H04L67/147

Survivability method for LISP based connectivity

The present disclosure provides systems, methods and computer-readable media for maintaining network connectivity, in a LISP based network, when one or more network edge nodes lose connectivity to a LISP control plane of the network, using multicast messaging. In one example, a method includes receiving a connection request from a first endpoint to a second endpoint communicatively coupled to a second edge node; determining, by the first edge node, that a connection session to a control plane for locating the second endpoint has failed; querying one or more available edge nodes for locating the second endpoint using a multicast message; locating the second endpoint based on at least one query response received from the one or more available edge nodes, at least one query response including an identifier of the second endpoint; and establishing the connection request between the first endpoint and the second endpoint upon locating the second endpoint.

DATA PROTOCOL OVER CLOCK LINE
20230224137 · 2023-07-13 ·

A system includes a plurality of line cards and a timing card. A clock generation circuit on the timing card generates a clock signal which is pulse width modulated according to information to be transmitted. A clock line supplies the pulse width modulated clock signal to the line cards. The timing card sends a first control word to the plurality of line cards over the clock line after sending a beacon. The first control word includes a size field specifying a first length of first data following the first control word. The timing card sends time of day information over the clock line to the line cards following the first control word. The time of day information may be encrypted. A second control word follows the time of day information. One or more additional control words can follow the second control word before the next beacon.

DATA PROTOCOL OVER CLOCK LINE
20230224137 · 2023-07-13 ·

A system includes a plurality of line cards and a timing card. A clock generation circuit on the timing card generates a clock signal which is pulse width modulated according to information to be transmitted. A clock line supplies the pulse width modulated clock signal to the line cards. The timing card sends a first control word to the plurality of line cards over the clock line after sending a beacon. The first control word includes a size field specifying a first length of first data following the first control word. The timing card sends time of day information over the clock line to the line cards following the first control word. The time of day information may be encrypted. A second control word follows the time of day information. One or more additional control words can follow the second control word before the next beacon.

Multimedia content differentiation

A communication session between two or more computing devices is monitored. One or more share actions, that include one or more media documents, are identified in the communication session responsive to the media documents and based on the monitoring the communication session. Reaction data, that is related to the share actions, in the communication session is analyzed in response the share actions and based on the media documents. One or more relevant media documents are determined based on the analyzing the reaction data. The relevant media documents are analyzed based on the media documents. A first depiction rendered by a first of the devices of the communication session is modified based on the relevant media documents.

Multimedia content differentiation

A communication session between two or more computing devices is monitored. One or more share actions, that include one or more media documents, are identified in the communication session responsive to the media documents and based on the monitoring the communication session. Reaction data, that is related to the share actions, in the communication session is analyzed in response the share actions and based on the media documents. One or more relevant media documents are determined based on the analyzing the reaction data. The relevant media documents are analyzed based on the media documents. A first depiction rendered by a first of the devices of the communication session is modified based on the relevant media documents.

COMMUNICATION SYSTEM FOR MICRO-FRONTENDS OF A WEB APPLICATION

A communication system for a micro-frontend architecture can include a first message handler associated with a requestor of data and a second message handler associated with a requestee. The requestor can be a wrapper application or a micro-frontend, and the requestee can the other of the wrapper application or the micro-frontend. In response to receiving a data request from the requestor, the first message handler can transmit a request message via a communication channel to the second message handler, where the request message includes a unique identifier assigned to the request. Thereafter, the first message handler can receive a response message from the second message handler via the communication channel, where the response message includes the data and the unique identifier. Based on the unique identifier in the response message, the first message handler can provide the data to the requestor in a response to the request.

METHODS FOR NETWORK ASSISTANCE FOR MEDIA SERVICES, CORE NETWORK NODE, WIRELESS DEVICES AND RADIO ACCESS NETWORK NODES
20220408423 · 2022-12-22 ·

Disclosed is a method, performed by a core network node, for network assistance with a media service session for a wireless device. The core network node is configured to communicate with a radio access network, RAN, node. The method comprises receiving, from the RAN node, control signalling indicative of RAN information over a dedicated interface between the core network node and the RAN node; and controlling the network assistance for the media service session, based on the control signalling received.

IDENTIFYING AN ACTIVE ADMINISTRATION FUNCTION (ADMF) IN A LAWFUL INTERCEPTION DEPLOYMENT THAT UTILIZES A PLURALITY OF ADMFS
20220407895 · 2022-12-22 ·

A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.

Communication system, communication device, communication method, and program for reliably receiving periodic data

A communication system includes a master device and a slave device that perform, at predetermined periods, communication for sharing storage data stored in a cyclic memory. The master device transmits communication data that includes (i) identification information distinguishing a period relating to the communication data from other periods before and after the period and (ii) target information indicating whether the communication data is a target that is to be communicated by the communication at the predetermined periods or is an exception to be excluded from being the target. The slave device discards the received communication data when (i) the target information included in the received communication data indicates that the communication data is the target and (ii) a period indicated by the identification information included in the communication data is different from a current period, and processes the communication data.

Communication system, communication device, communication method, and program for reliably receiving periodic data

A communication system includes a master device and a slave device that perform, at predetermined periods, communication for sharing storage data stored in a cyclic memory. The master device transmits communication data that includes (i) identification information distinguishing a period relating to the communication data from other periods before and after the period and (ii) target information indicating whether the communication data is a target that is to be communicated by the communication at the predetermined periods or is an exception to be excluded from being the target. The slave device discards the received communication data when (i) the target information included in the received communication data indicates that the communication data is the target and (ii) a period indicated by the identification information included in the communication data is different from a current period, and processes the communication data.