H04L2101/663

Network switches with secured switch ports to baseboard management controllers

A server management switch discovers and identifies its switch ports that are connected to communication ports of baseband management controllers (BMC's) of server computers. The server management switch isolates the identified BMC-connected switch ports such that network traffic on a BMC-connected switch port is restricted to a switch port that has a connection, either directly by a link or over a server management network, to a server management computer. Network traffic on BMC-connected switch ports are monitored and controlled in various ways to further protect the BMC's from security attacks.

ENHANCED ENDPOINT MULTICAST EMULATION

Embodiments for providing enhanced endpoint multicast emulation in a computing environment. One or more multicast operations may be executed on an overlay network using endpoint multicast emulation by using an overlay layer or a virtual extensible LAN (“VXLAN”) layer to maintain control over one or more multicast groups.

Systems and methods for acquiring an internet protocol network address of a user equipment in networks

A device may determine that an application server requires an IPv6 address of a user equipment, and may provide, to another network device, a request for the IPv6 address of the user equipment, wherein the request includes data identifying an IP address of the network device and a port of the network device, and wherein the request is to cause the other network device to provide the request for the IPv6 address to the user equipment via a SMS request message, and receive, from the user equipment, data identifying the IPv6 address and a port of the user equipment via a SMS response message. The network device may receive, from the other network device, a response that includes the data identifying the IPv6 address and the port of the user equipment, and may store the data identifying the IPv6 address and the port of the user equipment.

REST API provided by a local agent to detect network path of a request
20210367944 · 2021-11-25 ·

Systems and methods implemented by a user device include receiving a request, from an application executed on the user device, to identify a network path for a destination; determining the network path to the destination including ports, addresses, and inline proxies; and providing details of the network path to the application.

DOORBELL COMMUNICATION SYSTEMS AND METHODS

The disclosure includes a doorbell having a visitor detection system that can comprise at least one of a camera, a microphone, and a motion detector. The method for using the doorbell can comprise recording, via the camera, video data that represents a video. The method can also comprise recording, via the microphone, audio data that represents audio. The method of using the doorbell can comprise transmitting at least a portion of the video data and at least a portion of the audio data, to a remote computing device that is communicatively coupled to the doorbell. The method can also comprise transmitting the video data and the audio data to a remote server that is communicatively coupled to the doorbell.

Doorbell communication systems and methods

The disclosure includes a doorbell having a visitor detection system that can comprise at least one of a camera, a microphone, and a motion detector. The method for using the doorbell can comprise recording, via the camera, video data that represents a video. The method can also comprise recording, via the microphone, audio data that represents audio. The method of using the doorbell can comprise transmitting at least a portion of the video data and at least a portion of the audio data, to a remote computing device that is communicatively coupled to the doorbell. The method can also comprise transmitting the video data and the audio data to a remote server that is communicatively coupled to the doorbell.

Detection of latency, packet drops, and network hops through a TCP tunnel using ICMP and UDP probes

Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented. Systems and methods include receiving a request from a client to perform a reverse trace; requesting a trace to an endpoint that is one of an egress router and a tunnel client, wherein there is a tunnel between i) the destination and ii) the one of the egress router and the tunnel client; receiving a response to the trace; and sending details associated with the response to the client so that the client aggregates these details with details from one or more additional legs to provide an overall view of a service path between the client and the destination.

DUAL SIDE BULK MATERIAL TENDER
20220009397 · 2022-01-13 · ·

A bulk material tender includes a mobile frame, a hopper, and a discharge system. The mobile frame has a left side and a right side. The hopper is disposed on the mobile frame. The discharge system is configured to discharge particulate matter from the hopper. The discharge system includes a discharge auger, a deploying actuator, and a positioning actuator. The discharge auger presents a proximal end and a distal end. The deploying actuator is configured to selectively emplace the discharge auger in a stowed orientation and a deployed orientation, wherein the distal end is adjacent to the hopper in the stowed orientation. The positioning actuator configured to selectively emplace the discharge auger along the left side and the right side of the mobile frame. Once emplaced, the discharge auger discharges particulate material from the hopper toward a target location.

Method and apparatus of establishing a connection between devices using cached connection information

Caching connection information used to establish a communication connection setup between at least two endpoint devices across a data network. One example of operation may include exchanging at least one interface address and at least one globally unique identifier between the at least two endpoint devices. The method may also provide retrieving a last successful connection setup information based on the at least one globally unique identifier and the at least one interface address, assigning at least one port number to the at least one interface address via at least one of the two endpoint devices, exchanging at least one rendezvous message between the at least two endpoint devices to share connection setup information, and storing at least one of the at least one interface address, that at least one globally unique identifier, the last successful connection setup information, and the at least one port number in a cache file.

Methods and systems for increasing fairness for small vs large NVMe IO commands

Increased fairness for small vs large NVMe IO commands for accessing a non-volatile memory namespace provided by a network attached storage appliance can be realized by placing NVMe submissions received by a NVMe SQ on a first fabric queue set or a second fabric queue set based on a fairness policy. The first fabric queue set accesses the namespace via a first fabric connection. The second fabric queue set accesses the namespace via a second fabric connection. Accessing the namespace via the fabric connections results in NVMe completions that are merged from the fabric queue sets onto an NVMe completion queue. A process producing the NVMe submissions and receiving the resulting NVMe completions may be unaware of the multiple fabric queue sets.