H04L41/0668

Methods, Systems, and Computer Program Products for Enabling an Operative Coupling to a Network
20230224207 · 2023-07-13 ·

Methods and systems are described for enabling an operative coupling to a network. In use, first data is received at a first node in a first network. The first data is forwarded between the first node to a second node in a second network, using a network relay. Additionally it is determined that a specified decoupling condition is met, and subsequent to forwarding the first data and in response to determining that the decoupling condition is met, the second operative coupling is disabled while the first operative coupling remains enabled for receiving second data for forwarding.

Intelligent flow state synchronization to improve resiliency, availability, and/or performance of redundant network security devices

Example security systems for use between at least one upstream router and at least one downstream router, are described. A group or pool of security devices can be used to provide stateful security to bidirectional packet flows between upstream and downstream routers. The packets of the bidirectional flows are forwarded to particular security devices based on a consistent hash ring process. For a given flow, bidirectional state information is synchronized among some, but not all, of the security devices. The security devices among which such bidirectional flow state information is shared are determined using the same consistent hash ring process.

Intelligent flow state synchronization to improve resiliency, availability, and/or performance of redundant network security devices

Example security systems for use between at least one upstream router and at least one downstream router, are described. A group or pool of security devices can be used to provide stateful security to bidirectional packet flows between upstream and downstream routers. The packets of the bidirectional flows are forwarded to particular security devices based on a consistent hash ring process. For a given flow, bidirectional state information is synchronized among some, but not all, of the security devices. The security devices among which such bidirectional flow state information is shared are determined using the same consistent hash ring process.

Protection switching using performance metrics
11558760 · 2023-01-17 · ·

Technology disclosed herein includes a method to trigger protection switching on a wireless link of a network device comprised in a protection switching capable network. The method comprises monitoring one or more performance metrics on said link and sending a signal failed message when at least one metric of said one or more performance metrics fails to satisfy performance criteria related to the at least one metric of said one or more performance metrics.

Protection switching using performance metrics
11558760 · 2023-01-17 · ·

Technology disclosed herein includes a method to trigger protection switching on a wireless link of a network device comprised in a protection switching capable network. The method comprises monitoring one or more performance metrics on said link and sending a signal failed message when at least one metric of said one or more performance metrics fails to satisfy performance criteria related to the at least one metric of said one or more performance metrics.

Beam Failure Recovery of a Secondary Cell

Beam failure recovery (BFR) procedures for wireless communications are described. When beam failures occur on secondary cells, wireless devices may trigger a BFR procedure via an uplink resource for BFR. If a beam failure occurs for a secondary cell at a time that a wireless device does not have an uplink resource for BFR, the wireless device may perform one or more other actions for BFR of the secondary cell.

Beam Failure Recovery of a Secondary Cell

Beam failure recovery (BFR) procedures for wireless communications are described. When beam failures occur on secondary cells, wireless devices may trigger a BFR procedure via an uplink resource for BFR. If a beam failure occurs for a secondary cell at a time that a wireless device does not have an uplink resource for BFR, the wireless device may perform one or more other actions for BFR of the secondary cell.

RECOVERING FROM DATA STALL EVENT IN A MULTI-NETWORK ENVIRONMENT
20230224206 · 2023-07-13 ·

Systems may comprise a connectivity manager application operating on a User Equipment (UE) for optimal and secure performance of local applications and improving user experience by optimizing application performance (e.g., detecting data stall events). The systems may monitor incoming internet protocol (IP) packets for one or more applications operating on the UE. The connectivity manager application may detect a drop in a rate at which the IP packets are received over a period of time and determine to reregister and/or reattach to a different node within a network or at a new network.

RECOVERING FROM DATA STALL EVENT IN A MULTI-NETWORK ENVIRONMENT
20230224206 · 2023-07-13 ·

Systems may comprise a connectivity manager application operating on a User Equipment (UE) for optimal and secure performance of local applications and improving user experience by optimizing application performance (e.g., detecting data stall events). The systems may monitor incoming internet protocol (IP) packets for one or more applications operating on the UE. The connectivity manager application may detect a drop in a rate at which the IP packets are received over a period of time and determine to reregister and/or reattach to a different node within a network or at a new network.

Systems and methods for routing data in distributed environments
11700167 · 2023-07-11 · ·

Described in detail herein are systems and methods for routing data in a distributed environment. A controller can maintain an inactive state. A terminal can receive a request associated with a physical object. The terminal can be communicatively coupled to a cloud computing system. The terminal can attempt to transmit the request to the cloud computing system. A router communicatively coupled to the controller and cloud computing system can attempt to initiate communication between the terminal and the cloud computing system in response to the terminal attempt to transmit the request to the cloud computing system. The router can route the request to the controller in response to failing to initiate communication between the terminal and the cloud computing system after specified amount of time. The controller can switch from an inactive state to an active state in response to receiving the request.