H04L61/5076

APPARATUS AND METHOD FOR SUPPORTING EDGE COMPUTING SERVICE IN WIRELESS COMMUNICATION SYSTEM
20230032185 · 2023-02-02 ·

The present disclosure relates to a 5th generation (5G) or pre-5G communication system for supporting a higher data transmission rate after a 4th generation (4G) communication system such as long-term evolution (LTE). According to various embodiments of the present disclosure, in an operating method of a first network node in a wireless communication system, provided is a method including transmitting a network function (NF) registration request message including profile information of a service supported by the first network node to a second network node, and receiving an NF registration response message including a registration result of the profile information from the second network node.

Transport layer handling for split radio network architecture

A radio network equipment central unit (20, 1700) receives a message (15) that indicates an update to a transport layer address of a radio network equipment distributed unit (10, 1600) from an old transport layer address (12A) to a new transport layer address (12B). The message (15) indicates the old transport layer address (12A) and indicates the new transport layer address (12B). The message (15) may be received from the radio network equipment distributed unit (10, 1600), or from a distributed unit of an integrated access backhaul donor. Regardless, for each of multiple user plane bearers or transport layer tunnels that are associated with the old transport layer address (12A), the radio network equipment central unit (20, 1700) may update a transport layer address of that bearer or tunnel from the old transport layer address (12A) to the new transport layer address (12B).

Transport layer handling for split radio network architecture

A radio network equipment central unit (20, 1700) receives a message (15) that indicates an update to a transport layer address of a radio network equipment distributed unit (10, 1600) from an old transport layer address (12A) to a new transport layer address (12B). The message (15) indicates the old transport layer address (12A) and indicates the new transport layer address (12B). The message (15) may be received from the radio network equipment distributed unit (10, 1600), or from a distributed unit of an integrated access backhaul donor. Regardless, for each of multiple user plane bearers or transport layer tunnels that are associated with the old transport layer address (12A), the radio network equipment central unit (20, 1700) may update a transport layer address of that bearer or tunnel from the old transport layer address (12A) to the new transport layer address (12B).

SECURE DYNAMIC ADDRESS RESOLUTION AND COMMUNICATION SYSTEM, METHOD, AND DEVICE
20230089291 · 2023-03-23 ·

The present invention is directed to systems and methods for providing secure dynamic address resolution and communication. Accordingly, a node may include processor and memory having instructions thereon, that when executed, cause the node to pair with another node. The pairing may include creating a DNS record on the node including a current address associated with the second node, this current address may be dynamically updated. The instructions may further allow the node to transmit a message to the second node, based on a resolved address from the DNS record on the first node. Authentication, dynamic message encryption and the provision of a DNS cache may further be implemented on the node.

SECURE DYNAMIC ADDRESS RESOLUTION AND COMMUNICATION SYSTEM, METHOD, AND DEVICE
20230089291 · 2023-03-23 ·

The present invention is directed to systems and methods for providing secure dynamic address resolution and communication. Accordingly, a node may include processor and memory having instructions thereon, that when executed, cause the node to pair with another node. The pairing may include creating a DNS record on the node including a current address associated with the second node, this current address may be dynamically updated. The instructions may further allow the node to transmit a message to the second node, based on a resolved address from the DNS record on the first node. Authentication, dynamic message encryption and the provision of a DNS cache may further be implemented on the node.

DHCP-COMMUNICATIONS MONITORING BY A NETWORK CONTROLLER IN SOFTWARE DEFINED NETWORK ENVIRONMENTS
20230089533 · 2023-03-23 ·

Methods and apparatus to manage a dynamic deployment environment including one or more virtual machines is provided herein. A disclosed example includes involves: scanning, by executing a computer readable instruction with a processor, the virtual machines in the deployment environment to identify a service installed on any of the virtual machines; determining, by executing a computer readable instruction with the processor, the identified service corresponds to a service monitoring rule; determining, by executing a computer readable instruction with the processor, that a monitoring agent identified by the service monitoring rule is installed on the one or more virtual machines on which the service is installed; and configuring the monitoring agent, by executing a computer readable instruction with the processor, to monitor the service in accordance with the service monitoring rule on the at least one of the virtual machines on which the service is installed.

DHCP-COMMUNICATIONS MONITORING BY A NETWORK CONTROLLER IN SOFTWARE DEFINED NETWORK ENVIRONMENTS
20230089533 · 2023-03-23 ·

Methods and apparatus to manage a dynamic deployment environment including one or more virtual machines is provided herein. A disclosed example includes involves: scanning, by executing a computer readable instruction with a processor, the virtual machines in the deployment environment to identify a service installed on any of the virtual machines; determining, by executing a computer readable instruction with the processor, the identified service corresponds to a service monitoring rule; determining, by executing a computer readable instruction with the processor, that a monitoring agent identified by the service monitoring rule is installed on the one or more virtual machines on which the service is installed; and configuring the monitoring agent, by executing a computer readable instruction with the processor, to monitor the service in accordance with the service monitoring rule on the at least one of the virtual machines on which the service is installed.

On-device protected DNS

Methods and systems are provided for protecting DNS traffic locally on an electronic device (e.g., a smart phone) by capturing DNS traffic from network traffic transmitted from the device and ensuring the DNS traffic is routed to a trusted DNS server via a prescribed transmission protocol.

On-device protected DNS

Methods and systems are provided for protecting DNS traffic locally on an electronic device (e.g., a smart phone) by capturing DNS traffic from network traffic transmitted from the device and ensuring the DNS traffic is routed to a trusted DNS server via a prescribed transmission protocol.

CONTROLLING NETWORK TRAFFIC PERTAINING TO A DOMAIN NAME BASED ON A DNS-IP MAPPING

Some examples relate to controlling network traffic pertaining to a domain name based on a Domain Name System-Internet Protocol address (DNS-IP) mapping, An example includes receiving, in a cloud computing system, a local DNS-IP mapping for a domain name from respective Access Points (APs) in a virtual local area network (VLAN) along with geographical information of respective APs; generating a global DNS-IP mapping database comprising the local DNS-IP mapping for the domain name received from respective APs in the VLAN along with geographical information of respective APs, in the cloud computing system; and determining appropriate APs to distribute the global DNS-IP mapping, based on location information of respective APs.