMORY FOOTPRINT AFTER TLS CONNECTION ESTABLISHMENT
For connection establishment, a system allocates memory that will be occupied by the data and handshake sub-protocol infrastructure that facilitates establishing a TLS connection. After connection establishment, the system allocates memory space for the data and record sub-protocol infrastructure that facilitates the asynchronous communication of application traffic. The memory space for the TLS session (i.e., the communication information separate from the handshake) has a substantially smaller footprint than the memory space for the TLS handshake. The TLS handshake memory space can be released and recycled for other connections while application communications use the smaller memory space allocated and populated with the TLS session data and infrastructure.