Patent classifications
H04L47/728
Secure cluster pairing for business continuity and disaster recovery
Techniques are disclosed for providing backup protection. A first subnet is established for replication in a first cluster that includes a plurality of host devices. Each of the host devices includes a respective controller virtual machine, which together form a virtual local area network for replication. Each of the controller virtual machines is assigned an Ethernet interface. A replication Internet Protocol address is assigned to each of the Ethernet interfaces of the controller virtual machines. Route tables and firewall rules of the controller virtual machines are modified to allow communications between nodes of the first subnet. The first subnet is configured with information related to a second subnet for replication in a second cluster. A dedicated communication channel is generated for replication between the first cluster and the second cluster based on the configuring.
Hybrid communication between battery sensor nodes of a battery management system
According to one embodiment, a system for hybrid communication between electronic circuits is disclosed. The system includes a plurality of sensor nodes configured to read data from one or more sensors. The system also includes a master node configured to receive periodic data transmissions from each of the plurality of sensor nodes via a primary transmission medium and a secondary transmission medium, which is different from the primary transmission medium.
Traffic availability in a cellular communication network
A network node and a method performed in a network node of a cellular communication network comprising the steps of obtaining an indicator to secure a traffic availability for a connection, wherein the traffic availability is related to how likely the connection will remain operable, determining whether the network node can secure resources to support the traffic availability, allocating resources for the connection when resources can support the traffic availability, and transmitting a positive response when the network node can secure resources to support the traffic availability.
Automatic aggregated networking device backup link configuration system
An automatic aggregated networking device backup link configuration system includes a first networking device having first interfaces, and a second networking device having second interfaces. The first networking device receives second networking device information via at least some of the first interfaces coupled via respective Inter-Chassis Links (ICLs) in an aggregated ICL to respective ones of the second interfaces, and uses the second networking device information to determine that each of the at least some of the first interfaces provide the aggregated ICL to the second networking device. The first networking device then identifies one of the first interfaces that is coupled to a respective one of the second interfaces by a link that is not part of the aggregated ICL, and automatically configures the one of the first interfaces to provide the link that is not part of the aggregated ICL as a backup link.
SYSTEM AND METHOD FOR INTERSECTION COMMUNICATION
A computer-implemented method for intersection communication includes detecting a first vehicle behind a host vehicle and in a same lane as the host vehicle and determining a rear distance between a rear end of the host vehicle and a front end of the first vehicle. The method also includes transmitting a backup request to the first vehicle based on the rear distance and a wait time period between the stop state and a go state controlled by a traffic signal device. Further, the method includes controlling the host vehicle to perform a backup maneuver with respect to an intersection based on the rear distance and the wait time period.
AUTOMATIC AGGREGATED NETWORKING DEVICE BACKUP LINK CONFIGURATION SYSTEM
An automatic aggregated networking device backup link configuration system includes a first networking device having first interfaces, and a second networking device having second interfaces. The first networking device receives second networking device information via at least some of the first interfaces coupled via respective Inter-Chassis Links (ICLs) in an aggregated ICL to respective ones of the second interfaces, and uses the second networking device information to determine that each of the at least some of the first interfaces provide the aggregated ICL to the second networking device. The first networking device then identifies one of the first interfaces that is coupled to a respective one of the second interfaces by a link that is not part of the aggregated ICL, and automatically configures the one of the first interfaces to provide the link that is not part of the aggregated ICL as a backup link.
TUNNEL PROVISIONING WITH LINK AGGREGATION
A method for processing data packets in a communication network includes establishing a path for a flow of the data packets through the communication network. At a node along the path having a plurality of aggregated ports, a port is selected from among the plurality to serve as part of the path. A label is chosen responsively to the selected port. The label is attached to the data packets in the flow at a point on the path upstream from the node. Upon receiving the data packets at the node, the data packets are switched through the selected port responsively to the label.
Backpressure signaling for wireless communications
Methods, systems, and devices for wireless communications are described. In some wireless systems, a base station centralized unit (CU) may communicate with a user equipment (UE) through a multi-hop backhaul architecture. This multi-hop backhaul connection may include a donor base station and any number of relay base stations connected via backhaul links. In some cases, the relay base stations or the UE may experience data congestion in a logical channel-specific buffer. The relay base stations or UE may implement backpressure signaling (e.g., in the medium access control (MAC) layer) to mitigate the congestion. A wireless device operating as a mobile termination (MT) endpoint may transmit a backpressure report message to a wireless device operating as a base station distributed unit (DU) endpoint for the logical channel. The base station DU may adjust a scheduling rate for data unit transmissions over the indicated logical channel based on the backpressure report.
Aggregated switch path optimization system
An aggregated switch path optimization system includes first and second switch devices. An aggregated third switch device is coupled to the first switch device, the second switch device, and an aggregated fourth switch device. The aggregated third switch device forwards those packets from the first switch device via one of: an ICL to the aggregated fourth switch device, and a link to the second switch device. The aggregated third switch device then monitors a usage of the ICL and the availability of the link to the second switch device. In response to the usage of the ICL exceeding a threshold usage level, or an unavailability of the link to the second switch device, the aggregated third switch device transmits a packet redirection message to the first switch device that causes it to redirect packets away from the aggregated third switch device and towards the aggregated fourth switch device.
Fault tolerance determinations for networked resources
A customer having a deployment of resources in a resource provider environment can utilize a mechanism such as an application programming interface (API) to obtain fault, risk, and/or distribution information for the deployment. A risk score can be generated, by the customer or a component of the resource provider environment, that gives the customer a measure of the risk of the current deployment, whereby the customer can request one or more changes to the customer deployment. In some embodiments the customer can provide one or more risk criteria, such as a maximum risk score or minimum fault tolerance, that the resource provider environment can attempt to satisfy over the duration of the customer deployment, automatically making adjustments to the deployment as appropriate. The risk score can include information about the customer workload as well as the physical deployment in order to provide more accurate data.