H04L43/0829

SECRETS ROTATION FOR VEHICLES
20230018251 · 2023-01-19 ·

Systems and methods for message format communication among resource-constrained devices are generally described. In some examples, a first message sent by an edge computing device may be received. A determination may be made that the first message comprises a first data format identifier. A determination may be made that the first message comprises a first data format patch. A determination may be made that the first data format identifier was previously stored in a data structure in association with a first data format. In various examples, the first data format may be modified using the first data format patch to generate a first modified data format. The first modified data format may be stored in the data structure in association with the first data format identifier. In some examples, a payload of the first message may be read using the first modified data format.

Protection switching using performance metrics
11558760 · 2023-01-17 · ·

Technology disclosed herein includes a method to trigger protection switching on a wireless link of a network device comprised in a protection switching capable network. The method comprises monitoring one or more performance metrics on said link and sending a signal failed message when at least one metric of said one or more performance metrics fails to satisfy performance criteria related to the at least one metric of said one or more performance metrics.

Uplink-aware monitoring of logical overlay tunnels

Example methods and systems for uplink-aware logical overlay tunnel monitoring are described. In one example, a first computer system may establish a logical overlay tunnel with a second computer system. The first computer system may generate and send, over the logical overlay tunnel via the first uplink, a first encapsulated monitoring packet identifying the first uplink. Based on a first reply, first performance metric information associated with the first uplink may be determined. The first computer system may generate and send, over the logical overlay tunnel via the second uplink, a second encapsulated monitoring packet identifying the second uplink. Based on a second reply, second performance metric information associated with the second uplink may be determined. Based on the first performance metric information and the second performance metric information, the first uplink or the second uplink may be selected to send encapsulated data packet(s) over the logical overlay tunnel.

LEARNING SLA VIOLATION PROBABILITY FROM INTELLIGENT FINE GRAINED PROBING

In one embodiment, a device obtains a first set of measurements of a path metric for a path in a network that are measured using periodic probing of the path. The device obtains a second set of measurements of the path metric for the path that are measured using fine-grained probing of the path at a higher frequency than that of the periodic probing. The device generates a predictive model that predicts values of the path metric, based on the first set of measurements and on the second set of measurements. The device causes, based on a value of the path metric predicted by the predictive model, traffic to be rerouted from the path to another path in the network.

ENHANCED PATH SELECTION USING ONLINE DETECTION OF PATHS OVERLAPS

The method of some embodiments selects a backup overlay network route when rerouting data packets to avoid delays on a primary overlay network route. The method, for each of multiple overlay network routes, measures delays of data packet transmissions on the overlay network route. The method correlates changes in the delays of data packet transmissions sent through different overlay network routes of the plurality of overlay network routes. The method selects the backup overlay network route based on the backup overlay network route having a low correlation or no correlation of changes of delays with the primary overlay route. In some embodiments, multiple physical network routes underlie the multiple overlay network routes, and correlating changes in the delays of data packet transmissions sent through different overlay network routes of the plurality of overlay network routes includes identifying overlay network routes for which the underlying physical network routes share infrastructure.

Debugging arrangement for active ethernet cable

A cable, a manufacturing method, and a usage method, each facilitate product development, testing, and debugging. An illustrative embodiment of a cable manufacturing method includes: connecting a first connector plug to a first data recovery and re-modulation (DRR) device and to a first controller device; and coupling electrical signal conductors to the first DRR device to convey electrical transit signals to and from a second DRR device, the second DRR device being connected to a second connector plug. The first controller device is operable in response to a host command to initiate a debug dump by the first DRR device and to store the debug dump in a nonvolatile memory.

Accelerated startup of satellite high-bandwidth communication sessions

Various arrangements for increasing a transfer rate of a data transfer via satellite are presented. A satellite gateway may set an accelerated set of communication parameters that control communication between the satellite gateway and the satellite terminal via the satellite and between the satellite gateway and the content source to an accelerated transfer rate between the content source and the satellite terminal. A first set of data may be transferred from the content source to the satellite terminal using the set of communication parameters. After transferring the first set of data, the satellite gateway may adjust the initial set of communication parameters to an adjusted set of communication parameters. The adjusted transfer rate can be lower than the accelerated transfer rate.

Unique ID generation for sensors

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.

Unique ID generation for sensors

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.

Optimizing Border Gateway Protocol (BGP) traffic using reinforcement learning

Systems, methods, and computer-readable media including software logic are provided for optimizing Border Gateway Protocol (BGP) traffic in a telecommunications network. In one embodiment, systems and methods include, with a current state of one or more inter-Autonomous Systems (AS) links, causing performance of an action in the telecommunication network, determining a metric based on the action to determine an updated current state of the one or more inter-AS links, and utilizing the metric to perform a further action to achieve one or more rewards associated with the one or more inter-AS links.