Patent classifications
H04L67/14
Multiple addressing access device
A method and a device for managing a remote communication service (streaming) between a terminal in a communications network and an object of a local area network. The terminal and the object are capable of communicating via a gateway of the local area network. The method includes the following steps on a service provision device providing the service: establishing a list of associations between an address for accessing the object and at least one feature of the service; obtaining at least one criterion linked to the terminal; selecting at least one association in the list of associations according to said criterion; and sending to the terminal at least one address associated with said at least one selected association.
Communication apparatus, communication method, and program
A communication apparatus comprises a TCP terminating part that terminates TCP communication with an apparatus of data transmission destination, a monitoring part that monitors network status of the apparatus of data transmission destination on a per-session basis, and a transferring rate controlling part that changes size of a transmission buffer that is adopted to the session based on the network status.
Method for setting up and for application of expected communication behavior and in communication system
A communication system includes an external entity and a 5G system (5GS), wherein the 5GS comprises a 5G core (5GC), wherein the 5GC comprises a functional entity, a Unified Data Management (UDM), a Session Management Function (SMF), and a User Plane Function (UPF). A method for setting up expected communication behavior information in the system includes: performing, by the external entity, an Application Programming Interface (API) call via an API of the functional entity and setting up an expected communication behavior for a subscriber or set of subscribers, a data network name (DNN), a 5G virtual network (VN), a slice or a combination thereof that the functional entity is allowed to manage.
Method for setting up and for application of expected communication behavior and in communication system
A communication system includes an external entity and a 5G system (5GS), wherein the 5GS comprises a 5G core (5GC), wherein the 5GC comprises a functional entity, a Unified Data Management (UDM), a Session Management Function (SMF), and a User Plane Function (UPF). A method for setting up expected communication behavior information in the system includes: performing, by the external entity, an Application Programming Interface (API) call via an API of the functional entity and setting up an expected communication behavior for a subscriber or set of subscribers, a data network name (DNN), a 5G virtual network (VN), a slice or a combination thereof that the functional entity is allowed to manage.
INTELLIGENT CONTENT DISPLAY FOR NETWORK-BASED COMMUNICATIONS
Disclosed in some examples are devices, methods, systems, and machine-readable mediums for enhanced meeting room solutions to provide increased inclusiveness for both remote and in-room participants for network-based communication sessions, such as hybrid network-based communication sessions. Content of a first type is placed in a location exclusive of a discontinuity in a display device and content of a second type is placed in a location inclusive of the discontinuity of the display device.
AUTOMATED CLUSTERING OF SESSIONS OF UNSTRUCTURED TRAFFIC
A natural language processor extracts features from batches of unstructured traffic. A feature weighted distance engine computes a distance matrix between pairs of feature vectors for sessions of unstructured traffic using a weight vector that assigns importance to relative placement of features in feature vectors. The distance function used to compute the distance matrix with the weight vector is conducive to generating high-quality clusters and patterns in unstructured traffic. The sessions of unstructured traffic are clustered according to the pairwise distance matrix. Generated clusters are merged with clusters for previously analyzed sessions of unstructured traffic. A pattern identification engine extracts patterns from the merged clusters that correspond to behavior of applications generating the unstructured traffic.
Mission critical communication link hub
A method for hub for interfacing between a wireless mission critical communication link (MCCL) and a wired MCCL. The hub includes a wired interface a providing a physical layer connectivity to the wired MCCL; a plurality of ports coupled to the wired interface; a wireless interface providing a physical layer connectivity to the wireless MCCL; and a processor; and a memory containing instructions that, when executed by the processing circuitry, configure the hub to: receive a signal from a primary device through the wireless MCCL; determine a wireless communication cycle of the primary device; determine a wired communication cycle of a secondary device, wherein the secondary device is connected via the wired MCCL; synchronize a start time of the wired communication cycle to a start of the wireless communication cycle; and send the received signal to the secondary device at the synchronized start time of the wired communication cycle.
Machine learning techniques for detecting surges in content consumption
Disclosed embodiments include a content consumption monitor (CCM) determines surges in content consumption based on changes in content consumptions scores. The CCM determines the content consumptions scores for domains and/or organizations (orgs) based on session events generated by different devices/users from the org and/or domain, a number of events generated by the org/domain, content and/or user interactions with the content indicated by the events, relevancy scores of the content to one or more topics, and/or other criteria. The CCM detects surges in consumption or interest in a topic for the domain/org when the consumption score reaches a threshold and/or within a period of time. The CCM may adjust the consumption score based on the changes in the relevancy, number of events and/or the number of users over different time periods. Other embodiments may be described and/or claimed.
Machine learning techniques for detecting surges in content consumption
Disclosed embodiments include a content consumption monitor (CCM) determines surges in content consumption based on changes in content consumptions scores. The CCM determines the content consumptions scores for domains and/or organizations (orgs) based on session events generated by different devices/users from the org and/or domain, a number of events generated by the org/domain, content and/or user interactions with the content indicated by the events, relevancy scores of the content to one or more topics, and/or other criteria. The CCM detects surges in consumption or interest in a topic for the domain/org when the consumption score reaches a threshold and/or within a period of time. The CCM may adjust the consumption score based on the changes in the relevancy, number of events and/or the number of users over different time periods. Other embodiments may be described and/or claimed.
CONTROLLER DRIVEN RECONFIGURATION OF A MULTI-LAYERED APPLICATION OR SERVICE MODEL
Some embodiments provide novel inline switches that distribute data messages from source compute nodes (SCNs) to different groups of destination service compute nodes (DSCNs). In some embodiments, the inline switches are deployed in the source compute nodes datapaths (e.g., egress datapath). The inline switches in some embodiments are service switches that (1) receive data messages from the SCNs, (2) identify service nodes in a service-node cluster for processing the data messages based on service policies that the switches implement, and (3) use tunnels to send the received data messages to their identified service nodes. Alternatively, or conjunctively, the inline service switches of some embodiments (1) identify service-nodes cluster for processing the data messages based on service policies that the switches implement, and (2) use tunnels to send the received data messages to the identified service-node clusters. The service-node clusters can perform the same service or can perform different services in some embodiments. This tunnel-based approach for distributing data messages to service nodes/clusters is advantageous for seamlessly implementing in a datacenter a cloud-based XaaS model (where XaaS stands for X as a service, and X stands for anything), in which any number of services are provided by service providers in the cloud.