Patent classifications
H04L69/14
Secure remote computer network
A VPN is established between a client and a remote server. Data is partitioned into a plurality of packets. The packets are encrypted and scheduled for transmission over a cellular and a Wi-Fi connection. Scheduling of the packets is dynamically adjusted. Addresses of the encrypted packets are translated to match network addresses of respective physical interfaces. Packets are transmitted from the client to the server based on the scheduling. A packet that is transmitted on one of the connections and is subsequently lost is subsequently transmitted on the other connection.
Secure remote computer network
A VPN is established between a client and a remote server. Data is partitioned into a plurality of packets. The packets are encrypted and scheduled for transmission over a cellular and a Wi-Fi connection. Scheduling of the packets is dynamically adjusted. Addresses of the encrypted packets are translated to match network addresses of respective physical interfaces. Packets are transmitted from the client to the server based on the scheduling. A packet that is transmitted on one of the connections and is subsequently lost is subsequently transmitted on the other connection.
Optimizing wireless networking using a virtual geographic information system overlay
In a connected vehicle environment, network connection parameters such as a network congestion window and bit rate are automatically adjusted dependent on a location of a vehicle in order to optimize network performance. A geospatial database stores learned relationships between network performance of a connected vehicle at different physical locations when configured in accordance with different network parameters. The vehicle can then adjust its network parameters dynamically dependent on its location. A vehicle may maintain multiple connections to different networks concurrently for transmitting duplicate data of a data stream, with the vehicle independently adjusting parameters associated with different networks to optimize performance.
SIGNALING FOR MULTI-LINK COMMUNICATION IN A WIRELESS LOCAL AREA NETWORK (WLAN)
This disclosure provides systems, methods, and apparatus, including computer programs encoded on computer-readable media, for signaling between an access point (AP) multi-link device (MLD) and a non-AP MLD that support multi-link communication in a wireless local area network (WLAN). In some implementations, a multi-link association may include a first link (referred to as an anchor link) and one or more other links (referred to as auxiliary links). The signaling may include control information to activate or deactivate auxiliary links dynamically based on communication load, throughput requirements, or quality of service (QoS). The signaling also may include requests, acknowledgments, or negotiation regarding multi-link connections. Furthermore, signaling and timing information may be used to coordinate when auxiliary links are used for communication or when to promote an auxiliary link to an anchor link.
Systems and methods for end point data communications anonymization for a communications hub
A method for end point data communications anonymization for a local communications hub is provided. The method commences with receiving a first request addressed to a server from a computing device. The method further includes selecting a first remote communications hub from a plurality of remote communications hubs. The method continues with modifying the first request to generate a first modified request and sending the first modified request to the first remote communications hub. The first remote communications hub modifies the first modified request to produce a second modified request and forwards the second modified request to the server. The method further includes receiving a first response to the second modified request from the server, modifying the received first response to produce a first modified response, modifying the first modified response to produce a second modified response, and providing the second modified response to the computing device.
Systems and methods for end point data communications anonymization for a communications hub
A method for end point data communications anonymization for a local communications hub is provided. The method commences with receiving a first request addressed to a server from a computing device. The method further includes selecting a first remote communications hub from a plurality of remote communications hubs. The method continues with modifying the first request to generate a first modified request and sending the first modified request to the first remote communications hub. The first remote communications hub modifies the first modified request to produce a second modified request and forwards the second modified request to the server. The method further includes receiving a first response to the second modified request from the server, modifying the received first response to produce a first modified response, modifying the first modified response to produce a second modified response, and providing the second modified response to the computing device.
Method and system for reducing connections to a database
A system automatically maintains a plurality of client connections associated with a plurality of clients, the plurality of client connections including active and idle connections. A first server receives a request from a client of the plurality of clients to access a second server of a plurality of second servers communicatively coupled to the first server, the plurality of second servers having varying communication protocols. The first server then identifies a first communication protocol associated with the second server and activating a link between the first server and the second server using the first communication protocol.
Method and system for reducing connections to a database
A system automatically maintains a plurality of client connections associated with a plurality of clients, the plurality of client connections including active and idle connections. A first server receives a request from a client of the plurality of clients to access a second server of a plurality of second servers communicatively coupled to the first server, the plurality of second servers having varying communication protocols. The first server then identifies a first communication protocol associated with the second server and activating a link between the first server and the second server using the first communication protocol.
Data communication in a MoCA access network
A modem configured to operate in a Multimedia over Coax Alliance, MoCA, access network is provided. The modem comprises a combiner having a coaxial interface for connection to a coaxial cable network and at least two frequency-separated southbound interfaces, SBIs; at least two MoCA chips, wherein each MoCA chip is configured to operate a MoCA access link and comprises a MoCA northbound interface, NBI, connected to one each of said SBIs of the combiner, and a data SBI; a link aggregation switch having at least two switchports connected to one each of the data SBIs, and a port to a data communication interface for connection to a client device for communication at a client data rate; wherein the MoCA chips are configured to operate separate MoCA access links at different MoCA access frequency bands over the coaxial cable network.
Cluster-aware multipath transmission control protocol (MPTCP) session load balancing
Systems and methods for establishing a multipath connection include a first processor of a first cluster forwarding a first request from a client to establish a first connection with a server to a second processor of a second cluster. A third processor of the first cluster receives a second request to establish a multipath connection between the client and the server. The third processor forwards the second request to the second processor responsive to determining that the second request is to establish a multipath connection. The second processor establishes the multipath connection that includes the first connection and a second connection used as paths of the multipath connection.