Patent classifications
H04L43/0811
Analysis of system conditions from endpoint status information
A system includes Session-Initiation-Protocol (SIP) servers that provide services for a respective set of endpoints. A monitor server can receive connectivity status of the respective set of endpoints based on registration status provided by the endpoints to the SIP servers. Based upon the received connectivity status, endpoints having connectivity problems are parsed into one or more subgroups. Potential problem sources are identified for the connectivity problems of the parsed endpoints. For each of the subgroups, the monitor server determines whether the subgroup exceeds a corresponding trigger threshold. In response a corresponding trigger threshold being exceeded, an action profile specifying an entity is accessed. A notification is transmitted to the entity.
Analysis of system conditions from endpoint status information
A system includes Session-Initiation-Protocol (SIP) servers that provide services for a respective set of endpoints. A monitor server can receive connectivity status of the respective set of endpoints based on registration status provided by the endpoints to the SIP servers. Based upon the received connectivity status, endpoints having connectivity problems are parsed into one or more subgroups. Potential problem sources are identified for the connectivity problems of the parsed endpoints. For each of the subgroups, the monitor server determines whether the subgroup exceeds a corresponding trigger threshold. In response a corresponding trigger threshold being exceeded, an action profile specifying an entity is accessed. A notification is transmitted to the entity.
USER GENERATED PLUGGABLE CONTENT DELIVERY NETWORK (CDN) SYSTEM AND METHOD
A pluggable CDN system and method include an edge node that is installed at each premises and caches/serves content/data to that premises that may be an individual user or a community. The edge node may use a hybrid push/pull caching scheme and may serve data to users even without any Internet connectivity.
Passing authentication token to authorize access to rest calls via web sockets
Various techniques for facilitating communication with and across a clinical environment and a cloud environment are described. For example, a method for authenticating a network device residing in the clinical environment using a token is described. An authentication proxy in the cloud environment can receive a request from a connectivity adapter in the clinical environment and retrieve a security token from an authentication system in the cloud. The connectivity adapter can use the security token to send signed requests to the authentication system.
Information processing terminal and control method
An information processing terminal on which a web browser operates includes a setting unit configured to set a limitation condition for limiting transmission of local storage data to a web server providing a web application, and a determination unit configured to determine a value indicating a status of network connection of the information processing terminal in accordance with the set limitation condition when the status of the network connection of the information processing terminal is online. Even when the status of the network connection of the information processing terminal is online, the transmission of the local storage data to the web server from the web application is limited in accordance with the determined value.
Information processing terminal and control method
An information processing terminal on which a web browser operates includes a setting unit configured to set a limitation condition for limiting transmission of local storage data to a web server providing a web application, and a determination unit configured to determine a value indicating a status of network connection of the information processing terminal in accordance with the set limitation condition when the status of the network connection of the information processing terminal is online. Even when the status of the network connection of the information processing terminal is online, the transmission of the local storage data to the web server from the web application is limited in accordance with the determined value.
Systems and methods for automatic feedback control in a distributed control system
Systems and methods for automatic feedback control are provided. According to one embodiment of the disclosure, a method for automatic feedback control may commence with receiving high-level control references by a low-level controller communicatively coupled to a high-level controller via the network connection. The method may further include generating, by the low-level controller, low-level control references for a hardware asset based at least in part on the high-level control references. The method may continue with transferring control of the hardware asset to the low-level controller in response to a loss of the network connection. The method may further include adjusting the low-level control references by a low-level control mechanism associated with the low-level controller in response to the loss of the network connection.
Systems and methods for automatic feedback control in a distributed control system
Systems and methods for automatic feedback control are provided. According to one embodiment of the disclosure, a method for automatic feedback control may commence with receiving high-level control references by a low-level controller communicatively coupled to a high-level controller via the network connection. The method may further include generating, by the low-level controller, low-level control references for a hardware asset based at least in part on the high-level control references. The method may continue with transferring control of the hardware asset to the low-level controller in response to a loss of the network connection. The method may further include adjusting the low-level control references by a low-level control mechanism associated with the low-level controller in response to the loss of the network connection.
MONITORING DATA LINK HEALTH USING CONNECTIONLESS LOOPS OVER REDUNDANT IP NETWORKS
Devices, methods, systems, and computer-readable media for using connectionless loops for monitoring data link health using connectionless loops over redundant Internet Protocol (IP) networks are described herein. One system includes an IP network device connected to a device used by a party to communicate with another party through an IP network, a first network device operating a first network and referring to the IP network device with a first identifier, a second network device operating a second network and referring to the IP network device with a second identifier, an intermediary device allowing communication between the first and second networks, and instructions to create a connectionless packet, send the packet through the first network addressed to the second identifier, such that the packet is routed from the first network to the intermediary device and into the second network based on the second identifier, and receive the packet.
MONITORING DATA LINK HEALTH USING CONNECTIONLESS LOOPS OVER REDUNDANT IP NETWORKS
Devices, methods, systems, and computer-readable media for using connectionless loops for monitoring data link health using connectionless loops over redundant Internet Protocol (IP) networks are described herein. One system includes an IP network device connected to a device used by a party to communicate with another party through an IP network, a first network device operating a first network and referring to the IP network device with a first identifier, a second network device operating a second network and referring to the IP network device with a second identifier, an intermediary device allowing communication between the first and second networks, and instructions to create a connectionless packet, send the packet through the first network addressed to the second identifier, such that the packet is routed from the first network to the intermediary device and into the second network based on the second identifier, and receive the packet.