H04L2101/604

SYSTEM AND METHOD FOR FORWARDING PACKETS IN A HIERARCHICAL NETWORK ARCHITECTURE USING VARIABLE LENGTH ADDRESSES
20230015347 · 2023-01-19 · ·

This disclosure relates to transmitting data packets from a source to a destination within a communications network. A data packet is received from the source located in a local sub-network of the network. The data packet includes a first network layer protocol header having a source address containing the local sub-network address of the source, a destination address of the destination, a first field indicating a length of the source address and a second field indicating a length of the destination address. The first network layer protocol header is transformed by modifying the source address and the first field indicating the length of the source address, such that the modifying includes appending to the local sub-network address a prefix of the sub-network to make the source address an address of a higher-level network. The data packet is then forwarded toward the destination in the higher-level network.

SELECTING INTERFACES FOR DEVICE-GROUP IDENTIFIERS

In one embodiment, a computer networking device calculates a first hash value for an identifier of a group of computing devices, as well as a second hash value for the identifier of the group of computing devices, with each hash value being at least in part on the identifier of the group of computing devices and an identifier of the respective interface. The computer networking device may also analyze the first hash value with respect to the second hash value and select the first interface for association with the identifier of the group of computing devices based at in part on the analyzing. The computer networking device may further store an indication that the identifier of the group of computing devices is associated with the first interface.

METHODS AND APPARATUS TO IDENTIFY ELECTRONIC DEVICES
20230214384 · 2023-07-06 ·

Methods, apparatus, systems, and articles of manufacture are disclosed to identify devices. An example apparatus to identify devices comprises at least one memory; machine readable instructions; and processor circuitry to at least one of instantiate or execute the machine readable instructions to: determine if a device identification repository includes a first device identifier included in a query; infer first device information for the first device identifier based on a second device identifier and second device information included in the device identification repository; and transmit the first device information in response to the query.

Computing device and method for performing a secure neighbor discovery

Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.

Secure communication method, client and non-public server

Embodiments of the present disclosure provide a secure communication method, a client and a non-public server. The secure communication method includes: generating a set of destination addresses of a non-public server based on an IPv6 prefix of the non-public server, and a signature string and a user ID of a client, wherein the signature string is obtained by signing an IPv6 address and the user ID of the client based on a private key of the client; initiating a set of connection request to the non-public server based on a set of communication connections containing the set of destination addresses, for the non-public server to determine a public key corresponding to a user ID based on the user ID in the set of destination addresses, verifying the set of communication connections based on the public key, and establishing communication when the verification of the set of communication connections passes.

TRACKING NETWORK TRAFFIC OF LOCAL AREA NETWORK (LAN) SUBNETS IN A WIRELESS WIDE AREA NETWORK (WWAN)
20220417737 · 2022-12-29 ·

This disclosure provides systems, methods, and apparatus, including computer programs encoded on computer-readable media, for tracking network traffic for local area network (LAN) subnets in a wireless wide area network (WWAN). In some implementations, a UE of the WWAN may assign a unique public IP address to each router of the LAN. The UE may transmit network traffic received from the LAN to the WWAN. The network traffic originating from any router of the LAN may be associated with the unique public IP address that was assigned to that router. The WWAN may use the unique public IP addresses to generate network traffic information that may indicate amounts of network traffic flowing from each router of the LAN. The WWAN, for example, may use the network traffic information to determine billing information for any router in the LAN.

IPv4 communications using 6lowpan header compression mechanisms
11528346 · 2022-12-13 · ·

Methods and apparatus, including computer program products, are provided for communications. In one aspect there is provided a method. The method may include sending, by a gateway, an advertisement including an internet protocol version 6 over low power wireless personal area network context option carrying a well-known prefix, the well-known prefix indicating to a node that the gateway provides an uplink in accordance with internet protocol version 4; and receiving, at the gateway, a first packet received via the wireless network in accordance with internet protocol version 6, the first packet including a destination address in accordance with internet protocol version 4. Related apparatus, systems, methods, and articles are also described.

Increasing edge device address space while complying with a radio communication protocol

An IoT service of a provider network may be used to increase the edge device address space while complying with a radio communication protocol. This may allow a service provider to manage a much larger number of client devices that use a particular radio communication protocol that specifies a limited address space (e.g., LoRaWAN). When the IoT service receives a join request via a private gateway of the client network, the service determines, based on the private gateway ID, the client ID of the client that owns the private gateway/client network. The service may generate a unique internal ID for the edge device by combining the client ID with an assigned device ID. The internal ID identifies the edge device as an activated device of the edge network.

Method and apparatus for management of extended mobile device identity information

A method of operating a terminal device to establish a radio resource control connection with network infrastructure equipment in a wireless telecommunications network, wherein the terminal device is associated with a previously-allocated temporary identifier that identifies the terminal device within the wireless telecommunications network; the method comprising: transmitting a first message to the network infrastructure equipment comprising an indication of a first portion of the temporary identifier; and transmitting a second message, which is separate from the first message, to the network infrastructure equipment comprising an indication of a second portion of the temporary identifier.

Techniques for implementing IPV6-based distributed storage space

A method is provided in one example embodiment and includes, for each of a plurality of individual storage units collectively comprising a virtual storage unit, mapping an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receiving from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translating the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and performing the requested operation on the at least one of the data storage units.