H04L12/2854

Service provider selection for application-driven routing

In one embodiment, a device receives application experience metrics for a software-as-a-service application. The device generates, based on the application experience metrics, a predictive model that predicts application experience scores for a plurality of network service providers that provide connectivity to the software-as-a-service application. The device selects a particular network service provider for use by a location, based on an application experience score predicted by the predictive model. The device sends an indication of the particular network service provider to the location.

Mitigating reflection-based network attacks

In one embodiment, a network device routes traffic along a network path and receives a performance threshold crossing alert regarding performance of the network path. The network device detects that the performance threshold crossing alert is part of a potential network attack by analyzing, by the device, the performance threshold crossing alert. The network device also provides a notification of the detected network attack.

Master tracking device

A master tracking device, including a first transceiver for a local area network (LAN) configured to acquire a tag information from a plurality of radio frequency identification (RFID) tags; a global positioning system (GPS) receiver configured to acquire a location information; a microcontroller; a time base; and a second transceiver for a wide area network (WAN) configured to transmit a time stamp and the acquired information to a server. In other aspects, a method of tracking asserts using a master tracking device and a non-transitory computer readable medium are provided.

SYSTEMS, METHODS AND APPARATUS FOR INTERACTING WITH A SECURITY SYSTEM USING A TELEVISION REMOTE CONTROL
20170318322 · 2017-11-02 ·

A method and apparatus is described for interacting with a security system using a television remote control. Commands sent by the remote control are received by an auxiliary interface device, which then provides the commands to a security system controller either directly, via a local-area network, or via a wide-area network and server. Status and acknowledgement messages are transmitted from the security system controller to the auxiliary device, whereupon they are provided to and displayed by a television in the form of a security dashboard

USING TRAFFIC DATA TO DETERMINE NETWORK TOPOLOGY
20170317899 · 2017-11-02 ·

A network topology may be determined based on flow data exported from a network. A topology generator analyzes flow data and determines a topology based on devices and connections between the devices indicated in the flow data. The topology generator may also infer types of the devices based on communication protocols and port numbers used by the devices. The topology generator may continually update the topology as additional flow data is exported from devices in the network and analyzed. As a result, the topology reflects a current status of devices in the network based on the communications indicated in the additional flow data. The topology generator may also retrieve flow data from a specified time period or flow data related to a specified device to generate topologies that are targeted for analysis or troubleshooting of a particular network issue.

Method and apparatus for transmitting signal of device to device user equipment in wireless communication system

An embodiment of the present invention provides a method for transmitting a device to device (D2D) signal by a user equipment (UE) in a wireless communication system. The method comprises: generating a K bit codeword from N bit information; allocating the K bit codeword to a first block and a second block; performing interleaving in each of the first block and the second block; mapping the interleaved codewords of the first block and the second block to a plurality of symbols of a subframe and transmitting the codewords mapped to the symbols, wherein the size of the second block is determined according to the number of symbols related to a guard interval among the plurality of symbols.

COMMUNICATION OVER A WIDE AREA NETWORK VIA AN APPLICATION-SPECIFIC PROTOCOL

A automation system, a computer and method for communicating includes exchanging data, between a first computer, a second computer and at least one automation device over a wide area network via an application-specific protocol, wherein one of the computers has a local network connection to the automation device, the application-specific protocol has an application layer, and the first and second computers execute respective first and second automation programs such that a transparent connection is provided for the automation programs and their application-specific protocol beyond local network boundaries which can be it efficiently, where signaling functions from lower communication layers that are missing are simulated by introducing event loops on both sides of the communication.

SEARCH, MEASUREMENTS, AND POSITIONING WITH AID OF MOTION DETECTION INFORMATION

Certain aspects of the present disclosure generally relate to enhanced procedures for search, measurement, and positioning with aid of motion detection information. According to certain aspects, a method is provided for wireless communications which may be performed, for example, by a user equipment (UE). The method generally includes determining one or more parameters of the UE; dynamically adjusting a periodicity of at least one of: cell search and measurements or global positioning system (GPS) signal acquisition based, at least in part, on the one or more parameters; and performing at least one of: the cell search and measurements or GPS signal acquisition according to the adjusted periodicity. In aspects, an enhanced technique for motion state detection is provided. The method may result in power savings, for example, when the UE is stationary and can reduce the periodicity that the UE performs search, measurement and GPS signal acquisition.

Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
11258595 · 2022-02-22 · ·

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

DATA PROCESSING METHOD AND DEVICE
20170302484 · 2017-10-19 ·

The present invention provides a data processing method and device. A data processing device receives a first data stream, where the first data stream includes a first data unit; obtains a boundary of the first data unit; obtains a first skew according to a first data amount and the boundary of the first data unit; and adjusts the first data stream according to the first skew, so that a difference between the boundary of the first data unit and a boundary of the first data amount is a length of an integral quantity of first data units, so that a relatively small amount of data is needed in such an adjustment, that is, one data stream is adjusted, and an adjusted data stream can meet a basic condition for multiplexing, which reduces operation complexity and costs and is beneficial to deploy and implement bit width conversion.