摘要:
Sharing a resource may include the use of label values associated with information units presented to the resource. The label values may be determined based on, for example, arrival rates and/or committed flow rates. Criteria may be applied to label values to determine if the associated information units may be dropped.
摘要:
The invention enables the use of TCP protocol for reliable transport of data over a wireless network, resolving the problems associated with frequent packet loss. Additional benefits include delivery of significant performance improvement, bandwidth saving and backward compatibility compared to the wire-line TCP protocol, and contribution to power savings in wireless handsets and devices. To make the retransmission process more granular, transport layer segments are subdivided into sub-segments. The invention utilizes a split TCP based approach and produces a series of smaller-sized segments that share the same transport layer header. A NACK-based message exchange, a new header format and a special windowing protocol are used to achieve reliability, flow-control, and efficient buffer handling.
摘要:
Methods and apparatus provide for allocating bandwidth in a resilient packet ring (RPR), including: determining a relationship between an arrival rate A(n) as a function of a fairness rate Fk(n) of a kth node of the RPR over time; computing an estimate of a slope -M of the relationship A(Fk(n)) at time n; and computing a next fairness rate Fk(n+1) of the kth node as a function of the slope M at time n+1.
摘要:
The deterministic packet marking (DPM) method is based on marking packets with the partial address information of ingress interface only. The attack victim is able to recover the complete address(es) information after receiving several packets from a particular attacking host or hosts. The full path is not really essential for the traceback since it can be different for different packets for different reasons. In order to deal with fragmentation, it is required that the ID field (as well as some other fields) of all the fragments in a given series is the same. DPM randomly selects the marks from the pool, which is created at startup. The mark completely occupies the ID field in the IP packet header, as well as Reserved Flag. Since every single packet passing through the DPM-enabled interface is marked, the ID field of all the fragments of a series are ensured to be the same. By allowing DPM to suspend randomness in selecting the marks for the fragments of a series, all fragments are ensured to have the same ID. This ID would be different from the one originally set by the origin of the packet, but this would not make a difference for the reassembly process.
摘要:
Techniques are generally disclosed for disseminating link state information to one or more nodes of a network of nodes, the network of nodes interconnected via a plurality of communication channels.
摘要:
Techniques of scheduling data packets are disclosed. For example, such data packet scheduling techniques may be employed to schedule data packets on wired and/or wireless networks. An example embodiment includes techniques for scheduling voice-over-Internet protocol data packets transmitted between a base station and a subscriber station on a WiMAX network.
摘要:
Methods and apparatus are provided for encoding a pixel domain image with hidden data by modifying the histogram of the pixel domain image to make space for such hidden data.
摘要:
Embodiments are directed toward a method for Behavior-based Traffic Differentiation (BTD) that initially receives incoming packets and performs traffic classification to determine the protocol of the incoming packets. In addition, BTD performs bandwidth division/allocation to further support traffic classification amongst non-TCP traffic such as UDP and ICMP. For TCP traffic, the method for BTD determines whether a TCP connection has been established and performs at least one of rate limiting, waiting time reduction for half-open connections, and incrementing backlog queue size when the TCP connection has not been established. If the TCP connection has been established successfully, the method for BTD further includes proactive tests for traffic differentiation which identify normal traffic, which is admitted, and attack traffic, which is dropped.
摘要:
Sharing a resource may include the use of label values associated with information units presented to the resource. The label values may be determined based on, for example, arrival rates and/or committed flow rates. Criteria may be applied to label values to determine if the associated information units may be dropped.
摘要:
A dynamic upstream bandwidth allocation scheme is disclosed, i.e., limited sharing with traffic prediction (LSTP), to improve the bandwidth efficiency of upstream transmission over PONs. LSTP adopts the PON MAC control messages, and dynamically allocates bandwidth according to the on-line traffic load. The ONU bandwidth requirement includes the already buffered data and a prediction of the incoming data, thus reducing the frame delay and alleviating the data loss. ONUs are served by the OLT in a fixed order in LSTP to facilitate the traffic prediction. Each optical network unit (ONU) classifies its local traffic into three classes with descending priorities: expedited forwarding (EF), assured forwarding (AF), and best effort (BE). Data with higher priority replace data with lower priority when the buffer is full. In order to alleviate uncontrolled delay and unfair drop of the lower priority data, the priority-based scheduling is employed to deliver the buffered data in a particular transmission timeslot. The bandwidth allocation incorporates the service level agreements (SLAs) and the on-line traffic dynamics. The basic limited sharing with traffic prediction (LSTP) scheme is extended to serve the classified network traffic.