H04L69/26

Method and device for automatically implementing IOAM encapsulation and storage medium

Disclosed are a method and a device for automatically implementing IOAM encapsulation, and a storage medium. The method comprises: sending, at an IOAM ingress node, a first message carrying IOAM configuration request information to an IOAM centralized configuration point; receiving, at the IOAM ingress node, a second message carrying IOAM configuration information of IOAM transmission nodes sent from the IOAM centralized configuration point; and performing, at the IOAM ingress node, IOAM encapsulation on a service data message according to the IOAM configuration information of the IOAM transmission nodes.

Security, monitoring and automation controller access and use of legacy security control panel information

A system, method and apparatus for controller functionality for each of security, monitoring and automation, as well as a bidirectional Internet gateway, is provided. Such functionality is provided by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. In addition, functionality for gathering configuration information from a previously-installed security system and using that information in a subsequent takeover of that security system is provided.

Method for managing handover roaming

A communication system comprises a first LPWAN network of a first operator and a second LPWAN network of a second operator. The first network comprises subnetworks implementing separate respective transport protocols. The subnetworks comprise at least one convergence node and communication nodes integrating gathering gateways. The first network comprises servers interconnected to a server of the second network interfacing an application server and an authentication server. Uplink frames of application data are transported from an end device of the second operator to the application server by successive relayings of the servers. However, when the end device of the second operator requests to join the communication system in order to benefit from the services of the application server, the gathering gateways communicate directly with the authentication server by shortcutting the other servers as well as the convergence nodes to which said gathering gateways are respectively attached.

Scalable in-network computation for massively-parallel shared-memory processors

A network device configured to perform scalable, in-network computations is described. The network device is configured to process pull requests and/or push requests from a plurality of endpoints connected to the network. A collective communication primitive from a particular endpoint can be received at a network device. The collective communication primitive is associated with a multicast region of a shared global address space and is mapped to a plurality of participating endpoints. The network device is configured to perform an in-network computation based on information received from the participating endpoints before forwarding a response to the collective communication primitive back to one or more of the participating endpoints. The endpoints can inject pull requests (e.g., load commands) and/or push requests (e.g., store commands) into the network. A multicast capability enables tasks, such as a reduction operation, to be offloaded to hardware in the network device.

Device and method for V2X communication
11218851 · 2022-01-04 · ·

Disclosed is a method by which a V2X communication device for a vehicle transmits a CPM message. The method for transmitting the CPM message comprises the steps of: determining a transmission mode of the CPM message for generating a collective perception for at least one object detected by the V2X communication device; and transmitting the CPM message on the basis of the transmission mode. The CPM message corresponds to a dynamic CPM message for transmitting dynamic data or a full CPM message for transmitting the dynamic data and static data, wherein the dynamic CPM message can include a dynamic container containing the dynamic data, and the full CPM message can include the dynamic container containing the dynamic data and the static container containing static data.

SEMANTIC ANALYSIS METHOD FOR INDUSTRIAL CONTROL PROTOCOL BASED ON INDUSTRIAL SIDE-INFORMATION
20230324890 · 2023-10-12 ·

A semantic analysis method includes gathering patterned side-information in an industrial process and identifying frequency patterns of semantic channels; identifying a set of relevant packets of the semantic channels and deducing locations of the packets where semantics are located; and performing modeling on behavior semantics in the industrial process based on field semantics of the packets and extracting association rules among the semantic channels. The semantic analysis method for the industrial control protocol based on industrial side-information provided by the present invention takes a problem of a difference on response delays of the side-information and information data of protocol packets in an industrial control system into consideration, and analyzes the positions of the semantics of the industrial control protocol, the association rules among the semantics and the like effectively to solve problems in the prior art as the patterned industrial side-information cooperates with the corresponding protocol packets.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
20230318876 · 2023-10-05 · ·

A first information processing apparatus (10) according to the present disclosure includes a control communication unit configured to transmit and receive control communication information according to a control communication protocol, and an adaptor configured to generate first control communication information of a first communication method for one-to-many communication from among the control communication information required for control communication based on the control communication protocol, the adaptor generating the first control communication information with use of information acquired along a path different from a communication path of the control communication on a network in a cloud, and to output the first control communication information to the control communication unit.

Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces

A single platform for controller functionality for each of security, monitoring and automation, as well as providing a capacity to function as a bidirectional Internet gateway, is provided. Embodiments of the present invention provide such functionality by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. Embodiments of the present invention further provide such functionality by providing for installation of removable, modular communication adapters for communication with a variety of devices external to the security, monitoring and automation controller.

Configuring a protocol in a virtual private network

A method for configuring a protocol in a virtual private network (VPN) service environment, the method including receiving, from a user device, device information associated with operation of the user device during an established VPN connection; configuring, based at least in part on the device information, a given VPN protocol from among a plurality of VPN protocols for utilization during the established VPN connection; and transmitting, to the user device, information associated with the given VPN protocol to enable the user device and a VPN server to utilize the given VPN protocol during the established VPN connection. Various other aspects are contemplated.

Using a NIC as a network accelerator to allow VM access to an external storage via a PF module, bus, and VF module

Some embodiments provide a method of providing distributed storage services to a host computer from a network interface card (NIC) of the host computer. At the NIC, the method accesses a set of one or more external storages operating outside of the host computer through a shared port of the NIC that is not only used to access the set of external storages but also for forwarding packets not related to an external storage. In some embodiments, the method accesses the external storage set by using a network fabric storage driver that employs a network fabric storage protocol to access the external storage set. The method presents the external storage as a local storage of the host computer to a set of programs executing on the host computer. In some embodiments, the method presents the local storage by using a storage emulation layer on the NIC to create a local storage construct that presents the set of external storages as a local storage of the host computer.