Unlock instant, AI-driven research and patent intelligence for your innovation.

Transmission control protocol (tcp) acknowledgement (ack) packet suppression

A technology for confirming packets and protocols, which is applied in the field of network communication and can solve problems such as interference with round-trip timing and communication

Active Publication Date: 2017-04-19
TEXAS INSTR INC
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, while conventional delayed ACK implementations can potentially reduce the overall number of packets communicated between devices, excessive delays to ACKs can still interfere with round-trip timing and other aspects of communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transmission control protocol (tcp) acknowledgement (ack) packet suppression
  • Transmission control protocol (tcp) acknowledgement (ack) packet suppression
  • Transmission control protocol (tcp) acknowledgement (ack) packet suppression

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In various embodiments, the systems and methods described herein can be used to suppress or suppress network communications between a source and a destination, such as between two computer systems, a computer system and a communication device, or two communication devices. Impairing transport protocol acknowledgment (ACK) packets or messages in other ways. An example of a transport protocol used in Internet communications is the Transmission Control Protocol (TCP). In some cases, ACK packets may be suppressed when the communication also employs a session or secure protocol such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols.

[0018] In order to better explain the foregoing, figure 1 is a block diagram of a modified Open Systems Interconnection model (OSI) 100 in accordance with some embodiments. In various applications, suite 100 may be implemented by an operating system, software and / or firmware executed by a host computing system or commu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In various implementations, systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression may be applicable to low-power communications. For example, a method may include receive an incoming TCP packet at a TCP layer (401) implemented by the communication system; de-encapsulating the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) or Transport Layer Security (TLS) packet; passing the incoming SSL or TLS packet from the TCP layer to an SSL or TLS layer (402); and signaling, by the SSL or TLS layer to the TCP layer in response to the SSL or TLS layer having received the incoming SSL or TLS packet, that a TCP acknowledgement be suppressed by the TCP layer (403).

Description

technical field [0001] The present invention relates generally to network communications, and more particularly to systems and methods for Transmission Control Protocol (TCP) acknowledgment (ACK) packet suppression. Background technique [0002] The Internet Protocol Suite specifies how data should be transmitted over a computer network by a source and received at a destination. The sets are generally organized into four or more abstraction layers, which are then used to categorize related networking protocols. One such protocol is known as the TCP protocol, which is a type of transport protocol responsible for end-to-end messaging independent of the underlying network. For example, web browsers are known to use TCP when connecting to servers on the World Wide Web. Also, TCP is commonly used to deliver mail and transfer files from one location to another. [0003] The TCP protocol is designed to guarantee that all bytes received are exactly the same as originally transmit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/951H04L47/43H04L45/02
CPCH04L69/162H04L5/0055H04L69/22H04L69/326H04L63/0272H04L63/166
Inventor 乌里·魏因里波奥伦·沙泥本·吉勒博阿
Owner TEXAS INSTR INC