摘要:
Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive a transport packet at a transport layer; de-encapsulating the transport packet using a transport protocol to identify a security packet; communicating the security packet to a security layer by the transport layer; communicating an acknowledgement signal to the transport layer from the security layer in response to receiving the security packet; suppressing an acknowledgement packet at the transport layer in response to receiving the acknowledgement signal; adding an acknowledgment indication to a next data packet to be sent after the suppress action; and sending the next data packet.
摘要:
A system and method is disclosed that enables a peripheral or slave device to seamlessly transition in and out of sleep state while remaining completely transparent to host software. When the device is in a sleep mode and incoming data is detected, the device begins a wake-up procedure and data is routed to a first, transitional memory. The size of the transitional memory is selected such that it is capable of buffering data received during time required for the system memory to stabilize from wake-up. Once a second, extended memory is stabilized, the data is buffered from the transitional memory to the extended memory. The device resumes normal operation when its processor has initialized and can read data from the extended memory.
摘要:
Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive an incoming TCP packet at a TCP layer implemented by the communication system; de-encapsulating the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) or Transport Layer Security (TLS) packet; passing the incoming SSL or TLS packet from the TCP layer to an SSL or TLS layer; and signaling, by the SSL or TLS layer to the TCP layer in response to the SSL or TLS layer having received the incoming SSL or TLS packet, that a TCP acknowledgement be suppressed by the TCP layer.
摘要:
A system and method is disclosed that enables a peripheral or slave device to seamlessly transition in and out of sleep state while remaining completely transparent to host software. When the device is in a sleep mode and incoming data is detected, the device begins a wake-up procedure and data is routed to a first, transitional memory. The size of the transitional memory is selected such that it is capable of buffering data received during time required for the system memory to stabilize from wake-up. Once a second, extended memory is stabilized, the data is buffered from the transitional memory to the extended memory. The device resumes normal operation when its processor has initialized and can read data from the extended memory.
摘要:
Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive an incoming TCP packet at a TCP layer implemented by the communication system; de-encapsulating the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) or Transport Layer Security (TLS) packet; passing the incoming SSL or TLS packet from the TCP layer to an SSL or TLS layer; and signaling, by the SSL or TLS layer to the TCP layer in response to the SSL or TLS layer having received the incoming SSL or TLS packet, that a TCP acknowledgement be suppressed by the TCP layer.
摘要:
Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive an incoming TCP packet at a TCP layer implemented by the communication system; de-encapsulating the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) or Transport Layer Security (TLS) packet; passing the incoming SSL or TLS packet from the TCP layer to an SSL or TLS layer; and signaling, by the SSL or TLS layer to the TCP layer in response to the SSL or TLS layer having received the incoming SSL or TLS packet, that a TCP acknowledgement be suppressed by the TCP layer.