H04L2101/622

SYSTEMS AND METHODS FOR RADIO UNIT BACKUP CONNECTIONS
20230225010 · 2023-07-13 ·

When a failed connection is detected from a first radio unit (RU) to the cellular site router (CSR), activation of an existing backup cabled connection from the first RU to the CSR through a cabled connection between the first RU and a second RU of the cellular telecommunications tower may be performed. In one example, a first RU and second RU each have two physical network ports. The activation of the existing backup cabled connection from the first RU, via the second RU, to the CSR may include causing the first RU to enter from a normal operating mode into an Open Radio Access Network (O-RAN) cascade operating mode to attempt to attain network connectivity for the first RU using the second physical network port of the first RU.

Method for assigning a MAC address, and database with MAC addresses

A method in which a communication device can be configured with a MAC address so that when the user logs into a network environment using a communication device from among a number of communication devices a MAC address is assigned to the user and is specific to the user. The MAC address assignment can be used for pairing with a communication device assigned to the user (e.g. a near-field communication device). A database containing MAC addresses can be connected to communication devices through a network and can provide user-specific MAC addresses that are readable into or otherwise transmittable to a predetermined communication device when a user logs into the network. The database can be managed by a server or other computer device of the network.

Split bearer packet data converge protocol protocol data unit routing

For routing Packet Data Converge Protocol (PDCP) Protocol Data Units (PDU), a processor detects a split bearer configuration for a mobile device. In response to detecting the split bearer configuration, the processor routes PDCP PDU in a Radio Link Control (RLC)/Medium Access Control (MAC) for the at least two cell groups.

Methods and arrangements for vehicle-to-vehicle communications

Logic may implement protocols and procedures for vehicle-to-vehicle communications for platooning. Logic may implement a communications topology to distinguish time-critical communications from non-time-critical communications. Logic may sign time-critical communications with a message authentication code (MAC) algorithm with a hash function such as Keccak MAC or a Cipher-based MAC. Logic may generate a MAC based on pairwise, symmetric keys to sign the time-critical communications. Logic may sign non-time-critical communications with a digital signature. Logic may encrypt non-time-critical communications. Logic may append a certificate to non-time-critical communications. Logic may append a header to messages to create data packets and may include a packet type to identify time-critical communications. Logic may decode and verify the time-critical messages with a pairwise symmetric key. And logic may prioritize time-critical communications to meet a specified latency.

Seamless remote network redirection

Disclosed are systems and methods for seamlessly redirecting network data between a client and a remote server. In one exemplary aspect, the method comprises receiving, at a remote server, the network data via a first remote desktop protocol (RDP) channel, wherein the network data is encapsulated and transmitted by a client device configured to communicate with the remote server. The method further comprises replacing a MAC address listed in the network data with a MAC address of a logical network adapter on the remote server, and placing received network packets into a network driver of the logical network adapter, wherein the logical network adapter transfers received data in an operating system of the remote server such that a server-side application on the remote server receives network packets from the client device.

Hardware address consistency management

A VPN tunnel interface is instantiated within a router based on a tunnel network namespace. One or more virtual peers corresponding to the VPN tunnel interface and one or more virtual ethernet interfaces corresponding to the one or more virtual peers are instantiated. The tunnel network namespace is configured to route, based on a source address, network traffic from a specified client device to a specified virtual peer of the one or more virtual peers via the VPN tunnel interface. A connection is established between a client device and a VPN process of the router and a traffic flow is transported to and from the client device through a VPN tunnel via the VPN tunnel interface, the one or more virtual peers, and the one or more virtual ethernet interfaces.

Collaborative device address rotation

Embodiments are presented for collaborative device address generation between a wireless client device and a network infrastructure component, such as a wireless access point. The wireless client device and network infrastructure component share information to facilitate collaborative generation of a sequence of device addresses. This shared information includes, in some embodiments, key information and moving factor information. The key information and moving factor information is used to generate a token. A sequence of tokens is generated by updating the moving factor as each token is generated. A corresponding sequence of device addresses are then derived based on the sequence of tokens. Since the wireless client device and the network infrastructure device apply equivalent methods to generate respective sequences of addresses, the network infrastructure is able to efficiently identify a source wireless client device when observing a new device address on a wireless network.

DISTRIBUTED NETWORK CONTROL SYSTEM WITH ONE MASTER CONTROLLER PER LOGICAL DATAPATH SET
20230216741 · 2023-07-06 ·

A network control system for managing a plurality of switching elements that implement a plurality of logical datapath sets. The network control system includes first and second controllers for generating requests for modifications to first and second logical datapath sets. The first controller is further for determining whether to make modifications to the first logical datapath set. The second controller is further for determining whether to make modifications to the second logical datapath set. Each controller is further for receiving logical control plane data that specifies logical datapath sets and for converting the logical control plane data to physical control plane data for propagating to the switching elements.

NETWORK AWARENESS OF DEVICE LOCATION
20230217350 · 2023-07-06 ·

Systems and methods for managing a network are disclosed. One method can comprise detecting a triggering event at a node. Location information of the node can be transmitted to a routing device in response to the triggering event. Location information of the node can be transmitted to a management device. The management device can be configured to control an operation of one or more of the node and the routing device in response to the location information.

CONNECTIVITY ROBUSTNESS IN WIRELESS SYSTEMS

Systems and methods are contemplated for reconfiguration of one or more MAC instances while the WTRU is operating using dual- or multi-MAC instance connectivity. For example, upon reception of RRC reconfiguration information that modifies one or more secondary MAC instances, the WTRU may transmit a reconfiguration complete message to a Macro eNB (MeNB) and may synchronize to small-cell or secondary eNB (SeNB), for example if triggered by one or more of an RRC flag, a physical downlink control channel (PDCCH) order (MeNB/SeNB), MAC activation information, etc. For example, the WTRU may synchronize to the SeNB for specific type(s) of RRC reconfigurations, but not other type(s) of RRC reconfigurations. Although examples may be described in terms of dual connectivity, the WTRU may establish connectivity and perform mobility procedures with more than two radio access network (RAN) nodes (e.g., eNBs), and the embodiments described may be equally applicable to those scenarios.