Patent classifications
H04L47/286
BEACON INTERVAL WITH BOUNDARY TIME POINTS (BTPS) TO IMPROVE LATENCY FOR TIME SENSITIVE TRAFFIC (TST) IN EXTREMELY HIGH THROUGHOUT (EHT) WLANS
Embodiments of a beacon interval with boundary time points (BTPs) to improve latency for time sensitive traffic (TST) in Extremely High Throughout (EHT) WLANS are disclosed herein. In some embodiments, a non-access point (AP) station (STA) is configured to decode a beacon frame received from an AP STA. The beacon frame may indicate one or more BTPs within a beacon interval (BI). The non-AP STA may obtain a transmission opportunity (TXOP) for a transmission to the AP STA. The TXOP may be bounded by the one or more BTPs. The non-AP STA may encode a PPDU for transmission to the AP STA during the TXOP.
Apparatus and method for providing synchronization information of first communication network to second communication network in communication system
A method of a user equipment (UE) in a communication system for obtaining and transmitting synchronization information is provided. The method includes obtaining synchronization information from a first communication network, and transmitting the synchronization information to a second communication network. The synchronization information is updated based on an obtainment time from the first communication network and a transmission time to the second communication network. The UE operates as a device-side time sensitive networking (TSN) translator (DS-TT).
VINE: ZERO-CONTROL ROUTING USING DATA PACKET INSPECTION FOR WIRELESS MESH NETWORKS
A MANET protocol, comprising: receiving a data packet (DP) from a current sender (CS) by a recipient, defining: an identity of the CS, a prior sender (PS) from which CS received DP, and a target recipient (ID), a count (HC) of hops previously traversed by DP, and a sequence identifier (SI); updating a forwarding table (FT) to mark CS as being reachable in one hop, and PS as being reachable in two hops via CS as next hop; determining if ID is the recipient; determining whether to rebroadcast by recipient, if and only if the SI is not present in a list of prior SIs; and selectively rebroadcasting DP by recipient in dependence on said determining, modified by: replacement of CS with an identity of the recipient, PS with CS, and ID with a next hop from the FT if present, and incrementing HC.
Security mechanisms for preventing retry or replay attacks
Embodiments include apparatuses, methods, and systems for managing security of a communication network. A message, formatted based on a stateless communication protocol for a communication network, may be received from a first computing device and by a second computing device. The second computing device generates and further stores, based on a hash function stored in a storage device associated with the second computing device, a fingerprint of the message. The fingerprint is generated using the hash function based on at least a portion of a header of the message or a portion of a body of the message. In addition, the second computing device detects whether the generated fingerprint of the message has a duplicated fingerprint already stored in the storage device, where the message is a retried message or replayed message of a message having the duplicated fingerprint. Other embodiments may also be described and claimed.
Scheduling data traffic in wireless time sensitive networks
Systems and methods for scheduling data traffic in a wireless time sensitive network (TSN). A computer configured to synchronize clocks of all nodes with a common clock in the TSN. Obtain data traffic information for the TSN using a network scheduler to establish routing paths. Determine routing paths using the obtained data traffic information and stored routing information via a memory. Compute a link communication delay for each link of the one or more relay nodes connecting a source node to a destination node of the TSN for each TSN stream using a network scheduler. Determine interfering links for each wireless link using the network scheduler. Determining a scheduling period using the network scheduler. Determine optimal scheduling using an optimal scheduling module. Generate the gate control list for each egress port of the wired node and the wireless transmitter of the TSN, and begin transmission of the data.
METHOD AND APPARATUS FOR MANAGING INFORMATION RELATED TO EDGE COMPUTING SERVICE
A method for continuously providing an edge computing service to user equipment (UE) by an edge enabler server (EES) of a mobile edge computing (MEC) system is provided, which includes receiving, from a source edge application server (EAS), update information including UE information and source EAS information, wherein the source EAS provides the edge computing service to the UE; retrieving, from an edge configuration server (ECS), target EES information based on the update information; transmitting, to a target EES, the UE information and the EAS information based on the target EES information; receiving, from the target EES, target EAS information; and transferring, to the source EAS, the target EAS information.
Detection of DNS beaconing through time-to-live and transmission analyses
The disclosure provides implementations for determining whether domain name server (DNS) beaconing is present within a communication session. Some implementations provide a method that includes multiple analyses directed to analyzing each of a time-to-live (TTL) run length distribution for a plurality of DNS records within the communication session and analyzing whether the communication is comprised of at least a threshold number of transmissions. As used in the analyses, the communication session may be comprised of transmissions between a first source device and a first DNS. When DNS beaconing is detected within the communication session, some implementations of the disclosure provide for generating an alert to an administrator or other user.
DOMAIN NAME ACCESS METHOD AND DEVICE
A domain name access method and a device are described. As described herein, a domain name server (DNS) server performs resolution on a domain name requested by the terminal device. The DNS server may then send an internet protocol (IP) address of an application server obtained through the resolution and use condition information to the terminal device. With this, communication efficiency of the terminal device can be improved, and waste of transmission resources in a communications system is also avoided.
Relay method, relay system, and relay program
A connection management apparatus of a relay system specifies, when terminal identification information for identifying a target terminal is acquired from a client terminal, a first relay apparatus that relays communication, and specifies connecting information for the client terminal to connect to the first relay apparatus. The connection management apparatus stores the specified connecting information and the terminal identification information in a storage in association with each other, and notifies the client terminal of the specified connecting information. When the specified first relay apparatus receives access based on the connecting information from the client terminal, the specified first relay apparatus relays the communication between the client terminal and the target terminal on the basis of the terminal identification information associated with the connecting information.
Prepopulation of call center cache
A system, process, and computer-readable medium for updating an application cache using a stream listening service is described. A stream listening service may monitor one or more data streams for content relating to a user. The stream listening service may forward the content along with time-to-live values to an application cache. A user may use an application to obtain information regarding the user's account, where the application obtains information from a data store and/or cached information from the application cache. The stream listening service, by forwarding current account information, obtained from listening to one or more streams, to the application cache, reduces traffic at the data store by providing current information from the data stream to the application cache.