Patent classifications
H04L45/70
Connectionless segment routing for 5G or other next generation network
Unlike smart devices, Internet of things (IoTs), such as meter readers, generate very low revenue per user. Traditional tunnel/bearer based connection-oriented architectures do not scale economically for billions of IoT devices due to the amount of signaling overhead associated with GTP tunnel setup/tear down and the states related to GTP tunnels maintained at various parts of the mobile network. However, the mobility network can efficiently support massive stationary and/or mobile IoTs by reducing the amount of signaling overhead, the state of the IoTs kept in network, and simplifying the data plane when possible.
Application service configuration system
A computing system implementing an application service can receive network data from computing devices of clients of the application service. The system can determine, from the network data, that a network latency for a subset of the computing devices crosses above a latency threshold. Based on determining that the subset of computing devices utilize a common network service provider, the system can transmit a set of configuration signals to the subset of computing devices, which modify a set of default application configurations of the designated application to compensate for the network latency.
Monitoring device, network fault monitoring system, and monitoring method
A network 50 is hierarchically divided into network devices 501 to 506, areas, and the like to be monitoring targets, and a monitoring device 100 monitors a divided monitoring target. A monitoring device of an N-th layer (here, N≥2) that is an upper layer with respect to a first layer monitors information of reachability between user connection points received from a monitoring device of an (N−1)-th layer that is a lower layer and network devices connecting monitoring targets of the (N−1)-th layer making up monitoring targets of the N-th layer and connection statuses between the network devices and areas that are monitoring targets. The monitoring device determines the presence/absence of reachability between user connection points belonging to different monitoring targets of the (N−1)-th layer on the basis of this reachability and the connection statuses.
TECHNIQUES FOR DETECTING BURSTY TRAFFIC PATTERN DETECTION AND SCHEDULING MULTIPATH DATA TRAFFIC
A data traffic analyzer is configured for detecting bursty data traffic on a data path. The data traffic analyzer measures data traffic parameters of the data path and analyzes the data traffic parameters of the data path to detect a bursty traffic pattern based on comparing the data traffic parameters to a time interval threshold T.sub.Limit which defines gaps between bursty data traffic. The measured traffic parameters include: i) a data traffic volume and/or a protocol data unit (PDU) count transmitted on the data path; and ii) a time stamp T.sub.LPU characterizing the last path usage (LPU) of the data path.
Method for controlling a remote service access path and relevant device
The present invention provides a method for controlling a remote service access path including the steps of: receiving a datagram sent by any terminal intending to access the remote service; requesting a node management server to determine an optimal gateway server as an optimal node for transferring the datagram, the optimal gateway server being selected from a number of gateway servers provided for a distributed deployment architecture established for a server cluster of the remote service; testing transmission quality of a number of accessed data connections to the optimal gateway server, and determining an optimal data connection having optimal transmission quality; and invoking the optimal data connection to send a datagram after tunnel encapsulation thereof, and the optimal gateway server forwarding the datagram to a business server connected to the optimal gateway server and belonging to the server cluster.
Secure internet gateway
A system includes a plurality of secure gateways that each use a plurality of datasets to determine how to process messages between devices on a network and websites on the internet. A version control server in the system automatically sends a dataset to each secure gateway in the plurality of secure gateways.
Network traffic detection with mitigation of anomalous traffic and/or classification of traffic
Methods, systems, and apparatus for detecting and mitigating anomalous network traffic. With at least one processor in a network, information regarding network traffic flows is obtained and a classification model is generated based on the obtained information, the classification model comprising one or more classification rules for classifying network traffic as normal or anomalous. With the at least one processor in the network, the network traffic is classified as anomalous or normal based on the generated classification model and at least one mitigation action is initiated based on the network traffic being classified as anomalous.
System and method for selecting an electronic communication pathway from a pool of potential pathways
A system for selecting an electronic communication pathway from a pool of potential pathways. The system includes a network communication routing hub operating on at least a server wherein the network communication routing hub selects an electronic communication pathway from a plurality of electronic communication pathways. The at least a server is configured to include an authorization module wherein the authorization module is configured to authenticate each device of the plurality of remote devices. The system includes a pathway selection module operating on the at least a server wherein the pathway selection module is configured to select based on a pathway probability variable a pathway from the plurality of electronic communication pathways and transmit an outgoing communication over the selected pathway to a remote device of the plurality of remote devices associated with the selected pathway.
COMMUNICATION ASSET USAGE METRICS
Examples disclosed herein relate to tracking a usage metric for each of a plurality of communication assets, determining whether the usage metric fails to meet a threshold for each of the plurality of communication assets, and in response to determining that the usage metric fails to meet the threshold for at least one of the plurality of communication assets, causing the at least one of the plurality of communication assets to be disabled.
SELECTING A VPN CONNECTION USING NEGOTIATED CRYPTOGRAPHIC ALGORITHMS TO IMPROVE THROUGHPUT
The techniques described herein enable a virtual private network (VPN) gateway to select a VPN connection, from multiple VPN connections established between a network VPN gateway and a remote VPN gateway, based on performance factors such as throughput. A system may measure throughput in megabytes per second (Mbps). More specifically, a VPN gateway (e.g., a remote VPN gateway or a network VPN gateway) can configure a routing preference that selects a VPN connection that is more performant based on a cryptographic algorithm that is used for the VPN connection. The VPN gateway can update the routing preference to select an alternative VPN connection when the performance of the VPN connection suffers.