H04L43/0811

COMMUNICATION METHOD, APPARATUS, AND SYSTEM
20220417101 · 2022-12-29 ·

A communication method is provided, a first policy control network element sends a subscription message to a usage monitoring network element, where the subscription message includes identification information of a first slice and identification information of a terminal device, and the subscription message is for subscribing to usage status information of the terminal device in the first slice. The first policy control network element receives, from the usage monitoring network element, first indication information indicating that usage of the terminal device in the first slice is exhausted. The first policy control network element sends, to a mobility management network element, availability status information of the first slice indicating that the first slice is unavailable; or the first policy control network element sends a user route selection policy to the terminal device, where the user route selection policy does not include the identification information of the first slice.

METHODS FOR MONITORING A DATA TRANSMISSION, APPARATUSES, AND COMPUTER-READABLE MEDIUMS

A method includes moving one or more transmit facility or transmit facilities attached to a first component with regard to at least two receive facilities attached at a fixed position to the second component; and at least one of registering a respective error if an error condition exists for the respective receive facility or modifying an operation of an apparatus comprising the first and a second component if the error condition exists for the respective receive facility, the error condition for the respective receive facility depends on location information relating to at least one of the position of the first component with regard to the second component or orientation of the first component with regard to the second component, and/or at least one of a measure for a receive quality of the signals or data packets received from the transmit facility or from at least one of the transmit facilities.

METHODS FOR MONITORING A DATA TRANSMISSION, APPARATUSES, AND COMPUTER-READABLE MEDIUMS

A method includes moving one or more transmit facility or transmit facilities attached to a first component with regard to at least two receive facilities attached at a fixed position to the second component; and at least one of registering a respective error if an error condition exists for the respective receive facility or modifying an operation of an apparatus comprising the first and a second component if the error condition exists for the respective receive facility, the error condition for the respective receive facility depends on location information relating to at least one of the position of the first component with regard to the second component or orientation of the first component with regard to the second component, and/or at least one of a measure for a receive quality of the signals or data packets received from the transmit facility or from at least one of the transmit facilities.

METHOD AND APPARATUS FOR PERFORMING INTERNET REACHABILITY MANAGEMENT WITH AID OF INDICATOR
20220418016 · 2022-12-29 · ·

A method for performing Internet reachability management and associated apparatus are provided. The method may include: establishing, by a processor of the UE, a first connection to a first access device; receiving, by the processor, an indicator complying with a first protocol sent from the first access device; in response to receiving the indicator, performing, by the processor, a reachability detection complying with a second protocol to generate a detection result; and in response to the detection result representing that a network is not reachable, performing at least one of: displaying, by a display of the UE, a message or icon to represent the first connection or the network is unavailable; disconnecting, by the processor, the first connection; and establishing, by the processor, a second connection to a second access device.

Fine-grained network monitoring

In some cases, a network monitoring system may determine an operating or health condition of a node or connection link in a network (e.g., a datacenter network) by preparing an encapsulated data packet according to a tunneling protocol. Depending on a result of routing the encapsulated data packet, the network monitoring system determines whether the node or connection link is functioning normally or is experiencing an issue such as overloading or malfunctioning.

Fine-grained network monitoring

In some cases, a network monitoring system may determine an operating or health condition of a node or connection link in a network (e.g., a datacenter network) by preparing an encapsulated data packet according to a tunneling protocol. Depending on a result of routing the encapsulated data packet, the network monitoring system determines whether the node or connection link is functioning normally or is experiencing an issue such as overloading or malfunctioning.

Detection block sending and receiving method, and network device and system

This application provides example detection block sending and receiving methods, and network devices and systems. One example detection block sending method includes obtaining, by a network device, an original bit block data flow. At least one detection block is generated, and the at least one detection block is inserted into a position of at least one idle block in the original bit block data flow. The bit block data flow including the at least one detection block is then sent.

Detection block sending and receiving method, and network device and system

This application provides example detection block sending and receiving methods, and network devices and systems. One example detection block sending method includes obtaining, by a network device, an original bit block data flow. At least one detection block is generated, and the at least one detection block is inserted into a position of at least one idle block in the original bit block data flow. The bit block data flow including the at least one detection block is then sent.

Detecting connectivity disruptions by observing traffic flow patterns

Network connectivity disruptions impacting users of a network, can be detected based on patterns in user network traffic and network topology data, e.g., by a monitoring server computer. Logged network traffic data can be filtered to identify anomalous data flows. The anomalous data flows can be data flows indicating connection timeouts such as failed Secure Sockets Layer/Transport Layer Security (SSL/TLS) handshakes. Sources and destinations of the anomalous data flows can be mapped to corresponding physical locations using the network topology data, and the anomalous data flows can be grouped by source and destination, in order to determine an impact or scope of a network connectivity disruption. Users of the network can be notified regarding the network connectivity disruption, and optionally, actions can be taken to reduce the impact of the network connectivity disruption.

Detecting connectivity disruptions by observing traffic flow patterns

Network connectivity disruptions impacting users of a network, can be detected based on patterns in user network traffic and network topology data, e.g., by a monitoring server computer. Logged network traffic data can be filtered to identify anomalous data flows. The anomalous data flows can be data flows indicating connection timeouts such as failed Secure Sockets Layer/Transport Layer Security (SSL/TLS) handshakes. Sources and destinations of the anomalous data flows can be mapped to corresponding physical locations using the network topology data, and the anomalous data flows can be grouped by source and destination, in order to determine an impact or scope of a network connectivity disruption. Users of the network can be notified regarding the network connectivity disruption, and optionally, actions can be taken to reduce the impact of the network connectivity disruption.