Patent classifications
H04L61/5092
Automatic recovery from duplicate network addresses
A network device in a network may determine a tentative network address for a network interface of the network device and may determine whether the tentative network address is duplicative of any one of the network addresses in the network. If the tentative network address is duplicative of a network address assigned to another network interface in the network, the network device may store an indication of the other network interface. In response to receiving an indication that a new network address is assigned to the other network interface, the network device may re-determine whether the tentative network address is duplicative of any one of the network addresses in the network. If the network device determines that the tentative network address is not duplicative of any one of the plurality of network addresses in the network, the network device may assign the tentative network address to the network interface.
DEVICE ADDRESS ROTATION MANAGEMENT PROTOCOL FOR A WIRELESS LOCAL AREA NETWORK
Techniques herein facilitate a device address rotation management protocol that may be implemented for a wireless local area network (WLAN), which can be used to influence when wireless client devices or stations may rotate their Media Access Control (MAC) addresses, how to perform such rotations, and/or the like. In one example, a method may include providing, by an access point (AP), a first communication indicating that the AP supports a MAC address rotation management protocol; obtaining, by the AP, a second communication from a wireless station (STA) indicating that the STA intends to perform a MAC address rotation; and transmitting, by the AP, a third communication to influence the MAC address rotation of the STA, the third communication comprising a rotation status indicator and timing information.
Management of controlled-environment facility resident image and/or background during video visitation
Information associated with a controlled-environment facility resident communications and/or data device, such as device location within the controlled-environment facility, may be used to determine whether the resident device is approved for two-way video visitation or restricted to on-way video visitation. Video visitation may be initiated and voice and video captured and streamed by a non-resident communications and/or data device, as well as voice and/or video captured and streamed by the resident device, is received by a controlled-environment facility electronic communications management system. Voice and video captured at the non-resident device is transmitted to the resident device and, if the resident device is permitted two-way video visitation, voice and video captured by the resident device is transmitted to the non-resident device, if the resident device is restricted to one-way video visitation, only voice is transmitted to the non-resident device.
DEVICE TRACING ARCHITECTURE
Systems and methods include reception, at a first device, of a wireless communication packet from a second device, determination, at the first device, of a received service identifier included in the wireless communication packet, determination, at the first device, of whether the received service identifier matches a first service identifier or a second service identifier, if the received service identifier matches the first service identifier or the second service identifier, establishment, at the first device, of a connection to a server of the second device using a device address included in the wireless communication packet, requesting, using the connection and at the first device, of a user identifier from the server of the second device, if the received service identifier matches the first service identifier, transmission, from the first device to a remote server, of a first indication of proximity of a user of the first device to a user associated with the user identifier and a second indication of proximity of the user associated with the user identifier to the user of the first device, and, if the received service identifier matches the second service identifier, transmission, from the first device to the remote server, of the first indication of proximity of the user of the first device to a user associated with the user identifier.
Methods and procedures for the dynamic mac address distribution in IEEE 802.11 networks
Methods and apparatuses are described for dynamic medium access control (MAC) address distribution in a wireless network. A station (STA) may receive, from an access point (AP), a frame that includes an indicator indicating at least one MAC address type or MAC address policy supported by an extended service set (ESS) associated with the AP. The indicator may comprise an 8 bit bitmap. The STA may then transmit, to the AP, a request message that includes MAC Address Assignment Protocol information determined based on the at least one MAC address type or MAC address policy. The STA may receive a response message that includes a local medium access control (MAC) address assigned based on the MAC Address Assignment Protocol information. The STA may transmit, to the AP, an association request frame with the local MAC address.
Methods and procedures for the dynamic mac address distribution in IEEE 802.11 networks
Methods and apparatuses are described for dynamic medium access control (MAC) address distribution in a wireless network. A station (STA) may receive, from an access point (AP), a frame that includes an indicator indicating at least one MAC address type or MAC address policy supported by an extended service set (ESS) associated with the AP. The indicator may comprise an 8 bit bitmap. The STA may then transmit, to the AP, a request message that includes MAC Address Assignment Protocol information determined based on the at least one MAC address type or MAC address policy. The STA may receive a response message that includes a local medium access control (MAC) address assigned based on the MAC Address Assignment Protocol information. The STA may transmit, to the AP, an association request frame with the local MAC address.
Internet address structure analysis, and applications thereof
An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g., traceroutes campaigns, vulnerability assessments, or reachability surveys; and (d) remotely assessing a network's addressing plan and address assignment policy.
System and Method of Applying Policy Based, Targeted Prefix Advertisements via Internet Protocol Version 6 (IPv6) Stateless Address Auto-Configuration (SLAAC) Router Advertisement (RA) Poisoning
Systems and network devices configured to use Stateless Address Auto-Configuration (SLAAC) to provide different internet protocol (IP) address information to user equipment (UE) devices that are connected to the same local area network (LAN). A network device (e.g., default router, etc.) may determine whether a UE device is eligible to receive special treatment based on a link-layer address of the UE device. The network device send the UE device an unicast router advertisement that includes a special prefix in response to determining that the UE device is eligible to receive special treatment. The network device may send the UE device an unicast router advertisement that includes a base prefix for the LAN in response to determining that the UE device is not eligible to receive special treatment
System and method for storage array enclosure discovery
A method, computer program product, and computing system for generating one or more unique network addresses for one or more storage array enclosures of a storage system. The one or more unique network addresses may be advertised to one or more storage processors of the storage system. The one or more storage processors may be configured to communicate with a plurality of storage devices of the one or more storage array enclosures based upon, at least in part, the one or more unique network addresses of the one or more storage array enclosures.
METHOD AND APPARATUS FOR MANAGEMENT OF EXTENDED MOBILE DEVICE IDENTITY INFORMATION
A method of operating a terminal device to establish a radio resource control connection with network infrastructure equipment in a wireless telecommunications network, wherein the terminal device is associated with a previously-allocated temporary identifier that identifies the terminal device within the wireless telecommunications network; the method comprising: transmitting a first message to the network infrastructure equipment comprising an indication of a first portion of the temporary identifier; and transmitting a second message, which is separate from the first message, to the network infrastructure equipment comprising an indication of a second portion of the temporary identifier.