Patent classifications
H04L2101/622
Transparent high availability for customer virtual machines achieved using a hypervisor-based side channel bonding and monitoring
Systems and methods for transparent high availability for customer virtual machines using a hypervisor-based side channel bonding and monitoring are disclosed herein. The method can include creating a network path bond between at least one compute instance and a plurality of Network Virtualization Devices (“NVD”), the network path bond including a plurality of network paths, each network path connecting the compute instance with the Virtualized Network Interface Card (“VNIC”) of one of the plurality of NVDs, identifying a first one of the network paths as an active network path and a second one of the network paths as an inactive network path, performing a health check on the active network path, determining that the active network path failed the health check, marking the first one of the network paths as failed subsequent to determining that the active network path failed the health check, and identifying the second one of the network paths as the active network path.
MACHINE LEARNING CAPABLE MAC FILTERING FOR ENFORCING EDGE SECURITY OVER MAC RANDOMIZATION IN WLAN NETWORKS
Specific connection request is refused responsive to a match on the MAC ban list. If not on the MAC ban list, and a station has MAC randomization enabled, the specific connection requests is also checked against the hostname ban list, wherein the specific connection request is refused responsive to a match on the hostname ban list. The specific new connection request is allowed to proceed responsive to not matching the MAC ban list and not matching the hostname ban list.
Mapping between wireless links and virtual local area networks
An example first device may include a processor to establish a plurality of links associating between the first network device and a second network device, the plurality of links corresponding to a plurality of virtual local area networks (VLANs) that a plurality of client devices associated with the first network device belong to; create a mapping between the plurality of links and the plurality of VLANs; and forward data received from a particular client device among the plurality of client devices in a particular VLAN of the plurality of VLANs to the second network device via a particular link corresponding to the particular VLAN based on the mapping.
Location detection systems and methods of use
Systems and methods are provided for allowing a mobile device user's location and or identity to be determined. According to one aspect of the disclosure, a method of creating a database comprises providing a first wireless router at a point of sale where a credit card is used in a transaction by a credit card holder, obtaining an identity of the credit card holder during the credit card transaction, establishing a wireless link between the first router and a mobile device carried by the credit card holder, obtaining a Media Access Control (MAC) address associated with the credit card holder's mobile device over the wireless link, correlating the identity of the credit card holder with the MAC address of the credit card holder, and storing the correlated identity and MAC address on a server. In some embodiments, a cellular identifier is obtained rather than a MAC address.
Proxy End Registration Method, System, and Related Apparatus
Provided are a proxy end registration method, a proxy end registration system, a computer-readable memory medium, and a terminal. The method includes: receiving, by a management end, heartbeat information sent by a proxy end, and determining whether a management end database contains a UUID in the heartbeat information, wherein the heartbeat information is generated according to a MAC address of the proxy end and timestamp information; if not, determining whether a first hash counter in the heartbeat information is 0, the first hash counter being used for indicating a heartbeat IP transformation state of the heartbeat information; if the first hash counter is not 0, notifying the proxy end of the need to re-register; or if the first hash counter is 0, allowing the proxy end to register.
Control Embedded Data Packet for Efficient ARP Query in SDA Environment
The present disclosure is directed systems and methods for control embedding data packets for ARP queries, the methods including the steps of receiving a data plane packet from a first user device, the data plane packet requesting a hardware address associated with a second user device; generating a northbound control plane packet for transmission to a control plane node, the northbound control plane packet for requesting from the control plane node the hardware address associated with the second user device; embedding the data plane packet in the northbound control plane packet; and forwarding the northbound control plane packet with the data plane packet to the control plane node for respective processing of the northbound control plane packet and the data plane packet.
Network awareness of device location
Systems and methods for managing a network are disclosed. One method can comprise detecting a triggering event at a node. Location information of the node can be transmitted to a routing device in response to the triggering event. Location information of the node can be transmitted to a management device. The management device can be configured to control an operation of one or more of the node and the routing device in response to the location information.
Apparatus and methods of packet retransmission between multi-link devices
Embodiments of the present invention provide apparatus and methods for multi-link operations that include retransmission of data using different wireless links. The following discussion describes one such exemplary electronic system or computer system that can be used as a platform for implementing embodiments of the present invention. The multi-link device can be a multi-link wireless access point or a multi-link wireless station, for example. The multi-link device can operate multiple transceivers simultaneously to perform multi-link operations including retransmission using different wireless links. For example, the multi-link device can transmit an encrypted MPDU using a first wireless link, and retransmit the MPDU using a second wireless link by setting a MAC header of the MPDU according to a MAC address of the second wireless link, to advantageously enhance the performance, reliability, and efficiency of the wireless network.
Systems and methods for preventing, through machine learning and access filtering, distributed denial of service (“DDoS”) attacks originating from IoT devices
A method for filtering internet traffic is provided. The method may include using a private network for receiving a request message from an electronic device within the private network and identifying the type of the electronic device. When the electronic device is identified as a non-IoT type device, the method may include transmitting the request message through the non-IoT output channel and when the electronic device is identified as an IoT type device the method may include transmitting the request message through the IoT output channel. The method may further include using an IP address filter gateway for filtering incoming traffic to a web server, the filtering may include granting device access to the web server when the request message is received through the non-IoT output channel and denying access to the web server when the request message is received through the IoT output channel.
Dual processor system for reduced power application processing
A task processor has a low power connectivity processor and a high performance applications processor. Software processes have a component operative on a connectivity processor and a component operative on an applications processor. The low power connectivity processor is coupled to a low power front end for wireless packets and the high performance applications processor is coupled to a high performance front end. A power controller is coupled to the low power front end and enables the applications processor and high performance front end when wireless packets which require greater processing capacity are received, and removes power from the applications processor and high performance front end at other times.