Patent classifications
H04L43/0894
Battery efficient wireless network connection and registration for a low-power device
A client device is configured to communicate with an access point over a wireless network, exchanging data with the access point over a selected communication channel. The client device stores an identifier of the selected communication channel. After the wireless connection to the access point has ended, the client device initiates a process to reconnect to the access point over the selected communication channel using the stored identifier.
Method, apparatus, and system for time synchronization based on in-band telemetry
A method, an apparatus, and a system for time synchronization based on in-band telemetry are disclosed. The method includes: acquiring an estimated value of delay in a first transmission direction and an estimated value of delay in a second transmission direction; wherein the estimated value of delay in the first transmission direction is determined according to multiple delay samples in the first transmission direction, and the estimated value of delay in the second transmission direction is determined according to multiple delay samples in the second transmission direction, the first transmission direction is a direction from a second device to a first device, and the second transmission direction is vice versa; and determining a time system error of the first device relative to the second device according to the estimated value of delay in the first transmission direction and the estimated value of delay in the second transmission direction.
Method, apparatus, and system for time synchronization based on in-band telemetry
A method, an apparatus, and a system for time synchronization based on in-band telemetry are disclosed. The method includes: acquiring an estimated value of delay in a first transmission direction and an estimated value of delay in a second transmission direction; wherein the estimated value of delay in the first transmission direction is determined according to multiple delay samples in the first transmission direction, and the estimated value of delay in the second transmission direction is determined according to multiple delay samples in the second transmission direction, the first transmission direction is a direction from a second device to a first device, and the second transmission direction is vice versa; and determining a time system error of the first device relative to the second device according to the estimated value of delay in the first transmission direction and the estimated value of delay in the second transmission direction.
Video analysis and data delivery method
A method for providing data to a client computing device from an edge computing device is discussed herein. The method may include performing a network proximity check regarding the client computing device associated with a request for data captured by the wideband sensor. The method may further include determining, based on at least one proximity metric associated with the client computing device, a route for data responsive to the request for data associated with the network proximity check, where the route is one of a route including the cloud storage or a route that does not include the cloud storage. The method may also include receiving the request for data captured by the wideband sensor associated with the network proximity check. The method may also include transmitting the data responsive to the request for data captured by the wideband sensor associated with the network proximity check to the client computing device through the determined route.
Video analysis and data delivery method
A method for providing data to a client computing device from an edge computing device is discussed herein. The method may include performing a network proximity check regarding the client computing device associated with a request for data captured by the wideband sensor. The method may further include determining, based on at least one proximity metric associated with the client computing device, a route for data responsive to the request for data associated with the network proximity check, where the route is one of a route including the cloud storage or a route that does not include the cloud storage. The method may also include receiving the request for data captured by the wideband sensor associated with the network proximity check. The method may also include transmitting the data responsive to the request for data captured by the wideband sensor associated with the network proximity check to the client computing device through the determined route.
System, device, and method of classifying encrypted network communications
Systems, devices, and methods of classifying encrypted network communications. A Traffic Monitoring Unit operates to monitor network traffic, and to capture HTTPS-encrypted packets that are exchanged over an HTTPS connection between an end-user device and a web server. An HTTPS Traffic Classification Unit operates to detect discrete HTTPS-encrypted objects within that HTTPS connection, and to classify those discrete HTTPS-encrypted objects based on at least one of: a first Analysis Model that classifies HTTPS-encrypted objects based on a type of content that is represented in the HTTPS-encrypted object; a second Analysis Model that classifies HTTPS-encrypted objects based on a type of server-side application that is associated with the HTTPS-encrypted object. Each Analysis Model utilizes Machine Learning (ML), Deep Learning (DL), Artificial Intelligence (AI), or Statistical and Mathematical Analysis (SMA).
System, device, and method of classifying encrypted network communications
Systems, devices, and methods of classifying encrypted network communications. A Traffic Monitoring Unit operates to monitor network traffic, and to capture HTTPS-encrypted packets that are exchanged over an HTTPS connection between an end-user device and a web server. An HTTPS Traffic Classification Unit operates to detect discrete HTTPS-encrypted objects within that HTTPS connection, and to classify those discrete HTTPS-encrypted objects based on at least one of: a first Analysis Model that classifies HTTPS-encrypted objects based on a type of content that is represented in the HTTPS-encrypted object; a second Analysis Model that classifies HTTPS-encrypted objects based on a type of server-side application that is associated with the HTTPS-encrypted object. Each Analysis Model utilizes Machine Learning (ML), Deep Learning (DL), Artificial Intelligence (AI), or Statistical and Mathematical Analysis (SMA).
Spam detection
A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.
Method and System for Balancing Storage Data Traffic in Converged Networks
Methods for balancing storage data traffic in a system in which at least one computing device (server) coupled to a converged network accesses at least one storage device coupled (by at least one adapter) to the network, systems configured to perform such methods, and devices configured to implement such methods or for use in such systems. Typically, the system includes servers and adapters, and server agents implemented on the servers and adapter agents implemented on the adapters are configured to detect and respond to imbalances in storage and data traffic in the network, and to redirect the storage data traffic to reduce the imbalances and, thereby to improve the overall network performance (for both data communications and storage traffic). Typically, each agent operates autonomously (except in that an adapter agent may respond to a request or notification from a server agent), and no central computer or manager directs operation of the agents.
BANDWIDTH MANAGEMENT FOR RESOURCE RESERVATION PROTOCOL LSPS AND NON-RESOURCE RESERVATION PROTOCOL LSPS
In general, techniques described are for bandwidth sharing between resource reservation protocol label switched paths (LSPs) and non-resource reservation protocol LSPs. For example, in networks where resource reservation protocol LSPs and non-resource reservation protocol LSPs co-exist within the same domain, resource reservation protocol LSPs and non-resource reservation protocol LSPs may share link bandwidth. However, when non-resource reservation protocol LSPs are provisioned, resource reservation protocol path computation elements computing resource reservation protocol paths may not account for non-resource reservation protocol LSP bandwidth utilization. The techniques described herein provide a mechanism for automatically updating traffic engineering database (TED) information about resource reservation protocol LSPs in a way that accounts for non-resource reservation protocol LSP traffic flow statistics, such as bandwidth utilization. Path computation elements may thus rely on an accurate TED for LSP path computation.