Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

210results about How to "Avoid traffic" patented technology

Sharing a network interface card among multiple hosts

ActiveUS7245627B2Allows costly, high-speed network processing resources to be sharedAvoid trafficData switching by path configurationMultiple digital computer combinationsSwitched fabricDistributed computing
A network interface device includes a fabric interface, adapted to exchange messages over a switch fabric with a plurality of host processors, the messages containing data, and a network interface, including one or more ports adapted to be coupled to a network external to the switch fabric. Message processing circuitry is coupled between the fabric interface and the network interface, so as to enable at least first and second host processors among the plurality of the host processors to use a single one of the ports substantially simultaneously so as to transmit and receive frames containing the data over the network.
Owner:MELLANOX TECHNOLOGIES LTD

Multicast communication method, apparatus and system for intermittently connected network

A multicast communication method, a multicast communication apparatus and a multicast communication system in a network environment lacking a continuous connectivity. The source node device selects a group leader device which is able to forward data to group member devices belonging to a multicast group, and forwards the data to the selected group leader device, thereby reducing traffic between node devices, improving network reliability and saving the communication cost.
Owner:ELECTRONICS & TELECOMM RES INST

BEHAVIOR-BASED TRAFFIC DIFFERENTIATION (BTD) FOR DEFENDING AGAINST DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACKS

Embodiments are directed toward a method for Behavior-based Traffic Differentiation (BTD) that initially receives incoming packets and performs traffic classification to determine the protocol of the incoming packets. In addition, BTD performs bandwidth division / allocation to further support traffic classification amongst non-TCP traffic such as UDP and ICMP. For TCP traffic, the method for BTD determines whether a TCP connection has been established and performs at least one of rate limiting, waiting time reduction for half-open connections, and incrementing backlog queue size when the TCP connection has not been established. If the TCP connection has been established successfully, the method for BTD further includes proactive tests for traffic differentiation which identify normal traffic, which is admitted, and attack traffic, which is dropped.
Owner:NEW JERSEY INSTITUTE OF TECHNOLOGY

Technique for providing interconnection between communication networks

Technique for interconnecting a first communication network and a second communication network, for example layer 2 Ethernet networks, which uses a fully or partially redundant dual homing configuration. The configuration includes: at least three network elements where at least two of them are peer elements belonging to the second network, and at least two traffic lines respectively associated with the peer elements and connecting the first and the second networks via the three network elements. The technique comprises establishing a bi-directional signaling between the peer elements and, based on the signaling information, deciding which traffic line should forward the traffic.
Owner:ECE TELECOM LTD

System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks

A network architecture in accordance with the present invention includes a communication network that supports one or more network-based Virtual Private Networks (VPNs). The communication network includes a plurality of boundary routers that are connected by access links to CPE edge routers belonging to the one or more VPNs. To prevent traffic from outside a customer's VPN (e.g., traffic from other VPNs or the Internet at large) from degrading the QoS provided to traffic from within the customer's VPN, the present invention gives precedence to intra-VPN traffic over extra-VPN traffic on each customer's access link through access link prioritization or access link capacity allocation, such that extra-VPN traffic cannot interfere with inter-VPN traffic. Granting precedence to intra-VPN traffic over extra-VPN traffic in this manner entails special configuration of network elements and protocols, including partitioning between intra-VPN and extra-VPN traffic on the physical access link using layer 2 multiplexing and the configuration of routing protocols to achieve logical traffic separation between intra-VPN traffic and extra-VPN traffic at the VPN boundary routers and CPE edge routers. By configuring the access networks, the VPN boundary routers and CPE edge routers, and the routing protocols of the edge and boundary routers in this manner, the high-level service of DoS attack prevention is achieved.
Owner:VERIZON PATENT & LICENSING INC

Efficient fluid finishing method and device based on structure cavitation effect

ActiveCN106392863ACollapse drive effect is obviousSimple structureEdge grinding machinesPolishing machinesBubble cavitationWear particle
The invention discloses an efficient fluid finishing method based on the structure cavitation effect. According to the efficient fluid finishing method, the Venturi tube cavitation effect is introduced to fluid finishing, strong bubble cavitation action is formed in the effective polishing area formed between a processing tool and a workpiece to be processed by arranging a Venturi tube structure on the processing tool, and the bubble cavitation action is utilized to drive a liquid-solid abrasive flow in the formed effective polishing area to move in a high-speed turbulent vortex mode to achieve processing on the surface of the workpiece to be processed through abrasive particles. According to the efficient fluid finishing method based on the structure cavitation effect, the Venturi tube structure is utilized to achieve growth and collapse of bubbles in the microspur gap between the processing tool and the workpiece to be processed so as to achieve unordered and high-speed turbulent flow of the abrasive particles; compared with processing equipment adopting ultrasonic waves, the structure is simpler and the cost is lower; and compared with normal bubble-free-collapse processing equipment, the controllability is better, and the bubble collapse driving effect is more obvious.
Owner:ZHEJIANG UNIV OF TECH

System and method for controlling, obfuscating and anonymizing data and services when using provider services

InactiveUS20140115715A1Retain privacyPreventing the source from being identifiedDigital data processing detailsAnalogue secracy/subscription systemsService providerService provision
A system, method, and computer readable medium for preventing data leakage from a transmission unit to a service provider (SP), utilizing a network system including a computer, a processor, memory, and a computer readable medium storing thereon computer code which when executed by the at least one computer causes the at least one computer to at least: identify identification information of a user included in data communication between the transmission unit and the SP; identify a SP application via an application signature; determine whether the identified SP application meets at least one data leakage prevention policy for a user; and perform at least one of a plurality of data leakage prevention processes on the transmission unit.
Owner:PASDAR BABAK

Presence information management system, presence server device, gateway device and client device

InactiveUS20080034078A1Restrain communication trafficAvoid trafficDigital computer detailsTransmissionClient-sideTraffic volume
The present invention provides a presence information management system, a presence server device, a gateway device and a client device, which notify of presence information in realtime while restraining communications traffic. The presence server device managing presence information of a plurality of presentities, comprises a delegating unit sending delegating notification of presence information management function related to at least one of the plurality of presentities, to another device becoming a delegatee of the presence information management function. The gateway device comprises a managing unit managing presence information of a presentity, and a control unit performing control so that, when receiving the delegating notification of the presence information management function about at least one of the plurality of presentities from a presence server, the managing unit is executed with respect to the function-delegated presentity.
Owner:FUJITSU LTD

Data communication system, backup server, and communication control apparatus

In order to distribute multicast packets, using different multicast addresses and avoiding fault points, a backup server is installed close to a master and converts backup multicast packets and sends them as master multicast packets to the client. At this time, backup multicast packets are delayed and sent while the delay is determined from an allowable retransmission time, a one-direction delay to the client, a time required to detect linkage problems, and a time required to establish backup paths and so on.
Owner:KDDI CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products