H04L45/46

NETWORK TRANSMISSION OPTIMIZATION DEVICE FOR GRAPH-TYPE BLOCKCHAIN AND METHOD THEREOF
20230130074 · 2023-04-27 ·

The present invention relates to a network transmission optimization device for a graph-type blockchain, at least comprising a transaction processing module, a node managing module, and a route managing module, wherein the transaction processing module performs compression on a transaction, and transaction data obtained through the compression are transmitted among different clusters through a routing node selected by the route managing module from at least one cluster, wherein the at least one cluster is obtained through dividing plural nodes by the node managing module. The network transmission optimization method provides a transaction coding scheme to the existing graph-type blockchain systems, and improve use efficiency of network bandwidth by means of parallelized broadcast. The structured network topology of the network transmission optimization method is made to address delay among nodes, and is adaptive to dynamic joining and exit of nodes, thereby improving network transmission efficiency.

System and method of detecting hidden processes by analyzing packet flows

A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.

STATEFUL SERVICES ON STATELESS CLUSTERED EDGE

In order to enable dynamic scaling of network services at the edge, novel systems and methods are provided to enable addition of add new nodes or removal of existing nodes while retaining the affinity of the flows through the stateful services. The methods provide a cluster of network nodes that can be dynamically resized to handle and process network traffic that utilizes stateful network services. The existing traffic flows through the edge continue to function during and after the changes to membership of the cluster. All nodes in the cluster operate in active-active mode, i.e., they are receiving and processing traffic flows, thereby maximizing the utilization of the available processing power.

TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS

Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.

Coincidence mapping
11665250 · 2023-05-30 · ·

A method of determining an identity of a called or calling user of a communication propagated over a communications network, the method comprising: determining at least one characterizing feature of an outgoing communication to a called user or an incoming communication from a calling user transmitted over the communications network that is associated with a first user; identifying an incoming or outgoing communication respectively of a second user of the communications network having a least one characterizing feature that matches the at least one characterizing feature of the outgoing or incoming communication associated with the first user; and determining an identity of the called or calling user to be that of the second user.

System and method for synthesis of a network-on-chip for deadlock-free transformation
11665776 · 2023-05-30 · ·

System and methods are disclosed for transformation of a network, such as a network-on-chip (NoC). The system applies a method of clustering to nodes and edges. The clustering transforms the network and produces a deadlock free and (near-)optimal network that honors the constraints of the input network's floorplan and specification.

RECONFIGURABLE COMPUTING PODS USING OPTICAL NETWORKS
20230161638 · 2023-05-25 ·

Methods, systems, and apparatus, including an apparatus for generating clusters of building blocks of compute nodes using an optical network. In one aspect, a method includes receiving request data specifying requested compute nodes for a computing workload. The request data specifies a target n-dimensional arrangement of the compute nodes. A selection is made, from a superpod that includes a set of building blocks that each include an m-dimensional arrangement of compute nodes, a subset of the building blocks that, when combined, match the target n-dimensional arrangement specified by the request data. The set of building blocks are connected to an optical network that includes one or more optical circuit switches. A workload cluster of compute nodes that includes the subset of the building blocks is generated. The generating includes configuring, for each dimension of the workload cluster, respective routing data for the one or more optical circuit switches.

MOBILE AD-HOC WIRELESS NETWORKS

A method comprising: forming a cluster comprising at least two network nodes, wherein each of said network nodes comprises at least a wireless transceiver and at least one application server; continuously acquiring, by each of said network nodes, cluster topological data from at least some of said other network nodes; continuously transmitting, by each of said network nodes, to at least some of said other network nodes, said acquired topological data; designating, based at least in part on said transmitted topological data, a cluster head; and selecting, by said cluster head, at least one of said other network nodes in said cluster to provide one or more services associated with its respective at least one application server, wherein said one or more services are provided to all other network nodes.

METHODS AND SYSTEMS FOR AUTOMATICALLY AND SECURELY JOINING AN ASSOCIATION
20230073684 · 2023-03-09 ·

A method for joining an association that includes receiving, by a first cluster, an association access credential and a unique address of an association manager, generating, based on the association access credential, an association access request, sending, to the unique address, the association access request, receiving, in response to the sending, association information, and initiating, based on the association information, a connection to a second cluster in the association.

Supporting overlay networks for multiple autonomous systems and underlays

A network management method includes a controller receiving an underlay network identifier and a network segment identifier. The underlay network identifier and network segment identifier can be associated with entries in a forwarding information base and border gateway protocol speakers may be deployed in association with the entries. A virtual network can be associated with the underlay network and network traffic can be forwarded to the virtual network according to the entries.