Patent classifications
H04L2101/681
DYNAMIC ELIMINATION OF OLD IPV6 ADDRESSES FROM WLAN/BYOD/IOT DEVICES INDHCPV6 STATELESS MODE AFTER TRANSITIONING BETWEEN VLANS
A Wi-Fi controller identifies a mismatch between a first prefix of a first IPv6 address for a data packet corresponding to a first VLAN on which the data packet was sent from the station to the access point, and a prefix of a second IPv6 address for a second VLAN from which the data packet was transmitted from the access point to the Wi-Fi controller. Responsive to the VLAN mismatch identification, the Wi-Fi controller transmits an RA to the station with a preferred lifetime of 0, wherein subsequent communications use the second IPv6 address.
Compression of Internet Protocol Version 6 Addresses in Wireless Sensor Networks
A method for managing Internet Protocol Version 6 (IPv6) addresses in a wireless sensor network is provided that includes storing, on a wireless sensor device in the wireless sensor network, a prefix of an IPv6 address in association with a key, forming an address indicator for the IPv6 address, the address indicator consisting of the key and a node address of the IPv6 address, and storing the address indicator in at least one memory location on the wireless sensor device in lieu of the IPv6 address.
Improved KNN - Based 6LoWPAN Network Intrusion Detection Method
The present invention relates to an improved KNN-based 6LoWPAN network intrusion detection method. The present invention selects quantifiable security features which can reflect a self-security state of network elements of a 6LoWPAN network for training, and establishes a 6LoWPAN network feature space. The present invention assigns the weights to the features and transfers zero points, to alleviate the bias caused by large and small impact factors and simplify calculation; realizes construction and update of a state data table of network elements by extracting the feature data of network elements in real time, thus forming a normal contour updated according to the real-time state of the network in the feature space of the 6LoWPAN network based on the clustering effect of a KNN algorithm; and the present invention improves the KNN algorithm and redefines a basis for judging the invasion, to meet the requirements for 6LoWPAN network intrusion detection.
Zero touch provisioning
According to one embodiment, a method comprises automatically uploading device information from a first network device in a first operating state to a second network device in response to an event, such as an initial power up. The second network device is part of the cloud, and thus, providing cloud-based services. Subsequent to the uploading of the device information, the first network device receives information controlling the operation of the first network device based on the device information.
Generating radio data-channel access addresses from a base address seed
A radio communication apparatus receives or generates a base address seed, and generates data-channel access addresses from the seed. Each access address corresponds to a respective data-channel identifier, and is generated by setting a bit at a common first bit position to the value of a bit at a first common predetermined bit position in the base address seed or in the respective data-channel identifier; by setting a bit at a common second bit position to the bitwise complement of this value; and by setting one or more remaining bit positions in dependence on values at one or more bit positions in the base address seed and one or more bit positions in the respective data-channel identifier that are not the first common predetermined bit position. The apparatus can send or receive a radio data packet comprising an access address from the generated set.
Compression of internet protocol version 6 addresses in wireless sensor networks
A method for managing Internet Protocol Version 6 (IPv6) addresses in a wireless sensor network is provided that includes storing, on a wireless sensor device in the wireless sensor network, a prefix of an IPv6 address in association with a key, forming an address indicator for the IPv6 address, the address indicator consisting of the key and a node address of the IPv6 address, and storing the address indicator in at least one memory location on the wireless sensor device in lieu of the IPv6 address.
Address management for Bluetooth devices
Two devices (e.g., two wireless Bluetooth earbuds) may exchange device address information (e.g., Bluetooth address information) and may identify a primary address. When either of the devices connect to a source device (e.g., a phone), the primary address may be used by the connecting device such that the pair of devices appear as a single device (e.g., a Bluetooth-pairable device) to the source device, regardless of the device connecting to the source device as the primary device. The primary device may then send identity information (e.g., that has been exchanged with the secondary device) to the source device, such that the source device may connect to either of the two devices. Further, once a primary device connects to the source device, the primary device may transmit, to the secondary device, connection information such that the secondary device may connect to the source device and operate in the primary role.
Methods and systems for discovering media access control (MAC) addresses
Computerized methods and systems determine LAP and UAP values of the MAC address of electronic devices. A memory stores LAP records. Each LAP record has at least: an LAP value associated with an electronic device, and candidate UAP values associated with the LAP value. A packet processor modifies the LAP records by updating the candidate UAP values based on information associated with packets received from electronic devices. A probing manager modifies each LAP record by updating each LAP record to include a determined UAP value selected from the candidate UAP values based on attempts to connect to an electronic device of the electronic devices using selected candidate LAP-UAP value pairs. Each pair has the LAP value of the LAP record and a selected one of the candidate UAP values that is selected based on one or more computed metrics associated with the candidate LAP-UAP value pairs.
Floating links
An access point including a memory; at least one network interface configured to interface over a network with one or more of a other access point and a user equipment (UE); and a processor configured to, establish, via the at least one interface, a virtual link with the UE based on the respective one of the at least one virtual address, and transfer the virtual link to the other access by transmitting a command to the other AP to set, after a time period, at least one network interface associated therewith to be addressable via the respective one of the at least one virtual address, and disassociating the at least one network interface and the respective one of at least one virtual address after the time period.
REQUESTS AND COMPUTE RESOURCES
In an example, a collection of compute resources corresponding to a class of devices is identified with a request and a synthesis routine is performed via a number of destinations corresponding to the class of devices. In an example, a type of compute resource to use with an operation of a request is determined, a device with the type of compute resource determined for the operation of the request is identified; the identified device performs the operation of the request within a bounds of a policy, and a result of the operation is communicated to a remote storage location.