Patent classifications
H04L43/18
Network controlled sensor information sharing between vehicles
Certain aspects of the present disclosure provide techniques relating to network controlled sensor information sharing between vehicles. In one embodiment, a method of wireless communications by a network entity comprises receiving a request, from a first user equipment (UE), for sharing of sensor information by at least a second UE based on a target region indicated by the request and taking one or more actions, in response to the request, to trigger the sharing of sensor information by the second UE.
Network controlled sensor information sharing between vehicles
Certain aspects of the present disclosure provide techniques relating to network controlled sensor information sharing between vehicles. In one embodiment, a method of wireless communications by a network entity comprises receiving a request, from a first user equipment (UE), for sharing of sensor information by at least a second UE based on a target region indicated by the request and taking one or more actions, in response to the request, to trigger the sharing of sensor information by the second UE.
Method and system for tracing packets in software defined networks
A method is implemented by a network device where the method performs a trace flow process in a packet processing pipeline of the network device. The packet processing pipeline includes a trace table and a forward table. The method encompasses forwarding a trace packet to the trace table, forwarding a copy of the trace packet to a trace analyzer in response to determining that a trace bit is set in the trace packet, forwarding the trace packet to the forward table, and determining a next stage of the packet processing pipeline based on trace packet meta data and a value stored in a trace register.
Secure, removable, wet pluggable data crypt for unmanned undersea vehicles
An unmanned undersea vehicle includes one or more vehicle sections. The sections include a vehicle hull. The vehicle includes a data crypt configured to be selectively removable from the vehicle through the hull of the vehicle. The data crypt includes a persistent storage device configured to operate using SATA protocols and one or more electrical connectors configured to selectively connect the data crypt to electrical equipment in the vehicle, wherein the connectors are impedance matched to mating connectors in the vehicle.
Secure, removable, wet pluggable data crypt for unmanned undersea vehicles
An unmanned undersea vehicle includes one or more vehicle sections. The sections include a vehicle hull. The vehicle includes a data crypt configured to be selectively removable from the vehicle through the hull of the vehicle. The data crypt includes a persistent storage device configured to operate using SATA protocols and one or more electrical connectors configured to selectively connect the data crypt to electrical equipment in the vehicle, wherein the connectors are impedance matched to mating connectors in the vehicle.
METHOD AND SYSTEM FOR ANALYZING DATA
A method and system for accelerating the analysis of large-scale data reads a data packet from a queue, and after performing data processing on the data packet, a first high, middle, and low byte of the processed data packet is cyclically read; a preset signal reference value is read, and the signal reference value is converted into a collected value according to a preset signal transformation ratio and correction factor; the collected value is converted into an integer value, and the integer value is split into a second high, middle, and low byte; and the first high, middle, and low byte of the processed data packet is compared with the second high, middle and low byte of the integer value in a preset way. A determination as to whether the data of the packet is abnormal or not is made based on the result of the comparison.
METHOD AND SYSTEM FOR ANALYZING DATA
A method and system for accelerating the analysis of large-scale data reads a data packet from a queue, and after performing data processing on the data packet, a first high, middle, and low byte of the processed data packet is cyclically read; a preset signal reference value is read, and the signal reference value is converted into a collected value according to a preset signal transformation ratio and correction factor; the collected value is converted into an integer value, and the integer value is split into a second high, middle, and low byte; and the first high, middle, and low byte of the processed data packet is compared with the second high, middle and low byte of the integer value in a preset way. A determination as to whether the data of the packet is abnormal or not is made based on the result of the comparison.
Protocol analyzer for monitoring and debugging high-speed communications links
A Protocol Analyzer is provided for monitoring and debugging a high-speed communications link between a local device and a remote device. The local device may include a communications protocol block for interfacing with the remote device. The Protocol Analyzer may include an embedded logic debugging circuit on the local device, where the logic debugging circuit is configured to capture link data based on user-defined events to create a corresponding database of signal capture in a local memory. The Protocol Analyzer is configured to import the database from memory and to decode the link data to display on a user interface that organizes key link sequencing events along with their timestamps to help the user more accurately and quickly debug any link bring-up issues.
Protocol analyzer for monitoring and debugging high-speed communications links
A Protocol Analyzer is provided for monitoring and debugging a high-speed communications link between a local device and a remote device. The local device may include a communications protocol block for interfacing with the remote device. The Protocol Analyzer may include an embedded logic debugging circuit on the local device, where the logic debugging circuit is configured to capture link data based on user-defined events to create a corresponding database of signal capture in a local memory. The Protocol Analyzer is configured to import the database from memory and to decode the link data to display on a user interface that organizes key link sequencing events along with their timestamps to help the user more accurately and quickly debug any link bring-up issues.
Information processing apparatus, moving apparatus, and method
Efficient virus detection and removal are realized by changing a mode of collecting logs in accordance with a network usage status. A configuration includes a processing monitoring unit that executes processing of monitoring a data communication network, and the processing monitoring unit includes a system load monitoring unit that monitors an available bandwidth of a network and a virus monitoring unit that collects log information corresponding to a communication message and performs virus detection. The virus monitoring unit changes a mode of collecting log information in accordance with information regarding the available bandwidth of the network acquired by the system load monitoring unit. In a case where a virus is detected and the available bandwidth is neither equal to nor larger than a predetermined threshold, only limited log information corresponding to a high-priority communication message is collected.