Patent classifications
H04L2101/659
METHOD, SYSTEM, AND APPARATUS FOR PROXYING INTRA-SUBNET TRAFFIC ACROSS MULTIPLE INTERFACES WITHIN NETWORKS
The disclosed computer-implemented method may include (1) creating, at a proxy node within an IP network, a proxy group that includes a plurality of network nodes within a subnet of the IP network that are represented by a pseudo MAC address, (2) receiving a neighbor solicitation from a network node included in the proxy group, (3) identifying, within the neighbor solicitation, a link-layer address of the network node that sent the neighbor solicitation, (4) modifying the neighbor solicitation by replacing the link-layer address of the network node with the pseudo MAC address of the proxy group, and then (5) forwarding the modified neighbor solicitation to another network node included in the proxy group to facilitate completion of an NDP process in which the other network node responds to the modified neighbor solicitation with a neighbor advertisement proxied by the proxy node. Various other methods, systems, and apparatuses are also disclosed.
APPLICATION SERVER ACCESS METHOD AND TERMINAL
The present disclosure relates to application server access methods and terminals. One example method includes in response to a terminal failing to connect to an application server by using an IPv6 address, setting an accessed domain name to a restricted domain name, and, when the accessed domain name is re-accessed later, connecting to the application server by directly using an IPv4 address.
Packet sending method and device
A packet sending method includes obtaining, by a client device, an Internet Protocol (IP) anycast address of the anycast server cluster and an IP unicast address of the target server, generating, by the client device, an IP detection packet, where the IP detection packet is used to detect whether the target server is reachable based on the IP anycast address, and the IP detection packet includes the IP anycast address and the IP unicast address of the target server, and instructs the target server to replace the IP unicast address of the target server with the IP anycast address, and sending, by the client device, the IP detection packet to the target server.
Global identification of devices based on designated IPv6 address
A method, a device, and a non-transitory storage medium are described in which a global identification service is provided. The service includes a selection of an Internet Protocol version 6 (IPv6) address to an end device. The service encrypts a unique identifier of the end device with an encryption key to generate an IPv6 address. The service verifies whether the IPv6 address is an IPv6 address allocated to or owned by a service provider. When the IPv6 address is an allocated or owned IPv6 address, the IPv6 address is assigned to the end device. When the IPv6 address is not an allocated or owned IPv6 address, the service selects another encryption key until a suitable IPv6 address is generated. Subsequent to an assignment of the IPv6 address, a network uses the IPv6 address as a globally unique identifier for the end device.
Pico-RRU-based network implementation for facilitating 6LOWPAN data access
A scheme for providing access to 6LoWPAN data in a Pico-Remote Radio Unit (PRRU)-based wireless access network. In one embodiment, the PRRU network comprises a Baseband Unit (BBU) coupled to one or more remote Radio Hub (RHUB) elements via a first set of CPRI links, each RHUB element in turn coupled to one or more PRRU elements via corresponding second sets of CPRI links. The BBU element comprises an interface for communicating 6LoWPAN data to and from a router coupled to an IPv6 network. The BBU element also includes a bridging functionality operative to determine endpoint PRRU elements' addresses and corresponding RHUB elements' addresses by querying an address mapping database.
ATTESTATION-BASED SCHEME FOR VALIDATING PEERING SETUPS FOR CRITICAL INFRASTRUCTURE PROTOCOLS
A verifier peer system transmits a request to an application of another peer system to obtain integrity data of the application. In response to the request, the verifier peer system obtains a response that includes kernel secure boot metrics of the other peer system and integrity data of the application and of any application dependencies. If the verifier peer system determines that the response is valid, the verifier peer system evaluates the integrity data and the kernel secure boot metrics against a set of Known Good Values to determine whether the integrity data and the kernel secure boot metrics are valid. If the integrity data and the kernel secure boot metrics are valid, the verifier peer system determines that the other peer system is trustworthy.
Apparatus and method for connection establishment in a communications network
An apparatus and method for establishing a connection including reserving a common connection for use by more than one access terminal (AT); associating the common connection with a network identifier corresponding to the AT; deleting a network identifier-related context while maintaining the network identifier; and transmitting a message, based on a call to the AT, via the common connection and based on the network identifier, wherein a specific connection for carrying the call is based on a response to the message. In one example, the apparatus and method include conducting a registration session with a wireless communications network; obtaining a network identifier corresponding to the AT based on the registration session; deleting a network identifier-related context for the AT while maintaining the network identifier; receiving a message indicating a call destined for the AT; and establishing, based on the message, a specific connection for carrying the call.
Method and apparatus for connection management
In accordance with an example embodiment of the present invention, there is provided a method, comprising receiving in an apparatus a first message from a second apparatus located in a different domain as the apparatus, the first message comprising a logical name of the second apparatus and a first global address, receiving a second message from a third apparatus, the second message comprising a second global address, and determining whether the first and second global addresses are the same address, or where the first and second global addresses are IPv6 addresses, whether they belong to the same network, and responsive to the first and second global addresses being the same address, or in the case of IPv6 belonging to the same network, causing transmission of information comprising at least one of a logical name and a local address of the second apparatus to the third apparatus.
Overlay network
An overlay network is contemplated. The overlay network may be characterized as supporting, or at least virtually supporting, separate networks over a common infrastructure. The common infrastructure may be comprised of a plurality of routers or other devices configured to facilitate directing messages according to various addressing requirements. The use of the separate networks may be dictated according to the particular addressing requirements of each message desired for transport.
NETWORK ACCESS METHOD, SYSTEM AND TERMINAL DEVICE, AND COMPUTER STORAGE MEDIUM
An embodiment of the present invention relates to a network access method, system and terminal device, and computer storage medium, the method comprising: providing one or more physical network interfaces on a first terminal device; the first terminal device transmits an address resolution protocol (ARP) request to a second terminal device, the second terminal device being connected to the first terminal device via one of the physical network interfaces; if the first terminal device receives a DHCP discovery packet or a router announcement request within a first pre-set time, then the first terminal device accesses an internal network; if the first terminal device receives a router announcement broadcast within the first pre-set time or did not receive a response within the first preset time, then the first terminal device accesses an external network.