Patent classifications
H04L12/1836
Cellular access of user-defined networks
Techniques are described herein for providing cellular access of a user-defined network. In one example, a user plane function of a cellular network obtains, from a control plane function of the cellular network, an indication that a first user equipment is attempting to connect to a user-defined network via the cellular network. The user plane function joins a multicast group configured to include a second user equipment connected to the user-defined network via a wireless local area network. The user plane function obtains a multicast packet that is transmitted between the first user equipment and the second user equipment and that is addressed to the multicast group, and converts the multicast packet to a unicast packet.
Method and system for core network support of access network protocols in multi-homed redundancy groups
In one embodiment, a method according to the present disclosure includes receiving a topology change advertisement at a remote core edge node and performing a network address information removal operation. The topology change advertisement is received from a core edge node that is in communication with an access network. The topology change advertisement indicates that a topology change has occurred in the access network. The network address information removal operation removes network address information stored by the remote core edge node. The network address information is used by the remote core edge node in participating in communications with the core edge node.
Delivering and managing multicast traffic over wireless LANs
Processing of MLD control packets in an access point (AP) connected to a digital network. According to the present invention, an AP in a network converts MLD queries from multicast to unicast and sends these unicast packets to each client of the AP. These MLD query packets may be filtered or restricted by per-user client rules These MLD query packets may also be tagged as high priority packets to speed their delivery. The AP also suppresses the retransmission of MLD Join packets to clients of the AP.
Smooth transition between multimedia broadcast multicast service (MBMS) and unicast service by demand
Techniques are provided for smooth transition between broadcast/multicast transmission and unicast transmission. A method for managing unicast and multicast services switching in a multi-band/multi-frequency wireless communications system (WCS) capable of both unicast and multicast signaling includes determining whether an aggregate demand for a content provided via dedicated unicast transmissions exceeds a threshold. The method includes switching transmission of the content from the dedicated unicast transmissions on one frequency to a multicast transmission on a second or more frequencies in response to determining that the aggregate demand exceeds the threshold.
Systems, methods, and computer-readable media for expedited access to conference calls
Methods, systems, and computer-readable media for admitting conferees into a conference call. Methods to achieve the foregoing can comprise: transmitting an admission request from a user of a communications device to a server for admission to a conference call, the admission request including a unique identifier; storing data unique to the communications device in a data store; relaying the unique identifier from the server to the data store; comparing the unique identifier with the data unique to the communications device; and, when the unique identifier and the previously stored data match, connecting the user directly to the conference call which includes bypassing entry of at least one conference pass code by the user.
IMPLICIT TRAFFIC ENGINEERING
Briefly, methods and/or apparatuses for implicit traffic engineering, such as for the Internet, are described.
Method and device for bearing multicast virtual private network
Provided in embodiments of the present disclosure are a method and a device for bearing a multicast virtual private network. The method includes: assigning, by a BFIR accessing a VRF, a global VPN identifier to a multicast VRF, and carrying the global VPN identifier to notify a route to a BFER accessing the multicast VRF; after receiving a packet of the multicast VRF, encapsulating, by the BFIR, the packet with a BIER header and forwarding the packet, the forwarded packet carrying the global VPN identifier.
Controlling Networked Media Capture Devices
Media players and other electronic devices may operate under a first protocol to control media capture devices that operate with a second protocol which may not be configurable to communicate with the first protocol. For example, a network device may store and/or render content within a Digital Living Network Alliance (DLNA) network and/or assist in content delivery for a DLNA device on a network. A media capture device may use Internet Protocol.
TRANSFER OF SECURE MULTICAST DATA TRAFFIC OVER A COMPUTING NETWORK
Disclosed herein are systems and methods for scalable and secure transmission of multicast data over a public communication network. In exemplary embodiments of the present disclosure, a virtual overlay network can be presented as a single virtual interface to a computing device, for the receipt and transfer of multicast data in a secure and scalable manner across a public insecure communication network.
SECURE CONFERENCING DEVICE
A secure conferencing device operating in a host or a guest mode. In host mode, the secure conferencing device coupled to an interactive digital signage (IDS) device, grants conference control to a host computer of the IDS device. The secure conferencing device receives a guest control signal and a guest video stream from a guest device, where the secure conferencing device prevents the guest control signal from being communicated to the host computer, yet transmits the guest video stream to the host computer for display on the IDS device. In the guest mode, the secure conferencing device grants conference control to a guest device, enables the guest device to affect a component of the IDS device, but does not enable the guest device to communicate guest control signals to the host computer of the IDS device.