H04L61/5076

Deployment of a custom address to a remotely managed computational instance

An example embodiment may include a computational instance and a computing device within a remote network management platform. The computing device may be configured to: receive, from a client device of the managed network, a request to redirect, to a second URL, future requests addressed to a first URL; provide, to the client device, instructions to generate a certificate that binds an identity of the entity that operates the managed network to the first URL; receive, from the client device, the certificate; store the certificate and a corresponding cryptographic key; and generate a mapping between the first URL and the second URL. The computational instance may be configured to, in response to receiving a content request referencing the destination, generate a content response containing content from the destination, where any hyperlinks to the second URL in the content are replaced with hyperlinks to the first URL.

Client device based solution for handling MAC randomization

A system and method are provided for a network device for use with a client device having a hostname and a MAC address. The network device contains a memory that has a second hostname and a second MAC address stored within the memory. The second MAC address corresponds to the second hostname. The memory also contains a processor configured to execute instructions stored on the memory to cause the network device to: receive, from the client device, the hostname and the MAC address; determine whether the MAC address is randomized; provide an instruction to the client device to inform a user of the client device that the client device hostname is registered when the hostname matches the second hostname and the MAC address is randomized.

Client device based solution for handling MAC randomization

A system and method are provided for a network device for use with a client device having a hostname and a MAC address. The network device contains a memory that has a second hostname and a second MAC address stored within the memory. The second MAC address corresponds to the second hostname. The memory also contains a processor configured to execute instructions stored on the memory to cause the network device to: receive, from the client device, the hostname and the MAC address; determine whether the MAC address is randomized; provide an instruction to the client device to inform a user of the client device that the client device hostname is registered when the hostname matches the second hostname and the MAC address is randomized.

Systems and methods for radio unit backup connections
11638326 · 2023-04-25 · ·

When a failed connection is detected from a first radio unit (RU) to the cellular site router (CSR), activation of an existing backup cabled connection from the first RU to the CSR through a cabled connection between the first RU and a second RU of the cellular telecommunications tower may be performed. In one example, a first RU and second RU each have two physical network ports. The activation of the existing backup cabled connection from the first RU, via the second RU, to the CSR may include causing the first RU to enter from a normal operating mode into an Open Radio Access Network (O-RAN) cascade operating mode to attempt to attain network connectivity for the first RU using the second physical network port of the first RU.

Systems and methods for radio unit backup connections
11638326 · 2023-04-25 · ·

When a failed connection is detected from a first radio unit (RU) to the cellular site router (CSR), activation of an existing backup cabled connection from the first RU to the CSR through a cabled connection between the first RU and a second RU of the cellular telecommunications tower may be performed. In one example, a first RU and second RU each have two physical network ports. The activation of the existing backup cabled connection from the first RU, via the second RU, to the CSR may include causing the first RU to enter from a normal operating mode into an Open Radio Access Network (O-RAN) cascade operating mode to attempt to attain network connectivity for the first RU using the second physical network port of the first RU.

Updating parameters in a mesh network

A method including determining, by a processor, first communication information indicating a first communication parameter associated with a first device and second communication information indicating a second communication parameter associated with a second device; transmitting, by the processor, the first communication information to the second device and the second communication information to the first device to enable the first device and the second device to be included in a mesh network; determining, by the processor during communication between the first device and the second device in the mesh network, updated first communication information indicating an updated first communication parameter associated with the first device and updated second communication information indicating an updated second communication parameter associated with the second device; and transmitting, by the processor, the updated first communication information to the second device and the updated second communication information to the first device. Various other aspects are contemplated.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR AUTOMATIC DOMAIN NAME SYSTEM (DNS) CONFIGURATION FOR 5G CORE (5GC) NETWORK FUNCTIONS (NFs) USING NF REPOSITORY FUNCTION (NRF)
20230164109 · 2023-05-25 ·

A method for automatic domain name system (DNS) configuration for 5G core (5GC) network functions (NFs) includes, at an NF repository function (NRF) including at least one processor, receiving a message concerning a 5GC network function. The method further includes determining a first DNS resource record parameter for the 5GC NF. The method further includes determining a second DNS resource record parameter for the 5GC NF. The method further includes automatically configuring a DNS with a mapping between the first and second DNS resource record parameters for the 5GC NF.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR AUTOMATIC DOMAIN NAME SYSTEM (DNS) CONFIGURATION FOR 5G CORE (5GC) NETWORK FUNCTIONS (NFs) USING NF REPOSITORY FUNCTION (NRF)
20230164109 · 2023-05-25 ·

A method for automatic domain name system (DNS) configuration for 5G core (5GC) network functions (NFs) includes, at an NF repository function (NRF) including at least one processor, receiving a message concerning a 5GC network function. The method further includes determining a first DNS resource record parameter for the 5GC NF. The method further includes determining a second DNS resource record parameter for the 5GC NF. The method further includes automatically configuring a DNS with a mapping between the first and second DNS resource record parameters for the 5GC NF.

Dynamic Border Gateway Protocol (BGP) Host Route Generation Based on Domain Name System (DNS) Resolution
20230065919 · 2023-03-02 ·

Novel tools and techniques are provided for implementing dynamic border gateway protocol (“BGP”) host route generation based on domain name system (“DNS”) resolution. In various embodiments, a computing system may receive, from a user device via a first network, a request to establish a communications link with an external device via a second network that is separate from the first network, based on a first uniform resource identifier (“URI”) indicative of a network location of the external device. The computing system may query a DNS resolver for an Internet Protocol (“IP”) address corresponding to a valid current IP address, based on the first URI, and may advertise the IP address and/or a route based on the IP address. A communications link may be established between the user device and the external device based on the IP address and/or the route.

Network based containerized computing
11606674 · 2023-03-14 · ·

Techniques for instantiating containers in a network are discussed herein. A container controller component can receive a request from a user equipment (UE) for a service, whereby a portion of the service is performed by a containerized application. The container controller component can determine a location of the UE and can determine a number of requests for the service associated with that location. If the number of requests meet or exceed a threshold number, and/or if one or more metrics associated with the service are indicative of a quality level below a threshold, the container controller component can instantiate a container associated with the service at a computing device associated with the location. In some examples, the container can run an application, such as a presentation layer of the service, which can respond to the request from the UE.