H04L61/5014

Transportation infrastructure service discovery arrangement

Transportation infrastructure service discovery arrangement disclosed. In the arrangement a peripheral device is attached to a transportation infrastructure control network. The client is configured to request an address from a DNS server of the host network. As a response the client receives network settings that can be used for contacting applications attached to the transportation infrastructure control network.

Transportation infrastructure service discovery arrangement

Transportation infrastructure service discovery arrangement disclosed. In the arrangement a peripheral device is attached to a transportation infrastructure control network. The client is configured to request an address from a DNS server of the host network. As a response the client receives network settings that can be used for contacting applications attached to the transportation infrastructure control network.

Integrated network boot operating system installation leveraging hyperconverged storage

A computing node is configure to implement an intra-node network boot and installation protocol (protocol) for booting and installing an operating system (OS) on a virtual machine hosted on the computing node without communicating over a physical network. The protocol includes hosting a dynamic host configuration protocol (DHCP) server instance and/or a network boot server instance on a controller virtual machine of the computing node to emulate DHCP protocol and network boot server protocol communications. In some examples, the protocol further utilizes one or more virtual extensible local area networks (LANs)(VXLANs) and a virtual switch hosted at a hypervisor running on the computing node.

Integrated network boot operating system installation leveraging hyperconverged storage

A computing node is configure to implement an intra-node network boot and installation protocol (protocol) for booting and installing an operating system (OS) on a virtual machine hosted on the computing node without communicating over a physical network. The protocol includes hosting a dynamic host configuration protocol (DHCP) server instance and/or a network boot server instance on a controller virtual machine of the computing node to emulate DHCP protocol and network boot server protocol communications. In some examples, the protocol further utilizes one or more virtual extensible local area networks (LANs)(VXLANs) and a virtual switch hosted at a hypervisor running on the computing node.

Generation and use of micro-pools to assign an IP address to a requesting computing device

The present application describes the generation and use of micro-pools that are assigned to various DHCP servers by an agent. In examples, each micro-pool includes a set number of IP addresses. The agent tracks which DHCP servers are assigned which micro-pools. As the IP addresses of a micro-pool are assigned to requesting computing devices, the agent may subsequently assign an additional micro-pool to a particular DHCP server.

Systems and methods for radio unit backup connections
11638326 · 2023-04-25 · ·

When a failed connection is detected from a first radio unit (RU) to the cellular site router (CSR), activation of an existing backup cabled connection from the first RU to the CSR through a cabled connection between the first RU and a second RU of the cellular telecommunications tower may be performed. In one example, a first RU and second RU each have two physical network ports. The activation of the existing backup cabled connection from the first RU, via the second RU, to the CSR may include causing the first RU to enter from a normal operating mode into an Open Radio Access Network (O-RAN) cascade operating mode to attempt to attain network connectivity for the first RU using the second physical network port of the first RU.

SECURITY AND PRIVACY SUPPORT FOR DIRECT WIRELESS COMMUNICATIONS

Systems, methods and instrumentalities are described herein that provide security and/or privacy support for wireless transmit receive units (WTRUs) communicating via a WTRU to WTRU relay. A source WTRU may obtain a new IP address from a relay WTRU via a link identifier update request. The source WTRU may indicate to the relay WTRU which one or more target WTRUs are to be informed of the new IP address. The source WTRU may indicate to the relay WTRU whether the target WTRU's ID(s) should be changed. The relay WTRU may send the source WTRU's new IP address to authorized target WTRUs. The source, relay, and target WTRU may use tokens to grant or receive authorizations for sharing each other's IP addresses.

DEPLOYABLE NETWORK SENSOR FOR MULTIPLE PLATFORMS

Disclosed herein are methods, systems, and processes for centralized containerized deployment of network traffic sensors to network sensor hosts for deep packet inspection (DPI) that supports various other cybersecurity operations. A network sensor package containing a preconfigured network sensor container is received by a network sensor host from a network sensor deployment server. Installation of the network sensor package on the network sensor host causes execution of the network sensor container that further causes deployment of an on-premise network sensor along with a network sensor management system, a DPI system, and an intrusion detection/prevention (IDS/IPS) system. The configurable on-premise network sensor is deployed on multiple operating system distributions of the network sensor host and generates actionable network metadata using DPI techniques for optimized log search and management and improved intrusion detection and response (IDR) operations.

Secure administration of a local communication network comprising at least one communicating object
11632399 · 2023-04-18 · ·

A method of managing a local area communication network comprising at least one access equipment for accessing the network is disclosed. At least one communicating object is connected to the network. In one aspect, the method comprises upon detecting connection of a new communicating object to the network and/or upon detecting installation of new firmware on the at least one communicating object connected to the network, a learning phase involving observing interactions of the communicating object with at least one other equipment of the local area network and/or at least one equipment of a wide area communication network accessible via the access equipment. In addition, at least one security rule associated with the communicating object on the basis of the observed interactions is disclosed.

Secure administration of a local communication network comprising at least one communicating object
11632399 · 2023-04-18 · ·

A method of managing a local area communication network comprising at least one access equipment for accessing the network is disclosed. At least one communicating object is connected to the network. In one aspect, the method comprises upon detecting connection of a new communicating object to the network and/or upon detecting installation of new firmware on the at least one communicating object connected to the network, a learning phase involving observing interactions of the communicating object with at least one other equipment of the local area network and/or at least one equipment of a wide area communication network accessible via the access equipment. In addition, at least one security rule associated with the communicating object on the basis of the observed interactions is disclosed.