Patent classifications
H04L2101/659
METHOD AND APPARATUS FOR DEVICE-TO-DEVICE COMMUNICATION
Various embodiments of the present disclosure provide a method for direct device-to-device communication. The method which may be performed by a first device comprises generating an Internet protocol address of the first device. The Internet protocol address of the first device may be applicable for direct device-to-device communication between the first device and a second device via a third device. The method further comprises transmitting the Internet protocol address to the third device. According to various embodiments of the present disclosure, the relaying for direct device-to-device communication may be implemented efficiently and flexibly.
Operation, Administration, and Maintenance OAM Packet Processing Method and Device
An OAM packet processing method includes generating, by a first network device, an OAM packet, where the OAM packet is an MPLS-TP packet that includes an identifier of the first network device and indication information indicating a type of the identifier of the first network device. The first network device sends the OAM packet to the second network device. After receiving the OAM packet, the second network device can determine, based on the indication information, the type of the identifier of the first network device that is carried in the OAM packet, and accurately read the identifier of the first network device from the OAM packet. Therefore, MPLS-TP OAM can be implemented in a plurality of scenarios such as an IPv4 network, an IPv6 network, and a network including IPv4 and IPv6, to expand an application scope of MPLS-TP OAM.
DOMAIN NAME SYSTEM IDENTIFICATION AND ATTRIBUTION
Techniques are presented herein for a DNS resolver to encode a falsified IP address with a client identifier that identifies a client attempting to access a blocked domain. The DNS resolver receives, from a client, a DNS request that contains a requested domain name and a client identifier. The DNS resolver then determines the identity of the client from the client identifier in the DNS request. The DNS resolver then applies policies for the domain name system request to determine that the requested domain name should be blocked for the identity of the client. The DNS resolver may then construct a falsified Internet Protocol address when the domain name should be blocked for the identified client, where the falsified Internet Protocol is encoded with the client identifier. The DNS resolver then sends to the client, in response to the DNS request, the falsified Internet Protocol address.
Compression of internet protocol version 6 addresses in wireless sensor networks
A method for managing Internet Protocol Version 6 (IPv6) addresses in a wireless sensor network is provided that includes storing, on a wireless sensor device in the wireless sensor network, a prefix of an IPv6 address in association with a key, forming an address indicator for the IPv6 address, the address indicator consisting of the key and a node address of the IPv6 address, and storing the address indicator in at least one memory location on the wireless sensor device in lieu of the IPv6 address.
ROUTING IPV6 PACKETS BETWEEN AUTONOMOUS SYSTEMS
Systems, methods, architectures, mechanisms or apparatus for routing packets between source and destination endpoints associated with different autonomous systems without requiring public advertising of the addresses of the source and destination endpoints to other autonomous systems (ASN).
IDENTIFYING THE SOURCE AND DESTINATION SITES FOR A VOIP CALL WITH DYNAMIC-IP ADDRESS END POINTS
In a voice-over-IP communications network, call data records include dynamically assigned IP signaling addresses such as IPv6 signaling addresses used in provisioning communications sessions. Those dynamically assigned IP signaling addresses are computed from customer site identification codes using a reversible algorithm. The algorithm can then be reversed to compute a customer site identification code from an IP signaling address contained in a call data record, allowing the communications network provider to perform quality monitoring and diagnostics based on call data records.
SYSTEMS AND METHODS FOR GEOFENCE SECURITY
Systems and methods for geofence information delivery are disclosed. A multiplicity of devices constructed and configured in network communication in a region of interest via a peer-to-peer network. The multiplicity of devices store cached geofence information for the region of interest. The multiplicity of devices on the peer-to-peer network are operable to convert between an IP address and a geographic location. Each of the multiplicity of devices is operable to query peer devices on the peer-to-peer network for geofences associated with an IP address or a geographic location. At least one peer device is operable to deliver one or more geofences associated with the IP address to the querying device via zero-configuration networking or web service.
APPARATUS AND METHODS FOR PACKETIZED CONTENT ROUTING AND DELIVERY
Apparatus and methods for managing content delivery in a packetized network. In one embodiment, the network provide content to a plurality of clients via a plurality of nodes and origin points, and resources are discreetly represented (e.g., with IP addresses, such as those afforded under the IPv6 protocol) to allows for direct advertisement of resources. Exemplary solutions described herein further advantageously leverage extant architectures and protocols (such as BGP), and make use of a common control plane, which can be utilized for example by different content delivery network (CDN) operators and different delivery components to advertise resources. Internally within a given CDN, increased granularity of resource addressing and advertisement may provide benefits including: (i) resource affinity; (ii) resource-level balancing; (iii) dynamic resource scoping; and (iv) “zero-touch” provisioning and resource relocation.
Internet address structure analysis, and applications thereof
An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g., traceroutes campaigns, vulnerability assessments, or reachability surveys; and (d) remotely assessing a network's addressing plan and address assignment policy.
Efficient message transmission and loop avoidance in an RPL network
In some implementations, formation of loops between nodes in an RPL network may be avoided. A node that receives a neighbor-discovery message may determine, based on a parent-child status, whether the neighbor-discovery message was received from a parent of the node. If the neighbor-discovery message was received from the parent, the node may transmit an error code to the parent. In addition, the node may determine, based on a comparison of reliability rankings, whether the neighbor-discovery message was received from a node with relatively high reliability, such as a potential grandparent node. If the neighbor-discovery message was received from a high-reliability node, the node may transmit an error code to the high-reliability node. Furthermore, the node may reduce network traffic by withholding a neighbor-detection message from a child node. The node may transmit a response to neighbor-detection messages received from the child node.