H04L61/50

DATA ACCESS METHODS AND SYSTEMS
20220337548 · 2022-10-20 ·

Embodiments of this application relate to the data access field, including data access methods systems that enable efficient and effective data access. In one embodiment, a method includes: assigning, by an RDMA control service based on user information and a corresponding connection relationship between a switch and a first instance defined by a user, an address segment to the first instance; building, by the RDMA control service, an access control list based on the address segment assigned to the first instance, where the access control list is used for controlling access between different first instances defined by the user; and sending, by the RDMA control service, the access control list to a switch control service, such that the switch control service configures the access control list for the switch. In one embodiment, access between different instances defined by a same user can be effectively controlled, thereby effectively resolving an issue of access isolation for different users accessing an RDMA network node.

DATA ACCESS METHODS AND SYSTEMS
20220337548 · 2022-10-20 ·

Embodiments of this application relate to the data access field, including data access methods systems that enable efficient and effective data access. In one embodiment, a method includes: assigning, by an RDMA control service based on user information and a corresponding connection relationship between a switch and a first instance defined by a user, an address segment to the first instance; building, by the RDMA control service, an access control list based on the address segment assigned to the first instance, where the access control list is used for controlling access between different first instances defined by the user; and sending, by the RDMA control service, the access control list to a switch control service, such that the switch control service configures the access control list for the switch. In one embodiment, access between different instances defined by a same user can be effectively controlled, thereby effectively resolving an issue of access isolation for different users accessing an RDMA network node.

MULTI-LINK TERMINAL, METHOD FOR ALLOCATING AN ADDRESS FOR A MULTI-LINK TERMINAL, NETWORK ACCESS DEVICE AND MEDIUM
20220322076 · 2022-10-06 · ·

The application discloses a multi-link terminal, a method for allocating an address for the multi-link terminal, a network access device and a medium. The method for allocating the address for the multi-link terminal includes following steps: sending, by a logical entity affiliated with the multi-link terminal, an association request message to a network access device, wherein the association request message includes a MAC address of the multi-link terminal; and receiving, by the logical entity, an association response message sent by the network access device, wherein the association response message includes addresses and association identifiers allocated by the network access device for logical entities affiliated with the multi-link terminal, and the addresses for the logical entities include respective link information bits.

MULTI-LINK TERMINAL, METHOD FOR ALLOCATING AN ADDRESS FOR A MULTI-LINK TERMINAL, NETWORK ACCESS DEVICE AND MEDIUM
20220322076 · 2022-10-06 · ·

The application discloses a multi-link terminal, a method for allocating an address for the multi-link terminal, a network access device and a medium. The method for allocating the address for the multi-link terminal includes following steps: sending, by a logical entity affiliated with the multi-link terminal, an association request message to a network access device, wherein the association request message includes a MAC address of the multi-link terminal; and receiving, by the logical entity, an association response message sent by the network access device, wherein the association response message includes addresses and association identifiers allocated by the network access device for logical entities affiliated with the multi-link terminal, and the addresses for the logical entities include respective link information bits.

AGGREGATED NETWORKING DEVICE FAILOVER SYSTEM
20220321398 · 2022-10-06 ·

An aggregated networking device failover system includes an aggregation connected device coupled to first and second aggregated networking devices. The aggregation connected device receives a first aggregation communication from the first aggregated networking device that identifies its first MAC address as an actor MAC address, and a second MAC address of the second aggregated networking device as an alternate actor MAC address. The aggregation connected device then associates the first and second MAC addresses with an aggregated link to the first and second aggregated networking devices. Subsequent to associating the first and second MAC addresses with the aggregated link, the aggregation connected device receives a second aggregation communication from the second aggregated networking device that identifies its second MAC address as an actor MAC address, and the aggregated link remains available in response to that second/actor MAC address being associated with the aggregated link.

CUPS BNG BASED PACKET FORWARDING SYSTEMS, METHODS AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUMS

A network element includes at least one processor and at least one memory including computer program code. The at least one memory and the computer program code are configured to, with the at least one processor, cause the network element to: designate a first user plane function, from among the plurality of user plane functions, as a designated broadcast forwarder from which to receive broadcast control traffic, and receive the broadcast control traffic forwarded from the first user plane function, from among the plurality of user plane functions.

CUPS BNG BASED PACKET FORWARDING SYSTEMS, METHODS AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUMS

A network element includes at least one processor and at least one memory including computer program code. The at least one memory and the computer program code are configured to, with the at least one processor, cause the network element to: designate a first user plane function, from among the plurality of user plane functions, as a designated broadcast forwarder from which to receive broadcast control traffic, and receive the broadcast control traffic forwarded from the first user plane function, from among the plurality of user plane functions.

MEDIA ACCESS CONTROL (MAC) ADDRESS PRIVACY HANDLING
20230156461 · 2023-05-18 ·

Implementations disclosed describe techniques to allow wireless devices to initially connect with randomized MAC addresses and send an encrypted permanent MAC for differentiated services. In one method, a first wireless device connects to an access point (AP) using a randomized MAC address. The first wireless device receives a request for a permanent MAC address from the AP. The first wireless device determines whether to send the permanent MAC address. Responsive to determining to send the permanent MAC address, the first wireless device encrypts the permanent MAC address to obtain an encrypted MAC address and sends a response to the request, including the encrypted MAC address, to the AP.

MEDIA ACCESS CONTROL (MAC) ADDRESS PRIVACY HANDLING
20230156461 · 2023-05-18 ·

Implementations disclosed describe techniques to allow wireless devices to initially connect with randomized MAC addresses and send an encrypted permanent MAC for differentiated services. In one method, a first wireless device connects to an access point (AP) using a randomized MAC address. The first wireless device receives a request for a permanent MAC address from the AP. The first wireless device determines whether to send the permanent MAC address. Responsive to determining to send the permanent MAC address, the first wireless device encrypts the permanent MAC address to obtain an encrypted MAC address and sends a response to the request, including the encrypted MAC address, to the AP.

Generation of a unique device identifier for a client device in a wireless network
11641340 · 2023-05-02 · ·

To improve the network experience in a network, a unique device identifier (UDID) can be generated by a UDID generation module of a client device. The UDID generation module utilizes one or more device parameters as well as a service set identifier (SSID) as input(s) to the UDID generation module. The UDID can be reported to an access point device of the network so that the access point device can track, monitor, control, etc. the client device within the network, for example, when media access control randomization (rMAC) is utilized by the network to protect the privacy of the client device or a user of the client device. The same UDID is generated each time the client device joins the network so that the client device need not store the UDID.