Datagram identifier management
First Claim
1. A method comprising:
- selecting, by a first host device, a datagram identifier from a list of available datagram identifiers;
placing, by the first host device, the datagram identifier in a list of unavailable datagram identifiers;
transmitting, by the first host device, a datagram request to a second host device over a communication link, the datagram request including the datagram identifier;
receiving, by the first host device, a datagram response from the second host device including the datagram identifier to identify a datagram, the datagram response further including a fragment of the datagram;
removing, by the first host device, the datagram identifier from the list of unavailable datagram identifiers based at least in part on receipt of the datagram; and
placing, by the first host device, the datagram identifier in the list of available datagram identifiers based at least in part on said removing.
9 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods ensure that datagrams retain integrity in light of the problems associated with the internetworking protocol'"'"'s use of datagram identifiers drawn from a first pool of datagram identifiers. The methods involve controlling the use of datagram identifiers to ensure that only certain identifiers are allowable. A second pool of datagram identifiers is created that is different from the first pool. A datagram identifier is drawn from the second pool and assigned to a datagram in a manner that the datagram identifier is controlled from being reused during the lifetime of the datagram. In alternative embodiments the number of available datagram identifiers is either increased through optional header fields, or reduced through tracking allowed datagram identifiers. A first host notifies a second host of an allowed identifier. The second host uses the allowed identifier as a datagram identifier.
-
Citations
9 Claims
-
1. A method comprising:
-
selecting, by a first host device, a datagram identifier from a list of available datagram identifiers; placing, by the first host device, the datagram identifier in a list of unavailable datagram identifiers; transmitting, by the first host device, a datagram request to a second host device over a communication link, the datagram request including the datagram identifier; receiving, by the first host device, a datagram response from the second host device including the datagram identifier to identify a datagram, the datagram response further including a fragment of the datagram; removing, by the first host device, the datagram identifier from the list of unavailable datagram identifiers based at least in part on receipt of the datagram; and placing, by the first host device, the datagram identifier in the list of available datagram identifiers based at least in part on said removing. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing device comprising:
-
a controller configured to select a datagram identifier from a list of available datagram identifiers; to place the datagram identifier in a list of unavailable datagram identifiers; to generate a datagram request including the datagram identifier; to remove the datagram identifier from the list of unavailable datagram identifiers based at least in part on receipt of a datagram to which the datagram identifier is associated; and to place the datagram identifier in the list of available datagram identifiers when the datagram identifier is removed from the list of unavailable datagram identifiers; and a transceiver coupled to the controller and configured to transmit the datagram request to another computing device via a communication link; and to receive a datagram response, which includes the datagram identifier and a fragment of the datagram, from the another computing device via the communication link. - View Dependent Claims (7, 8, 9)
-
Specification