Patent classifications
H04J3/14
ACCESS POINT IDENTIFIERS IN 400ZR AND 400ZR+ PROTOCOLS
A first network element includes trail trace identifier information in an optical network frame. The first network element obtains data to transmit over an optical network link to a second network element. The first network element generates an optical network frame with alignment marker bytes, which are followed by padding bytes. The optical network frame also includes overhead bytes following the padding bytes. The overhead bytes include a Multi-Frame Alignment Signal (MFAS) byte, a link status byte, and reserved bytes. The optical network frame also includes a payload bytes following the overhead bytes. The payload bytes encode at least a portion of the data to transmit to the second network element. The first network element inserts trail trace identifier information into the reserved bytes in the overhead bytes. The trail trace identifier information identifies the first network element as a source of the optical network frame.
Power headroom report generation
Apparatuses, methods, and systems are disclosed for power headroom report generation. One method includes aggregating multiple serving cells. The method includes determining that a power headroom report is triggered. The method includes determining that an uplink resource for a new transmission on a serving cell of the multiple serving cells is allocated at a first time after the power headroom report is triggered. The method includes determining a power headroom value for each serving cell of the multiple serving cells being activated based on information received prior to and including a predetermined time before the start of the uplink resource at the first time. The method includes generating a power headroom report medium access control control element including at least the power headroom value for each serving cell of the multiple serving cells being activated.
SERVICE RESOURCE PRECONFIGURATION METHOD AND DEVICE, AND SYSTEM
Embodiments of this application disclose a service resource preconfiguration method and device, and a system. The method includes establishing a first working path, sending a first path message from a first node to a second node, the first path message including an instruction to the second node to preconfigure a second channel resource; and preconfiguring the second channel resource based on the first path message. Fast automatic service recovery can be implemented, and fault recovery performance can be improved.
METHOD AND APPRATUS FOR AN ALTERNATE COMMUNICATION PATH FOR CONNECTED NETWORKS
A method is disclosed for using an alternate communication path to send and receive data between a first network node and a second network node. The method includes establishing a first communication path between the first network node and the second network node that sends and receives data between the first network node and second network node and a second communication path between the first network node and the second network node that sends and receives data between the first network node and second network node. A diagnostic program tests the first and second communication paths for network failures causing the alternate network path to send and receive data between the first network node and second network node when a network failure in the first and second communication paths is detected and alerting a technician of the failure and that the first and second communication paths need repair. The first and second communication paths returning to normal operation upon the repair of the failure.
SYSTEM AND METHOD OF CLOCK RECOVERY IN A PACKET-COMPATIBLE NETWORK
There is provided a method of clock recovery and a system thereof. The method comprises: by master clock node or by client clock node, generating a first flow of time-stamped packets bearing indication of high priority of delivery and, in parallel, generating a second flow of time-stamped packets bearing indication of lower priority of delivery. By client clock node, processing the packets from the first flow separately from the packets from the second flow to define, separately for each flow, a function informative of changes of packets' delays in the respective flow over time; using the defined functions informative of changes of packets' delays in the first and the second flows over the same time intervals to assess a cause of the packets' delays changes; and applying a clock recovery algorithm in a manner differentiated in accordance with the assessed cause.
System and method of detecting hidden processes by analyzing packet flows
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
System and method of detecting hidden processes by analyzing packet flows
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
Time synchronization system, master station, and time synchronization method
A time synchronization system includes a master station (100) and slave stations (200) communicably connected to the master station (100). The master station (100) includes a contention determiner (114) and a time synchronization frame processing unit (113). The contention determiner (114) determines, based on receipt timings of a plurality of first time synchronization frames transmitted from the respective slave stations (200), whether the plurality of first time synchronization frames have a possibility of contention over relay processing. The time synchronization frame processing unit (113) discards, when the contention determiner (114) determines that the plurality of first time synchronization frames have the possibility of the contention, out of first time synchronization frames that have a possibility of mutual contention, a first time synchronization frame received later.
TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.
TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.