H04L1/242

Systems and methods of convergent multi-bit feedback

Provided are systems and methods for convergent error vector indexing and retransmission in wireless data verifications. An example method includes transmitting a network packet to a receiver; receiving a further network packet being a copy of the network packet as received by the receiver, determining, based on the network packet and the further network packet, an error vector and locations of errors in the further network packet; sending, to the receiver, a first indexing packet including the locations of the errors; receiving a second indexing packet being a copy of the first indexing packet as received by the receiver; determining, based on the error vector and the second indexing packet, the locations of the errors in the second indexing packet; and sending a third indexing packet including the locations of the errors to the receiver, where the receiver corrects the further network packet using the third indexing packet.

Communication channel calibration for drift conditions

A method and system provides for execution of calibration cycles from time to time during normal operation of the communication channel. A calibration cycle includes de-coupling the normal data source from the transmitter and supplying a calibration pattern in its place. The calibration pattern is received from the communication link using the receiver on the second component. A calibrated value of a parameter of the communication channel is determined in response to the received calibration pattern. The steps involved in calibration cycles can be reordered to account for utilization patterns of the communication channel. For bidirectional links, calibration cycles are executed which include the step of storing received calibration patterns on the second component, and retransmitting such calibration patterns back to the first component for use in adjusting parameters of the channel at first component.

SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING SYSTEM STACK

A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.

APPLICATION MONITORING PRIORITIZATION

An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.

METHODS, SYSTEMS AND DEVICES TO IMPROVE CHANNEL UTILIZATION
20230027623 · 2023-01-26 · ·

A method that incorporates aspects of the subject disclosure may include, for example, obtaining, by a system comprising a processor, interference information associated with one or more physical resource blocks (PRBs) from each base station of a plurality of base stations. Further, the method can include determining, by the system, from the interference information a strategy for improving a PRB utilization of a first base station of the plurality of base stations. In addition, the method can include conveying, by the system, the strategy to at least one base station of the plurality of base stations. Other embodiments are disclosed.

Round trip time (RTT) measurement based upon sequence number

Systems, methods, and computer-readable media are provided for determining a packet's round trip time (RTT) in a network. A system can receive information of a packet sent by a component of the network and further determine an expected acknowledgement (ACK) sequence number associated with the packet based upon received information of the packet. The system can receive information of a subsequent packet received by the component and determine an ACK sequence number and a receiving time of the subsequent packet. In response to determining that the ACK sequence number of the subsequent TCP packet matches the expected ACK sequence number, the system can determine a round trip time (RTT) of the packet based upon the received information of the packet and the received information of the subsequent packet.

METHOD AND APPARATUS FOR INCREASING PERFORMANCE OF COMMUNICATION PATHS FOR COMMUNICATION NODES
20230387951 · 2023-11-30 · ·

A system that incorporates aspects of the subject disclosure may perform operations including, for example, obtaining uplink information associated with a plurality of communication devices transmitting wireless signals on a plurality of uplink paths, performing, based on the uplink information, a plurality of measurements of the plurality of uplink paths, identifying a measurement from the plurality of measurements that is below a threshold, and initiating a corrective action to improve a measurement of an affected uplink path of the plurality of uplink paths based on the identifying. Other embodiments are disclosed.

CORRELATING NETWORK & PHYSICAL LAYER ACTIVITIES
20220385322 · 2022-12-01 · ·

A system that incorporates aspects of the subject disclosure may perform operations including, for example, a method of identifying, by a system comprising a processor, network communication degradation in one or more layers of a multi-layered communication protocol above a physical layer, wherein the network communication degradation is associated with communications taking place through a network, in part over a radio frequency link, between a plurality of communication devices, obtaining, by the system, data from a layer below the one or more layers of the multi-layered communication protocol identified as having the network communication degradation, determining, by the system, one or more geographic regions of the network associated with the network communication degradation from the data, and mitigating, by the system, effects of the network communication degradation in the one or more geographic regions of the network. Other embodiments are disclosed.

Application monitoring prioritization

An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.

Channel quality determination
11539605 · 2022-12-27 · ·

This application relates to determining transmission quality of a communication channel, in particular for determining a measure of errors in data transmitted as multi-bit symbols. Described is an error checker with an input for receiving an input signal comprising a series of modulated symbols, wherein each symbol encodes multiple bits of a pseudo-random bit sequence. A demodulator is configured to receive the input signal and only partially demodulate at least some of the symbols to generate a partially demodulated bit sequence. A PRBS module is configured to receive the partially demodulated bit sequence and determine the pseudo-random bit sequence and a comparator compares the output of the demodulator to an expected output based on the pseudo-random bit sequence determined by the PRBS module.