Patent classifications
H04L69/40
Data logging in aerial platform
An unmanned aerial vehicle manages storage of data and transfer between other connected devices. The unmanned aerial vehicle captures sensor data from sensors on the unmanned aerial vehicle. The unmanned aerial vehicle transfers the captured sensor data from the unmanned aerial vehicle to a remote controller via a wireless interface. The captured data may be transferred via a TCP link, a UDP link, or a combination thereof. If a loss of link is detected, the captured sensor data is stored to a buffer and a battery level of the unmanned aerial vehicle and a flight status of the unmanned aerial vehicle is monitored. The stored sensor data is transferred from the buffer to a non-volatile storage responsive to the battery level dropping below a predefined threshold or detecting that the unmanned aerial vehicle is stationary and a shutdown may be imminent.
PROVIDING PERSISTENT EXTERNAL INTERNET PROTOCOL ADDRESS FOR EXTRA-CLUSTER SERVICES
Techniques are presented herein for providing a persistent external Internet Protocol (IP) address for extra-cluster services. One example involves initiating, in a cluster, a first pod with a label that identifies a service. The first pod is configured to provide the service to one or more network entities outside the cluster. The first pod is assigned an IP address configured for communicating outside the cluster. A mapping of the service to the IP address is stored. In response to a determination that the service has been disrupted, a second pod is initiated in the cluster with the label that identifies the service. The second pod is configured to provide the service to the one or more network entities outside the cluster. Based on the mapping and the label that identifies the service, the IP address is assigned to the second pod.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR COMMUNICATING DELEGATED NETWORK FUNCTION (NF) DISCOVERY RESULTS BETWEEN SERVICE COMMUNICATION PROXIES (SCPs) AND USING THE DELEGATED NF DISCOVERY RESULTS FOR ALTERNATE ROUTING
A method for communicating delegated NF discovery results between SCPs and using the delegated NF discovery results for alternate SBI service request routing includes receiving, at a first SCP and from a consumer NF instance, an SBI service request. The method further includes determining that delegated NF discovery is required, and, in response, performing delegated NF discovery on behalf of the consumer NF instance. The method further includes receiving an NF discovery response including delegated NF discovery results. The method further includes sending the SBI service request including the delegated NF discovery results to a second SCP. The method further includes receiving, at a second SCP, the SBI service request including the delegated NF discovery results, forwarding the SBI service request towards a first producer NF instance selected by the first SCP, detecting failure of routing or processing of the SBI service request, and using the delegated NF discovery results for alternate routing of the SBI service request.
Time based SLA compliance for disaster recovery of business critical VMs
One example method includes receiving data segments that are not already part of a full disk image of a backup, storing the data segments in storage, determining whether or not an aggregate total of data segments in the storage, that are not already part of a full disk image of a backup, equals or exceeds a threshold, when the aggregate total of data segments in the storage equals or exceeds the threshold, creating a full disk image of a backup that includes the data segments in storage, and storing the created full disk image of the backup to a recovery disk.
Network computing system executing programmatic adapters to implement asynchronous communications
A computing system can establish asynchronous network communications with exchanges to facilitate cross-medium transactions between originating and recipient clients. Such communications can result in filtering out errant responses that would otherwise cause an open transaction to fail.
Systems and non-transitory computer-readable storage media for real-time event management system for mobile devices
A computerized system and method of managing events surrounding the lifecycle of used and new mobile devices. The system provides a “360 view” that integrates a mobile device's service options, such as financing and device protection, as well as at the device level regarding potential hardware/software errors. This provides an end-to-end view of consumers, such as claims on device protection plans, repayment issues, utilization of upgrades and/or other information in a user's profile across multiple underlying systems during the device's lifecycle.
Throughput guidance based on user plane insight
Communication systems may benefit from more accurate information regarding the passage of data through a network. For example, certain wireless communication systems may benefit from throughput guidance based on user plane insight and optional radio channel information. A method can include monitoring the bandwidth available on at least one of a per data bearer, per application or per transmission control protocol flow basis. The method can also include providing throughput guidance to an entity configured to attempt at least one of transmission control protocol or content level optimization. The throughput guidance can be configured to assist the entity in attempting the at least one of the transmission control protocol or content level optimization.
Systems and methods for enabling a highly available managed failover service
a computing system that receives and stores configuration information for the application in a data store. The configuration information comprises (1) identifiers for a plurality of cells of the application that include at least a primary cell and a secondary cell, (2) a defined state for each of the plurality of cells, (3) one or more dependencies for the application, and (4) a failover workflow defining actions to take in a failover event. The computing system receives an indication, from a customer, of a change in state of the primary cell or a request to initiate the failover event. The computing system updates, in the data store, the states for corresponding cells of the plurality of cells based on the failover workflow and updates, in the data store, the one or more dependencies for the application based on the failover workflow.
Security redundancy
Various example embodiments for supporting security in a communication system are presented. Various example embodiments for supporting security in a communication system may be configured to support stateful security redundancy in the communication system. Various example embodiments for supporting stateful security redundancy in a communication system may be configured to support stateful security redundancy for a set of client devices based on a set of security nodes arranged in a security redundancy architecture. Various example embodiments for supporting stateful security redundancy for a set of client devices based on a set of security nodes arranged in a security redundancy architecture may be configured to support stateful security redundancy for a client device based on a security redundancy domain including an active security node and one or more standby security nodes.
IMS reregistration method and system therefor
A method and system in which upon occurrence of a P-CSCF failure, a network sends an IMS reregistration request message to a UE. An S-CSCF or an AS monitors a P-CSCF to detect occurrence of a failure in the P-CSCF. Upon detecting the occurrence of a P-CSCF failure, the S-CSCF or the AS sends a request message for IMS reregistration to the UEs being served by the failed P-CSCF. In this manner, the UE can continuously receive the service even though a failure occurs in the P-CSCF.