H04L2101/618

METHOD FOR ACCESSING NETWORK, MEDIA GATEWAY, ELECTRONIC DEVICE AND STORAGE MEDIUM
20230291706 · 2023-09-14 ·

Embodiments of the present application relate to the field of communications, and provide a method for accessing a network, a media gateway, an electronic device and a storage medium. The present application provides a method for accessing a network, applied to a media gateway, including: establishing a private media channel between a client and a target platform; and binding the private media channel to a user public network transmission resource corresponding to the client, and obtaining a media link between the client and the target platform to perform media communication between the target platform and the client via the media link; the user public network transmission resource is obtained after converting a local transmission resource of the client by a network address translation (NAT) device.

DOMAIN NAME SYSTEM FOR DATA DISCOVERY
20230283587 · 2023-09-07 ·

A method used by a domain name system (DNS) server is disclosed. The DNS server receives a DNS request containing a host name and a resource record specifying data. The DNS server resolves an internet protocol (IP) address based on the host name. The DNS server resolves a server address of a resource server containing the data specified in the resource record. The DNS server transmits a DNS response including the IP address and the server address.

Network device-integrated asset tag-based environmental sensing with mutual authentication

Systems and methods are provided for providing supplemental information or data to location-based data provided by conventional asset tags. In particular, sensors such as environmentally-aware sensors, Internet of Things (IoT) sensors, and the like may be incorporated into asset tag devices. In turn, these enhanced asset tags may be integrated into network devices, such as access points, network switches, etc. Accordingly, network devices can be leveraged to provide location-based information, in addition to other information, such as environmental operating conditions relative to the location of such network devices. Moreover, secure communication links can be created between the enhanced asset tags, network devices, and controlling entities in the network, such as network management servers through a mutual authentication mechanism.

Securely publishing applications from private networks

A controller can securely publish an application of a tenant by securely extending a network fabric into the networks of the tenant with virtual private networks and NAT. After a tenant deploys an application into one or more networks of the tenant, the tenant can indicate select applications to publish. The network controller assigns a network address from the routable address space of the network fabric to the application and a network address aggregate to each application connector that will front an instance of the application, which securely extends the network fabric into the tenant network. The network controller configures NAT rules in the network fabric and on the application connector to create a route for traffic of the application through the network fabric to the application instance using a fully qualified domain name assigned to the application without exposing a private network address of the application instance and preserving security of other resource on the tenant network.

System and method for remotely filtering network traffic of a customer premise device

Systems, methods, and devices for performing targeted filtering of network traffic generated by user equipment (UE) devices connected to a customer premise equipment (CPE) device in a communication system that includes a distributed residential gateway. A network server may determine that the communication system includes a UE device that is compromised, misconfigured, or operating outside normal communication parameters, identify the UE device, determine an Internet protocol (IP) address or a media access control (MAC) address of the identified UE device, generate a quarantine request message that includes the IP address or the MAC address of the identified UE device in response to determining that the preconfigured virtual local area network access control list (VACL) on the CPE lists source IP addresses from which the CPE will filter outbound traffic, and send the generated quarantine request message to a bridged residential gateway (BRG) associated with the CPE device.

BASE STATION HEADER COMPRESSION AND DECOMPRESSION

A base station may include one or more processors and memory storing instructions that, when executed by the one or more processors, cause the base station to perform a process. The process may include sending, to a wireless device, a radio resource control (RRC) message comprising at least one packet data convergence protocol (PDCP) configuration parameter indicating Ethernet header compression for a data radio bearer. The method may also include sending, to the wireless device, information associated with the Ethernet header compression. The information may include a source medium access control (MAC) address and a destination MAC address, as well as a header compression index corresponding to the source MAC address and the destination MAC address. The process may further include sending, to the wireless device, a compressed Ethernet packet comprising a packet header being compressed and the corresponding header compression index.

Traffic load balancing between a plurality of points of presence of a cloud computing infrastructure

Methods and system of traffic load balancing between a plurality of Points of Presence (PoP) of a cloud computing infrastructure are described. A first PoP of multiple PoPs of cloud computing infrastructure that provides a cloud computing service receives a packet. The packet includes as a destination address an anycast address advertised by the first PoP for reaching the cloud computing service. The first PoP identifies a network address of a second PoP that is different from the first PoP. The first PoP forwards the packets as an encapsulated packet to the second PoP to be processed in the second PoP according to the cloud computing service.

PDU type setting method, UE policy setting method, and related entity

A protocol data unit (PDU) type setting method, a user equipment (UE) policy setting method, and a related entity, where the PDU type setting method includes: setting, by UE, a requested PDU type of a PDU session in a process of establishing the PDU session, where the requested PDU type of the PDU session is set by the UE based on a first condition, the first condition includes an Internet Protocol (IP) version corresponding to an application, and the application is associated with the PDU session. In the embodiments of the present disclosure, the requested PDU type of the PDU session can be consistent with a PDU type requested by the application, such that the application can normally perform communication.

Network layer performance and security provided by a distributed cloud computing network

A GRE tunnel is configured between multiple computing devices of a distributed cloud computing network and a single origin router of the origin network. The GRE tunnel has a first GRE endpoint that has an IP address that is shared among the computing devices of the distribute cloud computing network and a second GRE endpoint that has a publicly routable IP address of the origin router. A first computing device receives an IP packet from a client that is destined to an origin server. The first computing device processes the received IP packet and encapsulates the IP packet inside an outer packet to generate a GRE encapsulated packet whose source address is the first GRE endpoint and the destination address is the second GRE endpoint. The GRE encapsulated packet is transmitted over the GRE tunnel to the single origin router.

Resolving domain name system (DNS) requests via proxy mechanisms

Systems and methods are described herein for providing proxy mechanisms for DNS services, such as resolving DNS requests. In some embodiments, the systems and methods establish a Proxy DNS module at a DNS resolver of an internet service provider, and access, with the proxy DNS module, DNS queries destined for a public name server. The name server may be accessible by the DNS resolver via a publically-accessible network. Further, the systems and methods may route the accessed DNS queries to a private name server associated with the proxy DNS module and accessible via a private communications channel, and receive, from the private name server and via the private communications channel, IP addresses associated with the DNS queries.