H04L43/0823

Updating security key

Certain embodiments provide a method of updating a security. The method can include monitoring a bearer that includes first and second radio accesses according to different radio technologies between user equipment and a communications network. One or more properties of the monitored bearer can be determined. An update of a security key utilized for securing communications over at least one of the radio accesses can be triggered in response to determining that the determined properties meet at least one triggering condition capable of indicating a need for the update.

Method and apparatus for collecting network data

Disclosed herein are a method and an NWDAF for collecting network data, including: transmitting a network exposure subscription request message including an event reporting granularity parameter to the NF; receiving a data set determined by the NF based on the event reporting granularity parameter from the NF through an event exposure notification message in at least one reporting cycle; and performing network data analysis using received data set.

Method and apparatus for collecting network data

Disclosed herein are a method and an NWDAF for collecting network data, including: transmitting a network exposure subscription request message including an event reporting granularity parameter to the NF; receiving a data set determined by the NF based on the event reporting granularity parameter from the NF through an event exposure notification message in at least one reporting cycle; and performing network data analysis using received data set.

Telemetry-based network switch configuration validation

Methods, apparatuses, and computer program products for telemetry-based network switch configuration validation are disclosed. An analytics engine captures a first network snapshot including telemetry data received from one or more network switches in a first state. Upon receiving a notice indicating that a network configuration change has been applied, the analytics engine initiates a timer in response to receiving the notice. The analytics engine captures, in response to expiration of the timer, a second network snapshot including telemetry data received from the one or more network switches in a second state and compares the first network snapshot and the second network snapshot. In dependence upon the comparison of the first network snapshot to the second network snapshot, the analytics engine validates the network configuration change.

Resilient data communications with physical layer link aggregation, extended failure detection and load balancing
11558285 · 2023-01-17 · ·

Rapid channel failure detection and recovery in wireless communication networks is needed in order to meet, among other things, carrier class Ethernet channel standards. Thus, resilient wireless packet communications is provided using a physical layer link aggregation protocol with a hardware-assisted rapid channel failure detection algorithm and load balancing, preferably in combination. This functionality may be implemented in a Gigabit Ethernet data access card with an engine configured accordingly. In networks with various topologies, these features may be provided in combination with their existing protocols.

Resilient data communications with physical layer link aggregation, extended failure detection and load balancing
11558285 · 2023-01-17 · ·

Rapid channel failure detection and recovery in wireless communication networks is needed in order to meet, among other things, carrier class Ethernet channel standards. Thus, resilient wireless packet communications is provided using a physical layer link aggregation protocol with a hardware-assisted rapid channel failure detection algorithm and load balancing, preferably in combination. This functionality may be implemented in a Gigabit Ethernet data access card with an engine configured accordingly. In networks with various topologies, these features may be provided in combination with their existing protocols.

Creating a packet with a loopback label stack to detect network link/node failures

Systems and methods for creating loopback packets for transmission through a section of a network for the purpose of testing the operability of links and nodes in this section of the network are provided. A method, according to one implementation, includes a step of obtaining information, by a Network Element (NE), about the topology of the network related to at least the nodes in direct communication with a peer node. The method also includes a step of generating one or more loopback packets, where each loopback packet includes at least a header having a path list including one or more nodes of the plurality of nodes in the network. Each path list defines an order of nodes through which the respective loopback packet is to be transmitted.

Test system and method for testing a medical device
20230038438 · 2023-02-09 ·

Improved testing of medical devices, in particular medical devices providing wireless communication capabilities. A communication link between a medical device under test and the communication tester is established and a signal quality indicator of the established communication link is monitored while interfering the communication link by one or more interfering signals.

Test system and method for testing a medical device
20230038438 · 2023-02-09 ·

Improved testing of medical devices, in particular medical devices providing wireless communication capabilities. A communication link between a medical device under test and the communication tester is established and a signal quality indicator of the established communication link is monitored while interfering the communication link by one or more interfering signals.

Computer network troubleshooting and diagnostics using metadata

A device is configured to detect a triggering event within a network that is associated with a communication error between a first network device and a second network device. The device is further configured to identify a first node in a computer network map corresponding with the first network device and to identify node properties for the first node. The device is further configured to identify the error correction instructions in the node properties for the first node that include an address for rerouting data traffic to a third network device. The device is further configured to apply the error correction instructions where applying the error correction instructions suspends data traffic to the second network device and reroutes data traffic to the third network device.