H04L43/0811

Method and apparatus for link status notification

This application provides a signal transmission method and apparatus. The method is applied to a communications system including at least three nodes, a second node in the at least three nodes communicates with a third node by using a first node, and the method includes: determining, by the first node, a status of a link between the first node and the second node; and sending, by the first node, first notification information to the third node when determining that the link between the first node and the second node is abnormal, where the first notification information is used to indicate that the link between the first node and the second node is abnormal.

Method and apparatus for link status notification

This application provides a signal transmission method and apparatus. The method is applied to a communications system including at least three nodes, a second node in the at least three nodes communicates with a third node by using a first node, and the method includes: determining, by the first node, a status of a link between the first node and the second node; and sending, by the first node, first notification information to the third node when determining that the link between the first node and the second node is abnormal, where the first notification information is used to indicate that the link between the first node and the second node is abnormal.

Systems and methods of monitoring network devices
11502929 · 2022-11-15 · ·

Implementations of the disclosed subject matter provide systems and methods of assigning, at a server, a unique identifier to each of a plurality of devices communicatively coupled to one another and the server via a communications network. Each unique identifier may be converted to a device hash key by applying a hash function. A range of device hash keys of the plurality of devices may be split into N approximately equal sectors, where N is a prime number and each sector includes 1/N of the device hash keys of the plurality of the devices. K monitoring workers provided by the server may monitor the plurality of devices in an order based on the respective device hash key, where K is an integer.

Systems and methods of monitoring network devices
11502929 · 2022-11-15 · ·

Implementations of the disclosed subject matter provide systems and methods of assigning, at a server, a unique identifier to each of a plurality of devices communicatively coupled to one another and the server via a communications network. Each unique identifier may be converted to a device hash key by applying a hash function. A range of device hash keys of the plurality of devices may be split into N approximately equal sectors, where N is a prime number and each sector includes 1/N of the device hash keys of the plurality of the devices. K monitoring workers provided by the server may monitor the plurality of devices in an order based on the respective device hash key, where K is an integer.

NETWORK-BASED CONTROL METHOD FOR POWER CONSUMPTION OF APPLICATIONS, TERMINAL AND STORAGE MEDIUM
20220360514 · 2022-11-10 ·

A network-based control method for power consumption of an application, a terminal device and a non-transitory computer-readable storage medium are disclosed. The network-based control method may include: identifying a target application having a frequent wakeup or heartbeat detection behavior in response to a freezing function being enabled; monitoring whether a peer server to which the target application is connected is accessible; and freezing the target application by the freezing function in response to the peer server being inaccessible.

NETWORK-BASED CONTROL METHOD FOR POWER CONSUMPTION OF APPLICATIONS, TERMINAL AND STORAGE MEDIUM
20220360514 · 2022-11-10 ·

A network-based control method for power consumption of an application, a terminal device and a non-transitory computer-readable storage medium are disclosed. The network-based control method may include: identifying a target application having a frequent wakeup or heartbeat detection behavior in response to a freezing function being enabled; monitoring whether a peer server to which the target application is connected is accessible; and freezing the target application by the freezing function in response to the peer server being inaccessible.

PRIVATE NETWORKS SHARING SLICED RESOURCES WITH PUBLIC NETWORK
20220360580 · 2022-11-10 ·

The present disclosure describes solutions for seamless enterprise network integration with operator networks. Enterprise networks can include full network resources to provide a complete, isolated network. The enterprise network can also host mobile network operator users with edge managers acting as routing agents. Moreover, when an enterprise moves outside of the enterprise network, the enterprise user can still access the enterprise network via an operator network without compromising security, privacy, and reliability. A neutral hosted core can be used as a routing agent to the enterprise network from one or more operator networks.

SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION

This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.

SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION

This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.

Computing system with hardware reconfiguration mechanism and method of operation thereof
11494322 · 2022-11-08 · ·

A method of operation of a computing system includes: providing a first cluster having a first kernel unit for managing a first reconfigurable hardware device; analyzing an application descriptor associated with an application; generating a first bitstream based on the application descriptor for loading the first reconfigurable hardware device, the first bitstream for implementing at least a first portion of the application; and implementing a first fragment with the first bitstream in the first cluster.