Patent classifications
H04L2101/69
GATEWAY SELECTION FOR PRIVATE WIRELESS NETWORKS
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may determine whether a geographic location code associated with a geographic location of the UE matches a geographic location code in a received message. Based on the determination, the UE may select a non-public network (NPN) function. Additionally or alternatively, a UE may discover or select an NPN function based on determining that legal requirements, such as one or more interception conditions, are independent of the geographic location of the UE. For example, the UE may discover and one or more NPN functions according to a query performed using an NPN function identifier or an NPN identifier. The UE may determine that the NPN function selection (e.g., for a geographic location of the UE) is independent of an interception condition (e.g., associated with the geographic location of the UE).
System and method for dynamically adapting network delivery modes of content
A content distribution network includes a first server in communication with an anycast server that provides content via a unicast signal, and with a multicast server that provides the content via a multicast signal. The first server is configured to receive a list of source addresses associated with the content, and to provide a metadata file including an anycast Internet protocol address of the anycast server from the list of source addresses as an Internet protocol address of the content in response to a first request for the content. When the number of client devices requesting the content exceeds a first threshold, the first server receives an updated list of sources including a multicast Internet protocol address of a multicast server, and provides the multicast Internet protocol address of the multicast server as the Internet protocol address of the content in the metadata file.
Content delivery systems and methods
Aspects of the present disclosure involve a CDN utilizing a Direct Server Return (DSR) request command to create a tunnel from one content server to another content server of the CDN. Through the DSR tunnel, a request for content may be served from a content server that is more advantageous for the CDN for any number of reasons, such as from a content server that is logically closer to the content server. In determining when a DSR tunnel is created to provide the content, the CDN may access a database storing various information concerning the CDN, such as the location of egress gateways of the CDN in relation to one or more content servers, connecting network location information, the capabilities of one or more content servers, and/or load information of available content servers.
Transportation infrastructure service discovery arrangement
Transportation infrastructure service discovery arrangement disclosed. In the arrangement a peripheral device is attached to a transportation infrastructure control network. The client is configured to request an address from a DNS server of the host network. As a response the client receives network settings that can be used for contacting applications attached to the transportation infrastructure control network.
Systems and methods for allocating and managing resources in an internet of things environment using location based focus of attention
A system for managing clouds of edge devices as an Infrastructure as a Service clouds includes an application server, a location based situational awareness subsystem and a cloud management subsystem. The cloud management subsystem includes a first API through which the application server makes request to the location based situational awareness subsystem and a conductor that searches for the optimal deployment of cloud resources that meet a set of constraints. A second API for managing and deploying applications on a selected set of the plurality of network connected devices. The system also includes a compute node that can interact with the selected set of the plurality of network connected devices to launch and manage containers on the selected set of the plurality of network connected devices.
System and Method for Improving Content Fetching by Selecting Tunnel Devices
A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.
Location Based Medium Access Control Address
A data processing system having an address resolution function for deriving MAC addresses. The set of MACs defined for the devices on the network encode physical position or logical identifier information of those devices. Therefore, each of these MACs is derivable using a mapping function that maps the physical position or logical identifier information supplied by an application to the MAC addresses of the devices on the network. When the protocol processing entity has to send data over the network, it can obtain the MAC address for the destination determined on the basis of the physical position or logical identifier supplied by the application. In this way, since the MACs are derivable on the basis of the physical positions or logical identifiers, the broadcasting of ARP request messages, which would otherwise be required when the protocol processing entity requires the MAC for the destination, may be avoided.
Discovering And Clustering IPv6 Addresses by Hardware Identifiers
The invention relates to discovering and clustering Internet protocol addresses. For example, the invention can include discovering an IPv6 address of an Internet-facing device on a network, where the IPv6 address is associated with a wide area network (WAN) media access control (MAC) address and a WiFi basic service set identifier (BSSID), identifying an associated BSSID in WiFi geolocation databases based on the WAN and WiFi BSSID, and geolocating the Internet-facing device by retrieving a location record in the WiFi geolocation databases for the associated BSSID.
Specifying a user group in a multicast domain name system
An access point that selectively provides a multicast domain name system (mDNS) message is described. During operation, the access point may receive an mDNS message, where the mDNS message includes an identifier of a group (such as a user group). For example, the identifier of the group may be included in the mDNS message when the mDNS message includes discovery information for a service. Moreover, the identifier may specify the portion of a subnet in a wireless local area network (WLAN) in a geographic region, such as a room, a floor or a building. Then, the access point may determine whether the access point or an electronic device is included in the group. When the access point or the electronic device is in the group, the access point may selectively provide the mDNS message addressed to the electronic device. Otherwise, the access point may drop the mDNS message.
Virtual private network connection status detection
Virtual private network (VPN) service provider infrastructure (SPI) receives a request to access a VPN from a client device. The VPN SPI selects an Internet Protocol (IP) address for access to the VPN by the client device from a pool of IP addresses. The VPN SPI provides access to the VPN for the client device via the IP address. The VPN SPI receives one or more handshake notifications from the client device. The VPN SPI determines that a threshold time period has passed since a latest-in-time handshake notification of the one or more handshake notifications. The VPN SPI disconnects the client device from the VPN in response to determining that the threshold time period has passed. The VPN SPI adds the IP address to the pool of IP addresses in response to disconnecting the client device from the VPN.