FAIR AND PERFORMANT ARBITRATION IN A ROUTING COMPONENT

    公开(公告)号:US20240333655A1

    公开(公告)日:2024-10-03

    申请号:US18191561

    申请日:2023-03-28

    发明人: Linda Cheng Feng Wei

    IPC分类号: H04L47/62

    CPC分类号: H04L47/6245 H04L47/623

    摘要: In one embodiment, a method by a routing component includes receiving a packet to be forwarded to a neighboring routing component, the packet being predicted to be further forwarded to a plurality of destinations from the neighboring routing component, storing the packet to a FIFO queue, determining to transmit the packet to the neighboring routing component for one or more destinations by using an arbiter associated with a transmission port connected to the neighboring routing component, determining that the plurality of destinations comprise one or more remaining destinations in addition to the one or more destinations, reading without popping the packet from the FIFO queue, and transmitting the packet to the neighboring routing component through the transmission port.

    Leveling HSM service with network traffic control

    公开(公告)号:US12095641B2

    公开(公告)日:2024-09-17

    申请号:US18103568

    申请日:2023-01-31

    摘要: Provided is a method for a Hardware Security Module (HSM) appliance to provide cryptographic services to multiple clients via cryptographic service requests and responses transmitted over a secure communication channel there between. The method comprises the steps of providing a traffic control feature for communications over said secure communication channel by way of a Linux Kernel, and leveling cryptographic service and balancing a workload of cryptographic transactions on the HSM appliance for the multiple clients submitting said requests and receiving said responses by way of a Traffic Control Agent (TCA), thereby distributing a fair, proportional share of resources on the HSM appliance needed for servicing the cryptographic services to multiple clients irrespective of thread count per client. Other embodiments disclosed, including a dynamic intelligent TCA.

    Memory-efficient technique for weighted round-robin load balancing

    公开(公告)号:US12063159B2

    公开(公告)日:2024-08-13

    申请号:US17307053

    申请日:2021-05-04

    申请人: RED HAT, INC.

    IPC分类号: H04L47/62 H04L47/125

    摘要: A memory-efficient technique for performing weighted round-robin load balancing in a distributed computing system is described. In one example of the present disclosure, a system can determine an offset to apply to a list of node identifiers based on a counter value. The system can select a subset of node identifiers from the list of node identifiers based on the offset. The system can then select a node identifier from the subset of node identifiers based on the counter value and a length of the subset of node identifiers. The system can transmit data to a node that corresponds to the node identifier and increment the counter value. The system can repeat this process any number of times to distribute data among a group of nodes in the distributed computing system.

    System and method for ensuring continuity of proxy-based service

    公开(公告)号:US12058055B2

    公开(公告)日:2024-08-06

    申请号:US18399259

    申请日:2023-12-28

    申请人: STCLab. Co., Ltd.

    IPC分类号: H04L47/625 H04L9/08 H04L47/62

    摘要: Disclosed is a system for ensuring the continuity of a proxy-based service, and a method thereof. The system includes a target server that processes a queue of access requests received from a plurality of client devices and processes the queue until a first time point when the waiting amount of access request exceeds a predetermined first threshold, a queue management server that processes the queue from the first time point until a second time point when the waiting amount exceeds a predetermined second threshold, and a mirror server that processes the queue from the second time point.

    METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS

    公开(公告)号:US20240244038A1

    公开(公告)日:2024-07-18

    申请号:US18241650

    申请日:2023-09-01

    申请人: Ted H. Szymanski

    发明人: Ted H. Szymanski

    摘要: Methods to strengthen the cyber-security and privacy in a proposed deterministic Internet of Things (IOT) network are described. The proposed deterministic IoT consists of a network of simple deterministic packet switches under the control of a low-complexity ‘Software Defined Networking’ (SDN) control-plane. The network can transport ‘Deterministic Traffic Flows’ (DTFs), where each DTF has a source node, a destination node, a fixed path through the network, and a deterministic or guaranteed rate of transmission. The SDN control-plane can configure millions of distinct interference-free ‘Deterministic Virtual Networks’ (D)VNs) into the IoT, where each DVN is a collection of interference-free DTFs. The SDN control-plane can configure each deterministic packet switch to store several deterministic periodic schedules, defined for a scheduling-frame which comprises F time-slots. The schedules of a network determine which DTFs are authorized to transmit data over each fiber-optic link of the network. These schedules also ensure that each DTF will receive a deterministic rate of transmission through every switch it traverses, with full immunity to congestion, interference and Denial-of-Service (DOS) attacks. Any unauthorized transmissions by a cyber-attacker can also be detected quickly, since the schedules also identify unauthorized transmissions. Each source node and destination node of a DTF, and optionally each switch in the network, can have a low-complexity private-key encryption/decryption unit. The SDN control-plane can configure the source and destination nodes of a DTF, and optionally the switches in the network, to encrypt and decrypt the packets of a DTF using these low-complexity encryption/decryption units. To strengthen security and privacy and to lower the energy use, the private keys can be very large, for example several thousands of bits. The SDN control-plane can configure each DTF to achieve a desired level of security well beyond what is possible with exitsing schemes such as AES, by using very long keys. The encryption/decryption units also use a new serial permutation unit the very low hardware cost, which allows for exceptional security and very-high throughputs in FPGA hardware.

    Preemptive packet transmission
    10.
    发明授权

    公开(公告)号:US12034646B2

    公开(公告)日:2024-07-09

    申请号:US17402861

    申请日:2021-08-16

    摘要: Disclosed herein is technology to reduce latency of frames through a network device supporting various priorities. In an implementation, a method comprises configuring one or more priorities with a preemptive right over other one or more of said plurality of priorities; receiving frames in a sequence, each of the frames having a frame priority comprising of one of said plurality of priorities; queuing the received frames in a predetermined order based on a frame arrival time and the frame priority; transmitting a current frame based on a current frame priority and current frame arrival time; stopping transmission of the current frame when a later frame in the sequence is received that has a later frame priority with preemptive right over the current frame priority; transmitting an invalid frame check sequence; transmitting the later frame; and restarting the transmission of the current frame after transmitting the later frame.