H04L61/103

DYNAMIC CELLULAR CONNECTIVITY BETWEEN THE HYPERVISORS AND VIRTUAL MACHINES

Systems, methods, and computer-readable media for requesting a cellular IP address by initiating a call with a modem, establishing data packet network connectivity with the cellular IP address, assigning the cellular IP address to a virtual L2-bridge interface, wherein the virtual L2-bridge interface includes a MAC address, mapping a MAC address of a virtual machine with the MAC address of the virtual L2-bridge interface, detecting a change in the cellular IP address, and updating the virtual L2-bridge interface with a different cellular IP address while maintaining the data packet network connectivity.

DYNAMIC CELLULAR CONNECTIVITY BETWEEN THE HYPERVISORS AND VIRTUAL MACHINES

Systems, methods, and computer-readable media for requesting a cellular IP address by initiating a call with a modem, establishing data packet network connectivity with the cellular IP address, assigning the cellular IP address to a virtual L2-bridge interface, wherein the virtual L2-bridge interface includes a MAC address, mapping a MAC address of a virtual machine with the MAC address of the virtual L2-bridge interface, detecting a change in the cellular IP address, and updating the virtual L2-bridge interface with a different cellular IP address while maintaining the data packet network connectivity.

Datapath for multiple tenants

A novel design of a gateway that handles traffic in and out of a network by using a datapath pipeline is provided. The datapath pipeline includes multiple stages for performing various data-plane packet-processing operations at the edge of the network. The processing stages include centralized routing stages and distributed routing stages. The processing stages can include service-providing stages such as NAT and firewall. The gateway caches the result previous packet operations and reapplies the result to subsequent packets that meet certain criteria. For packets that do not have applicable or valid result from previous packet processing operations, the gateway datapath daemon executes the pipelined packet processing stages and records a set of data from each stage of the pipeline and synthesizes those data into a cache entry for subsequent packets.

System and method for using real-time packet data to detect and manage network issues

A system and method is disclosed of extracting information from real-time network packet data to analyze connectivity data for client devices in a network. The method includes: detecting when client devices initiate a connectivity event; after detecting a connectivity event, waiting a period of time for the client device to either reach or fail to reach a network connected state; after waiting a period of time, recording connectivity event information; and sending the recorded connectivity event information to an analytics system for network incident and/or network congestion analysis.

System and method for using real-time packet data to detect and manage network issues

A system and method is disclosed of extracting information from real-time network packet data to analyze connectivity data for client devices in a network. The method includes: detecting when client devices initiate a connectivity event; after detecting a connectivity event, waiting a period of time for the client device to either reach or fail to reach a network connected state; after waiting a period of time, recording connectivity event information; and sending the recorded connectivity event information to an analytics system for network incident and/or network congestion analysis.

Theft detector

An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.

Theft detector

An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.

Address resolution protocol (ARP) response to ARP requests
11706185 · 2023-07-18 · ·

Techniques are disclosed for avoiding sending network traffic through a backup network device when an active network device is operational. An example device is configured to receive a first address resolution protocol (ARP) request from an active network device and a second ARP request from a backup network device. The device is also configured to, in response to receiving the first ARP request and the second ARP request, send a first ARP response to the active network device.

Address resolution protocol (ARP) response to ARP requests
11706185 · 2023-07-18 · ·

Techniques are disclosed for avoiding sending network traffic through a backup network device when an active network device is operational. An example device is configured to receive a first address resolution protocol (ARP) request from an active network device and a second ARP request from a backup network device. The device is also configured to, in response to receiving the first ARP request and the second ARP request, send a first ARP response to the active network device.

Identifier resolution method and apparatus for the internet of things

Provided are an identifier resolution method and apparatus for the Internet of Things. In the method, different identifier resolution systems are compatible through constructing an identifier resolution architecture for the Internet of Things, and a unified method is used for resolving various identifiers. Therefore, it is simply required to maintain one identifier resolution architecture for the Internet of Things when resolving different identifiers, which reduces the workload and difficulty for maintenance of the identifier resolution system and thus reduces the workload and difficulty for maintenance of the Internet of Things.