H04L69/40

IMS reregistration method and system therefor

A method and system in which upon occurrence of a P-CSCF failure, a network sends an IMS reregistration request message to a UE. An S-CSCF or an AS monitors a P-CSCF to detect occurrence of a failure in the P-CSCF. Upon detecting the occurrence of a P-CSCF failure, the S-CSCF or the AS sends a request message for IMS reregistration to the UEs being served by the failed P-CSCF. In this manner, the UE can continuously receive the service even though a failure occurs in the P-CSCF.

Generation of a request to initiate a secure data transfer in a computing environment

Aspects of the invention include receiving a request from an initiator channel on an initiator node to initiate a secure communication with a responder channel on a responder node. The receiving is at a local key manager (LKM) executing on the initiator node. A security association is created at the LKM between the initiator node and the responder node. An identifier of a shared key assigned for communication between the initiator node and the responder node is obtained, and a message requesting initialization of the secure communication between the initiator channel and the responder channel is built. The message includes the identifier of the shared key. The message is sent to the initiator channel.

A Network Device And A Method Of Configuring The Network Device Therefor

Method and network device for providing redundancy in an industrial network includes a first port group connected to a first network segment of the industrial network, and includes a switch module that has a plurality of southbound ports, wherein at least one southbound port is connected to a corresponding end device, where each port group has a pair of redundant northbound ports connected to a link redundancy entity having two or more interlinked ports connectable to one or more south-bound ports of switch module based on network topology for enabling redundant links between end devices connected to the southbound ports and the first network segment.

Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP

Some embodiments provide a method for providing redundancy and fast convergence for modules operating in a network. The method configures modules to use a same anycast inner IP address, anycast MAC address, and to associate with a same anycast VTEP IP address. In some embodiments, the modules are operating in an active-active mode and all nodes running modules advertise the anycast VTEP IP addresses with equal local preference. In some embodiments, modules are operating in active-standby mode and the node running the active module advertises the anycast VTEP IP address with higher local preference.

Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP

Some embodiments provide a method for providing redundancy and fast convergence for modules operating in a network. The method configures modules to use a same anycast inner IP address, anycast MAC address, and to associate with a same anycast VTEP IP address. In some embodiments, the modules are operating in an active-active mode and all nodes running modules advertise the anycast VTEP IP addresses with equal local preference. In some embodiments, modules are operating in active-standby mode and the node running the active module advertises the anycast VTEP IP address with higher local preference.

Method and apparatus for reporting power down events in a network node without a backup energy storage device
11539609 · 2022-12-27 · ·

A computer implemented method and apparatus for reporting power down events in mesh nodes without a backup energy storage device. The method comprises reporting power down events in mesh nodes without a backup energy storage device comprising: listening, by a powered node in a network, for a heartbeat of a neighboring node, wherein the neighboring node does not have a backup energy storage device; pinging the neighboring node when a heartbeat is not heard within a predefined time period; and sending, by the powered node, a message toward a head end server indicating a power down event of the neighboring node.

Transmission of medical information in disrupted communication networks

Described herein are methods and systems to send/receive medical data from one or more electronic devices to a secondary medical unit in delayed, intermittently-connected, low-bandwidth (DIL) environments. An application executing on the electronic devices may, in response to detecting a disruption within a communication network, execute an offline communication protocol to transmit medical data among a predetermined number of other electronic devices, wherein the offline communication protocol does not use the communication network. The application may then receive a request from a server of the secondary medical unit to transmit at least a part of the medical data. In response to authenticating the request, the application then transmits the medical data using an online communication protocol that uses the communication network or using an offline communication protocol.

Method, Apparatus and Device for Determining Cluster Network Card, and Readable Storage Medium
20220407839 · 2022-12-22 ·

A method, apparatus and device for determining a cluster network card, and a computer readable storage medium. The method comprises: reading a network segment of a Cluster IP from a configuration file of a current node; determining the type of the network segment of the Cluster IP by means of an address string in the network segment of the Cluster IP; obtaining an IP and a network card corresponding to the type of the network segment of the Cluster IP on the current node; and calculating the network segment of each IP, determining the IP corresponding to the network segment with the same address string as a Cluster IP, and determining the network card where the IP is located as a cluster network card. According to the disclosure, the IP corresponding to the network segment with the same address string in the network segments of the Cluster IP is determined as the Cluster IP, and the network card where the IP is located is determined as the cluster network card, so that the cluster network card can be automatically and accurately found according to the configuration file.

Method, Apparatus and Device for Determining Cluster Network Card, and Readable Storage Medium
20220407839 · 2022-12-22 ·

A method, apparatus and device for determining a cluster network card, and a computer readable storage medium. The method comprises: reading a network segment of a Cluster IP from a configuration file of a current node; determining the type of the network segment of the Cluster IP by means of an address string in the network segment of the Cluster IP; obtaining an IP and a network card corresponding to the type of the network segment of the Cluster IP on the current node; and calculating the network segment of each IP, determining the IP corresponding to the network segment with the same address string as a Cluster IP, and determining the network card where the IP is located as a cluster network card. According to the disclosure, the IP corresponding to the network segment with the same address string in the network segments of the Cluster IP is determined as the Cluster IP, and the network card where the IP is located is determined as the cluster network card, so that the cluster network card can be automatically and accurately found according to the configuration file.

IDENTIFYING AN ACTIVE ADMINISTRATION FUNCTION (ADMF) IN A LAWFUL INTERCEPTION DEPLOYMENT THAT UTILIZES A PLURALITY OF ADMFS
20220407895 · 2022-12-22 ·

A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.