Patent classifications
H04L69/03
Method and apparatus for transmitting data packets and method and apparatus for receiving data packets
A data packet comprises a header and a payload. At least one digital signal processor is used to configure the payload to transport at least one full service data unit, one or two service data unit fragments, or at least one full service data unit and at least one service data unit fragment. A service data unit fragment is only located (i) at the beginning of the payload or at the end of the payload or (ii) at the beginning of the payload and at the end of the payload. At least one digital signal processor is used to configure a single field in the header consisting of a first bit and a second bit, even when a number of full service data units and service data unit fragments in the payload is more than two, the single field indicating whether (i) the payload begins with a fragment of a service data unit and (ii) the payload ends with a service data unit fragment. At least one digital signal processor is used to form the data packet including the configured header and the configured payload. A transmitter transmits the data packet.
Method and system for allowing the use of domain name based network policies stored in a second device in enforcing network policy at a first device
A method and a system for creating Internet Protocol address based network policies (IPPs) by using domain name based network policies (DNNTPs) is disclosed. The DNNTPs are stored in a second device, and are used for enforcing IPPs at a first device. The first device retrieves one or more DNNTPs from the second device and monitors network traffic for Domain Name System (DNS) look-up reply. When a network device receives a record Domain Name System look-up reply, the network device identifies one or more Internet Protocol addresses of one or more host names specified in the address record Domain Name System look-up reply, then determine whether the one or more host names contain a domain name used in one or more DNNTPs and create one or more IPPs.
Universal protocol for power tools
A method for communicating between motorized power tools includes establishing, using a physical interface of a first power tool, a wireless radio link between the first power tool and a second power tool. The first power tool has a first motor and the second power tool has a second motor. A signal is received over the wireless radio link, via the physical interface, at the first power tool from the second power tool using a first wireless communication protocol. The signal includes an identifier. The second power tool is verified as authorized to send the signal to the first power tool based on the identifier. A tool component of the first power tool is controlled responsive to the signal.
Method, device and computer program for communicating information relating to wireless power transmission, and recording medium thereof
The present disclosure relates to a method, device and computer program for communicating information relating to wireless power transmission, and a recording medium thereof. A quick discovery method by means of out-of-band (OOB) in a wireless power transmission system according to an embodiment of the present disclosure can comprise the steps in which: a power transmitter (PTX) receives one or more advertisement data items from a power receiver (PRX) in the OOB; the PTX obtains a first service or characteristic of the PRX in the OOB on the basis of the advertisement data items; power transmission from the PTX to the PRX is initiated in-band on the basis of the first service or characteristic; and the PTX obtains a second service or characteristic of the PRX in the OOB after the power transmission has been initiated.
Systems, methods, and devices for smart mapping and VPN policy enforcement
Aspects of the embodiments are directed to systems, methods, and computer program products to program, via a northbound interface, a mapping between an endpoint identifier (EID) and a routing locator (RLOC) directly into a mapping database at a mapping system; receive, from a first tunneling router associated with a first virtual network, a mapping request to a second virtual network, the first router compliant with a Locator/ID Separation Protocol, the mapping request comprising an EID tuple that includes a source identifier and a destination identifier; identify an RLOC based, at least in part, on the destination identifier of the EID tuple from the mapping database; and transmit the RLOC to the first tunneling router implementing an high level policy that has been dynamically resolved into a state of the mapping database.
Femtocell local breakout management services
Management services are provided during local breakout at a femto access point (FAP). In an aspect, the FAP facilitates policy management and employs a policy component to perform an analysis and enforce a set of policies for dynamically selecting an optimal route for traffic received at the FAP based on a decision-making process. Typically, the set of policies can specify different routes based on various factors, such as, but not limited to, type of traffic, current and/or future network resource availability, current time, day and/or date, location of the FAP, location of a UE sending/receiving the traffic, a lowest cost route, and/or route based on cost-benefit, etc. Further, a monitoring component is employed to observe the route employed by that traffic, which can be utilized by various services, such as, billing, Quality of Service, security management, address management, failure management and/or provisioning.
Non-access stratum based access method and terminal supporting the same
A non-access stratum based access method and a terminal supporting the same. The terminal receives an Internet protocol (IP) address allocated from a first gateway included in a non-3.sup.rd generation partnership project (3GPP) access network. In addition, the terminal applies a non-access stratum (NAS) protocol to a first device managing mobility of the terminal through the IP address.
Routing solutions for LTE-WLAN aggregation
Apparatus and methods are provided for user-plane LWA PDU routing. In one novel aspect, LTE PDU packets are routed through a WLAN AP to a UE by encapsulation of the data packets. In one embodiment, a bridge/VLAN architecture is used. The UE identifies one or more Ethernet Frames received the WLAN interface as containing the PDCP PDUs by decoding the EtherType. In another embodiment, the WLAN terminated tunneling is used by decoding the EtherType of indicating the PDCP type. In another novel aspect, an UE-terminated tunneling is created. In one embodiment, the IP tunneling is used. In another embodiment, the GRE tunneling is used. The GRE header contains a KEY field to identify the packets as being the LWA packets. In yet another embodiment, the IPSec tunneling is used. The SPI of the header is used to identify the packets as being the LWA data packets.
COMMUNICATION TERMINAL, COMMUNICATION METHOD, AND RECORDING MEDIUM
In a communication terminal, a storage medium is configured to store service information including first to fourth information associated with each other. A controller is configured to acquire fifth to seventh information when a service request including use information is generated from the application. The controller is configured to determine whether or not the fifth information matches the second information, the sixth information matches the third information, and the seventh information matches the fourth information. The controller is configured to connect to the access point represented by the first information associated with the second information, the third information, and the fourth information matching the fifth information, the sixth information, and the seventh information, respectively, acquired on the basis of the use information by using the communicator.
Application control
Systems and methods for controlling applications on a network are provided. According to one embodiment, a network security device intercepts network traffic and conducts a heuristic detection of an application protocol used in the network traffic by multiple application protocol identifying engines defined in a heuristic rule. According to another embodiment, the network security device confirms a suspect application protocol as an actual application protocol used in the network traffic by sending a probing request to the destination peer of the network traffic based on the suspect application protocol. The suspect application protocol is confirmed if an appropriate response is received from the destination peer.