H04L69/26

METHOD AND SYSTEM FOR CORE NETWORK SUPPORT OF ACCESS NETWORK PROTOCOLS IN MULTI-HOMED REDUNDANCY GROUPS
20210014147 · 2021-01-14 ·

In one embodiment, a method according to the present disclosure includes receiving a topology change advertisement at a remote core edge node and performing a network address information removal operation. The topology change advertisement is received from a core edge node that is in communication with an access network. The topology change advertisement indicates that a topology change has occurred in the access network. The network address information removal operation removes network address information stored by the remote core edge node. The network address information is used by the remote core edge node in participating in communications with the core edge node.

Distributed global discovery servers in operational technology infrastructure

Cloud-assisted computing systems, devices, and associated methods of global discovery services are disclosed herein. In one embodiment, a computing device of a processing plant in an operational technology (OT) infrastructure is configured to upon detecting a data server is connected to the OT network in a processing plant, collect, from the detected data server, data representing a configuration of the data server and transmit a registration request containing the collected data to a cloud computing system via a secure connection to register the detected data server as a data source in the OT infrastructure. The computing device can then receive a registration confirmation indicating that the configuration of the data server is stored in the cloud computing system and is discoverable by client devices at other processing plants in the OT infrastructure.

METHOD AND DEVICE FOR PROCESSING DATA PACKETS

The invention proposes a method of encoding data packet by encoding type information and size information of said data packet into the same field. The invention also proposes a method of processing data packets received. The data packet comprises a header part and a message part. The header part comprises at least one bit for indicating the type of said data packet, said method comprising a step 101 of obtaining the size information of said data packet based on said at least one bit.

MANAGEMENT OF APPLICATIONS FOR A DEVICE LOCATED AT A PREMISES

Methods and systems for application management are disclosed. A request for an application may be received. An account associated with the request may be determined to be authorized for the application. The application may be sent to a computing device associated with the account. The computing device may be located at a premises and configured to communicate with one or more premises devices at the premises.

Detecting device, gateway device, and detecting method

Provided is a detecting device which detects an unauthorized message in a vehicle-mounted network including a plurality of vehicle-mounted devices and includes a monitoring unit that monitors a transmission message in the vehicle-mounted network, an acquisition unit that acquires a distribution of transmission intervals between the transmission messages, and a detecting unit that detects the unauthorized message on the basis of a monitoring result of the monitoring unit and the distribution acquired by the acquisition unit.

Node management gateway device in distribution network and grid network and method thereof

A distribution network system having a plurality of nodes using a scheme for data-centric object-oriented communication (DDS) effectively manages the frequently occurring connections for each node and the real-time addition or deletion of a node. Each node includes a gateway connected to a Wide Area Network (WAN) and configured to transmit and receive a message using a Real-Time Publish-Subscribe (RTPS) protocol that applies simple tunneling to communicate as if all nodes communicate in a Local Area Network (LAN), and to insert magic information into a header of the message, the inserted magic information including source IP information of the message, destination IP information of the message, and destination User Datagram Protocol (UDP) information of the message.

USING EXISTING SERVERS IN A WELLBORE ENVIRONMENT AS DATA SOURCES FOR STREAMING SERVERS

A streaming server can receive a request from a client device to access data about a wellbore environment in a database server. The database server can be communicatively coupled to a server, which can be communicatively coupled to the streaming server. The streaming server can communicate data in a standardized format with the server using a request and response protocol. The streaming server can communicate the wellbore environment data from the database server in a streaming format with the client device.

Suppressing broadcasts in cloud environments
10855612 · 2020-12-01 · ·

A method for suppressing broadcast messages includes intercepting a packet from a client device. If the packet is a bootstrap protocol (BOOTP) request, the method stores the packet in a BOOTP queue and sets a timer for the packet. If the packet is a dynamic host configuration protocol (DHCP) request, the method stores the packet in a DHCP queue and sets a timer for the packet. The method then processes the packets stored in the BOOTP queue and the DHCP queue, where each BOOTP packet in the BOOTP queue is processed before any DHCP packet in the DHCP queue is processed.

Remotely assigned, bandwidth-limiting internet access apparatus and method

A network (e.g., LAN/WLAN) contains individual private networks, each with an access point assistant (APA) containing an access point, web server, and other components, such as support voice interaction therewith. APAs are separated by device isolation over the LAN, but devices on each individual private network are accessible to each other directly, including cell phones, laptop computers, tablets, iPods, or other network aware devices literally owned or controlled by a guest assigned the APA at a hospitality property. The access management system assigns to an APA a bandwidth limit, which it then administers and accounts for, avoiding the classic problem of bandwidth hogs swamping the LAN with no accountability or control.

Reliable data transfer protocol for unidirectional network segments

A unidirectional transfer protocol allows data to be transmitted from a non-secure network into a secure network. A non-secure gateway may receive data and/or information, intended for the secure network, from one or more devices. The gateway may fragment the data and/or information into smaller chunks and transmit the chunks to a secure gateway via a unidirectional communication channel. The secure gateway may verify the chunks using one or more rules and reassemble the chunks when the data is validated. The reassembled data may be sent across a secure network enclave. The unidirectional transfer protocol may provide a hardware-agnostic solution for transmitting data over a unidirectional communication channel.