H04L69/00

RESILIENT NETWORK COMMUNICATION USING SELECTIVE MULTIPATH PACKET FLOW SPRAYING

Techniques for detecting path failures and reducing packet loss as a result of such failures are described for use within a data center or other environment. For example, a source and/or destination access node may create and/or maintain information about health and/or connectivity for a plurality of ports or paths between the source and destination device and core switches. The source access node may spray packets over a number of paths between the source access node and the destination access node. The source access node may use the information about connectivity for the paths between the source or destination access nodes and the core switches to limit the paths over which packets are sprayed. The source access node may spray packets over paths between the source access node and the destination access node that are identified as healthy, while avoiding paths that have been identified as failed.

Non-Invasive continuous and adaptive health monitoring eco-system

An eco-system for tracking a user's physiological parameters comprises a central sensor and at least one remote sensor in wireless communication with the central sensor, a portable device readily accessible to the user, and a cloud platform. Each sensor may be worn by the user and measure data indicative of one or more of the physiological parameters. The central sensor may receive and process the measured data from each remote sensor and processes its own measured data. The portable device comprises a receiver wirelessly receiving the processed data and instructions from the central sensor; a processor running a mobile application handling the processed data and instructions; and a transmitter transmitting the processed data. The cloud platform receives the processed data from the transmitter; analyzes the received processed data; and transmits the results of the analysis to at least one of the portable device and an authorized healthcare entity.

Processing of overlay networks using an accelerated network interface card

According to one embodiment, a system includes an accelerated network interface card (NIC), the accelerated NIC including a plurality of network ports including multiple Peripheral Component Interconnect express (PCIe) ports, an Overlay Network Offload System (ONOS), the ONOS including logic configured to provide overlay functionality to network traffic received by the accelerated NIC, and logic configured to cause network traffic that has overlay functionality provided by a hypervisor to bypass the ONOS. In another embodiment, a method for accelerating overlay functionality in a server includes providing overlay functionality for at least some network traffic received by an accelerated NIC implemented in a server, wherein the accelerated NIC provides an interface between the server and a network, and causing network traffic that has overlay functionality provided by a hypervisor of the server to bypass the accelerated NIC.

System, method, and computer program for selecting at least one new physical element and/or virtual element for use in a system including a network function virtualization orchestrator (NFV-O)

A system, method, and computer program product are provided for selecting at least one new physical element and/or virtual element for use in a system including a network function virtualization orchestrator (NFV-O). In use, information corresponding to data traffic associated with a network system including an NFV-O module is identified, the NFV-O module being operable to manage data flow associated with one or more Virtual Network Functions (VNFs) and one or more physical elements of the network system. Additionally, an overall expected usage of the network system is determined based on the information corresponding to the data traffic. Further a cost of implementing at least one of one or more new physical elements or one or more VNFs is determined, based on the overall expected usage. Moreover, at least one of the one or more new physical elements or the one or more VNFs to implement in the network system is selected based at least partially on the determined cost of implementing the one or more new physical elements and the cost of implementing the one or more VNFs.

CUSTOM CONTENT FOR PREMISES MANAGEMENT

Methods and systems for managing a premises are described. A premises or devices at a premises may be associated with one or more premises zones. The one or more premises zones may be associated with corresponding content. If data is received from a device associated with a particular premises zone, then the content may be output. The content may be used to notify a user of an event, state change, or other indication associated with the particular premises zone.

ROUTING SECURE COMMUNICATIONS ACROSS MULTIPLE COMMUNICATION DEVICES OR POINTS-OF-PRESENCE
20170359727 · 2017-12-14 ·

A communication system is provided for enabling secure communications between at least a sender communication device and at least a recipient communication device or point-of-presence, wherein the then current recipient communication device(s) or point(s)-of-presence for the recipient(s) can vary over time. The communication system includes a network server component configured to maintain a current set of identification information elements for communicating with communication device(s) or points-of-presence associated with the one or more recipients; and if applicable provide up to date one or more identifiers or identification information elements for the one or more recipients to a sender communication device thereby prompting the sender communication device to send the secure communication based on the updated one or more identifiers or identification information elements. A related method is provided for exchanging secure communications between senders and recipients, where the communication device(s) or point(s)-of-presence associated with the recipients can vary over time.

Method and device for processing data packets

The invention proposes a method of encoding data packet by encoding type information and size information of said data packet into the same field. The invention also proposes a method of processing data packets received. The data packet comprises a header part and a message part. The header part comprises at least one bit for indicating the type of said data packet, said method comprising a step 101 of obtaining the size information of said data packet based on said at least one bit.

Intelligent signal matching of disparate input data in complex computing networks

This disclosure is directed to an apparatus for intelligent matching of disparate input data received from disparate input data systems in a complex computing network for establishing targeted communication to a computing device associated with the intelligently matched disparate input data.

Intelligent signal matching of disparate input data in complex computing networks

This disclosure is directed to an apparatus for intelligent matching of disparate input data received from disparate input data systems in a complex computing network for establishing targeted communication to a computing device associated with the intelligently matched disparate input data.

Scanning server ports to infer service protocols

Systems and methods are disclosed to infer, using a machine learned model, a service protocol of a server based on the banner data produced by the server. In embodiments, the machine learned model is implemented by a network scanner configured to receive banner data from open ports on servers. A received banner is parsed into a set of features, such as the counts or presence of particular characters or strings in the banner. In embodiments, certain types of banner content such as network addresses, hostnames, dates, and times, are replaced with special characters. The machine learned model is applied to the features to infer a most likely protocol of the server port that produced the banner. Advantageously, the model can be trained to perform the inference task with high accuracy and without using human-specified rules, which can be brittle for unconventional banner data and carry undesired biases.