Abstract:
A method for transferring data among communication devices. The method includes a first communication device receiving, from a second communication device, data to be transferred and a condition defining a range of data transfer. The first communication device then determines whether a third communication device satisfies the condition defining the range of data transfer. On condition that the first communication device determines that the third communication device satisfies the condition, the first communication device directly transfers the data and the condition to the third communication device.
Abstract:
Disclosed is a method for sharing in advance a multicast address in a wireless communication system. To this end, a method can comprise the steps of: selecting a multicast address; and transmitting a beacon frame comprising the selected multicast address. The beacon frame can comprise a search beacon frame and/or a synchronization beacon frame.
Abstract:
The present invention discloses a method, an apparatus, and a system for detecting connectivity. A node receives connectivity detection request information; determines, according to nicknames of target nodes, whether the is one of the target nodes; if the node is one of the target nodes, sends connectivity detection reply information to a source node; if the node is not one of the target nodes, performs corresponding processing according to a value of a hop count and whether the node is on a path that is in the multicast distribution tree and is from the source node to any one of the target nodes. With the present invention, a source node is capable of receiving only a feedback of a node on a true path, thereby making it easier to identify a path.
Abstract:
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are rejected. In addition to “hopping” of IP addresses and discriminator fields, hardware addresses such as Media Access Control addresses can be hopped. The hopped addresses are generated by random number generators having non-repeating sequence lengths that are easily determined a-priori, which can quickly jump ahead in sequence by an arbitrary number of random steps and which have the property that future random numbers are difficult to guess without knowing the random number generator's parameters. Synchronization techniques can be used to re-establish synchronization between sending and receiving nodes.
Abstract:
Provided are a method and device for aging remaining lifetime, the method includes that: the remaining lifetime of a data entity is acquired; the remaining lifetime is inserted into a time roulette; and the remaining lifetime is aged with rotation of the time roulette, thus solving the problem of low efficiency in aging the remaining lifetime and the aging of remaining lifetime being inaccurate as the number of data entities increases, due to application of a processing method of scanning the field of the remaining lifetime in the related art, and further improving the efficiency and accuracy in aging remaining lifetime.
Abstract:
Systems, methods, and non-transitory computer-readable storage media for a miscabling detection protocol. One or more switches can periodically send miscabling protocol (MCP) packets on non-fabric ports on all configured EPG VLANs. A first switch located at a network fabric receives a miscabling protocol (MCP) packet indicating an identity of an originating switch and a port number of an originating port of the MCP packet via a receiving port on the first switch, wherein the MCP packet is received from an external network connected to the receiving port, and wherein the originating switch and originating port are also located at the network fabric and connected to the external network. Based on the MCP packet, the first switch then detects a loop between the receiving port, the originating port, and the external network. Next, the first switch blocks the receiving port or the originating port in response to detecting the loop.
Abstract:
According to one exemplary embodiment, a method for obfuscating a traffic pattern associated with a plurality of network traffic within a tunnel connection is provided. The method may include detecting the tunnel connection. The method may also include analyzing a connection environment associated with the detected tunnel connection. The method may then include determining a packet handling technique based on the analyzed connection environment, whereby the packet handling technique provides a way for creating a noise packet that will be discarded by a network stack at a target node or before the target node. The method may include determining a noise strategy based on the determined packet handling technique. The method may also include sending a plurality of noise packets into the tunnel connection based on the determined noise strategy to obfuscate the traffic pattern.
Abstract:
An Application-Aware Automatic Network Selection (ANS) router and method for automatic network selection, translation of data between networks, and application-specific feedback. In one embodiment, the router and method select between an Internet Protocol (IP) network and a Delay Tolerant Networking (DTN) network, monitoring the state of both networks, intercepting IP packets which could otherwise not be delivered, responding to the application that sent the packet, and translating a group of such packets into a DTN bundle; the software implementing this system resides on a network router that functions as a node on both the IP and DTN networks. In other embodiments, the system and method select between or among mobile ad hoc networks, sensor networks, vehicular networks, and satellite and deep space networks.
Abstract:
An example method for routing a message in a dynamic service mesh includes receiving at a mesh point a first message from a sender service and determining, based on a routing table, whether the mesh point has previously received a second message from the sender service. When the mesh point is determined to not have received the second message from the sender service, the first message is routed to a target service in the dynamic service mesh. The method includes receiving an indication of whether the first message has been accepted by the target service and updating the routing table based on the indication. When the indication indicates that the first message has been rejected by the target service, the first message is routed from the mesh point to a second target service.
Abstract:
A network switch includes a plurality of ports, a parser coupled to the plurality of ports, and a processor coupled to the ports and configured to process a received packet via one of the ports. The received packet includes a first header field, a second header field, and a destination header field, each of the first, second, and destination header fields including a TTL field. The parser is configured to decide a valid bit for each of the first header field, the second header field and the destination header field, based on an availability for each of the first header field, the second header field and the destination header field. The processor is configured to execute an instruction to cause content of a select one of the first or second header field's TTL field to be copied to the destination header field.