Patent classifications
H04L12/6418
Grade of service control closed loop
Systems and methods for managing network traffic receives, at a grade of service device, network traffic information for a plurality of network traffic channels from a network device separate from the grade of service device. The network traffic information is compared to a threshold to determine a behavior value for each network traffic channel. Each network traffic channel is mapped to a grade of service according to the behavior value.
Method for controlling a home-automation facility
The present invention concerns a method for controlling a home-automation facility comprising at least one central control unit (U1, U2) belonging to a home-automation facility; the method being executed by a user terminal (T) and comprising the following steps: selecting (ECTLT1) a first local connection mode (CM1) or a second wide area network connection mode; establishing (ECTLT2) a connection between the user terminal and at least one target unit (U1, U2, Sv), said at least one target unit (U1, U2, Sv) being a central control unit (U1, U2) in the case in which the first local connection mode (CM1) has been selected, and a management unit (Sv) in the case in which the second wide area network connection mode has been selected; sending (ECTLT3) a discovery message (MCTLD1, MCTLD2, MCTLD′) linked with a facility identifier (StID) to at least one target unit (U1, U2, Sv); receiving (ECTLT5, ECTLT7) at least one topology description message originating from the target unit (U1, U2, Sv) comprising a description of a group of devices (DGrSt) attached to the facility identifier (StID).
Digital fingerprint tracking
Techniques are described for tracking intruders of a monitored property by the unique identifying characteristics or “digital fingerprints” of electronic devices carried by the intruders. A system detects an alarm event at a monitored property based on output from at least one sensor located at the monitored property. In response to detecting the alarm event at the monitored property, the system initiates a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system determines electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system stores in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event.
Hybrid Wire-Fiber Data Networks for Electromagnetic and/or Ground-Noise Environments, Components Thereof, and Systems Incorporating Same
Hybrid wire-fiber data networks that include wire-fiber transceivers protected against environmental interferences. In some embodiments, a hybrid-wire-fiber data network of this disclosure provides a fiber-optic link between portions of one or more wired networks. In some embodiments, a hybrid wire-fiber data network of this disclosure includes a fiber-optic link that relies only on message-priority arbitration performed on wired portions of one or more wired networks. In some embodiments, a wire-fiber transceiver of this disclosure includes electromagnetic environment (EME) protective circuitry for one or both of input power and input signals. In some embodiments, a wire-fiber transceiver of this disclosure is configured for use with a controlled area network media-access protocol (CAN) and/or a derivative of CAN. Various data communication and other methods are also disclosed in addition to hybrid wire-fiber data networks and components thereof.
NETWORK AWARENESS OF DEVICE LOCATION
Systems and methods for managing a network are disclosed. One method can comprise detecting a triggering event at a node. Location information of the node can be transmitted to a routing device in response to the triggering event. Location information of the node can be transmitted to a management device. The management device can be configured to control an operation of one or more of the node and the routing device in response to the location information.
METHOD AND SYSTEM FOR DEEP PACKET INSPECTION IN SOFTWARE DEFINED NETWORKS
A method for deep packet inspection (DPI) in a software defined network (SDN). The method includes configuring a plurality of network nodes operable in the SDN with at least one probe instruction; receiving from a network node a first packet of a flow, the first packet matches the at least one probe instruction and includes a first sequence number; receiving from a network node a second packet of the flow, the second packet matches the at least one probe instruction and includes a second sequence number, the second packet is a response of the first packet; computing a mask value respective of at least the first and second sequence numbers indicating which bytes to be mirrored from subsequent packets belonging to the same flow; generating at least one mirror instruction based on at least the mask value; and configuring the plurality of network nodes with at least one mirror instruction.
Method for the operation and expansion of a network of lights
Method for the operation and expansion of a network of lights Described herein is method for the operation and the expansion of a network of lights, each light in the network including a control module which is assigned to a group, each control module being in communication with a group controller as well as control modules in the same group. The network can be expanded by installing new lights with their associated control modules (19), and each new control module scans its environment and transmits environmental information to a central server (20) where the environmental information is analysed and the new control modules are allocated into groups (21). After allocation to a group in which control modules may be moved from one group to another or a new group is formed, the new control modules are available for normal operation. This process is repeated for each new light and associated control module.
Systems and methods for providing load balancing as a service
The present disclosure is directed generally to systems and methods for providing load balancing as a service. A load balancer executing on a device intermediary to a server and a plurality of clients can receive a request from an agent executing on the server. The request can be to initiate establishment of a transport layer connection. The load balancer can accept the request to establish the transport layer connection with the server. The load balancer can receive a request to access the server from a client of the plurality of clients. The load balancer can forward the request to the server via the transport layer connection established between the load balancer and the server responsive to the request of the server.
Flight management system for UAVs
A flight management system for unmanned aerial vehicles (UAVS), in which the UAV is equipped for cellular fourth generation (4G) flight control. The UAV caches on-board a 4G modem, an antenna connected to the modern for providing for downlink wireless RF. A computer is connected to the modem. A 4G infrastructure to support sending via uplink and receiving via downlink from and to the UAV. The infrastructure further includes 4G base stations capable of communicating with the UAV along its flight path. An antenna in the base station is capable of supporting a downlink to the UAV. A control centre accepts navigation related data from the uplink. In addition, the control centre further includes a connection to the 4G Infrastructure for obtaining downlinked data. A computer for calculating location of the UAV using navigation data from the downlink.
Service layer registration
A service layer entity may register to another service layer entity and proactively request to gain access to the local services hosted by the registrar entity. A registrar entity may accept a registree entity's registration request but only grant access of its partial services to the registree entity. If a registree entity does not need to proactively request the services within its registration request message, the registrar entity decides what services may be needed by the registree entity and grants access of those services to the registree entity.