H04L67/1042

Content Distribution Using Ad Hoc Mesh Networks
20220224754 · 2022-07-14 ·

Aspects discussed herein relate to systems, apparatuses, and methods for providing content distribution via a breadth-first approach for peer-to-peer file sharing in a temporary ad hoc mesh network. For example, a peer-to-peer orchestrator may receive requests for the same asset from multiple mobile devices, determine which of the mobile devices are likely to travel along the same route at the same time, group them together and cause transmission of different asset parts of the requested asset to different mobile devices in the group. If the mobile devices in the group lose connection with the peer-to-peer orchestrator, they may form an ad hock mesh network and retrieve asset parts from one another. If the group reconnects with a peer-to-peer orchestrator, additional asset parts of the asset may be transmitted to the group and the process may repeat so that each mobile device may obtain each of the asset parts.

SECURE STORAGE OF DATA VIA A DISTRIBUTED LEDGER SYSTEM
20220239466 · 2022-07-28 · ·

The present disclosure describes systems and methods for use of a distributed ledger system to securely store data. Encrypted data files of one or more computing devices may be distributed to processing nodes of the distributed ledger system. The data may be subsequently retrieved and decrypted by the computing device or another device. Because the distributed ledger system creates a chain of hashes of prior blocks, the data may be immune to modification or corruption, as any changes to blocks storing the encrypted data may be immediately apparent.

SECURE STORAGE OF DATA VIA A DISTRIBUTED LEDGER SYSTEM
20220239466 · 2022-07-28 · ·

The present disclosure describes systems and methods for use of a distributed ledger system to securely store data. Encrypted data files of one or more computing devices may be distributed to processing nodes of the distributed ledger system. The data may be subsequently retrieved and decrypted by the computing device or another device. Because the distributed ledger system creates a chain of hashes of prior blocks, the data may be immune to modification or corruption, as any changes to blocks storing the encrypted data may be immediately apparent.

Remotely Controlling Playback Devices

In some implementations, a system can be configured to allow remote control devices to quietly obtain status information related to various audio/video playback devices. For example, a streaming device (e.g., a user device, phone, etc.) can establish a streaming connection to a playback device. The playback device can be configured to only accept a single streaming connection (i.e., master connection). A remote control device (e.g., a user device, phone, etc.) can quietly connect (i.e., control connection) to the playback device without interrupting the master connection to obtain status information related to the playback device and or the media being streamed to the playback device. The remote control device can provide commands through the control connection to adjust the playback of the streamed media at the playback device.

VISUALIZING NETWORK TRAFFIC PLANS BASED ON EGRESS PEER ENGINEERING
20220239597 · 2022-07-28 ·

A traffic planning platform may receive information related to a traffic flow including a traffic bandwidth to transport through a network with various network devices interconnected by links. The traffic planning platform may generate a traffic plan by assigning the traffic flow to a set of the links that includes network resources connecting a source of the traffic flow to a destination of the traffic flow. The traffic planning platform may render a visualization of the traffic plan, wherein the visualization includes a user interface (e.g., a diagram, an animation, and/or the like) in which geometric shapes that represent the source, the peer link, and the destination are connected by bands that represent the tunnel and the external route and further in which the geometric shapes and the bands each have a first visual property and a second visual property based on the traffic bandwidth of the traffic flow.

VISUALIZING NETWORK TRAFFIC PLANS BASED ON EGRESS PEER ENGINEERING
20220239597 · 2022-07-28 ·

A traffic planning platform may receive information related to a traffic flow including a traffic bandwidth to transport through a network with various network devices interconnected by links. The traffic planning platform may generate a traffic plan by assigning the traffic flow to a set of the links that includes network resources connecting a source of the traffic flow to a destination of the traffic flow. The traffic planning platform may render a visualization of the traffic plan, wherein the visualization includes a user interface (e.g., a diagram, an animation, and/or the like) in which geometric shapes that represent the source, the peer link, and the destination are connected by bands that represent the tunnel and the external route and further in which the geometric shapes and the bands each have a first visual property and a second visual property based on the traffic bandwidth of the traffic flow.

EDGE SHARING ORCHESTRATION SYSTEM

A network device includes a processor and a memory. The processor effectuates operations including instantiating an edge share orchestrator that identifies edge devices including a customer device. Edge share orchestrator also determines that the customer device lacks computing power or functionality to perform at least a portion of an existing or augmented service and identifies at least one additional device of the edge devices capable of providing additional computing power or functionality for performing the at least a portion of the existing service or augmented service associated with the customer device. Edge share orchestrator also meshes the additional computing power or functionality of the at least one additional device with the customer device and performs the at least a portion of the existing or augmented service associated with the customer device using the meshed additional computing power or functionality of the at least one additional device and the customer device.

Blockchain configuration history for aircraft maintenance, modification, and activity tracking
11393266 · 2022-07-19 · ·

A vehicle configuration and activity history tracking system and method. A first vehicle configuration and history blockchain is read from a first node in a vehicle configuration and history blockchain network comprising a plurality of nodes. A second vehicle configuration and history blockchain is read from a second node in the plurality of nodes of the vehicle configuration and history blockchain network. The first vehicle configuration and history blockchain is compared to the second vehicle configuration and history blockchain to determine whether the first vehicle configuration and history blockchain is valid. A new maintenance operation on the vehicle or a new modification of the vehicle is initiated using the first vehicle configuration and history blockchain in response to a determination that the first vehicle configuration and history blockchain is valid.

Blockchain configuration history for aircraft maintenance, modification, and activity tracking
11393266 · 2022-07-19 · ·

A vehicle configuration and activity history tracking system and method. A first vehicle configuration and history blockchain is read from a first node in a vehicle configuration and history blockchain network comprising a plurality of nodes. A second vehicle configuration and history blockchain is read from a second node in the plurality of nodes of the vehicle configuration and history blockchain network. The first vehicle configuration and history blockchain is compared to the second vehicle configuration and history blockchain to determine whether the first vehicle configuration and history blockchain is valid. A new maintenance operation on the vehicle or a new modification of the vehicle is initiated using the first vehicle configuration and history blockchain in response to a determination that the first vehicle configuration and history blockchain is valid.

Changing a master node in a wired local area network and related systems, methods, and devices

Various embodiments relate to a wired local area network (WLAN) including a shared transmission medium (e.g., a 10SPE network). A method may include detecting an event in a WLAN including physical level collision avoidance (PLCA). The method may also include disabling a beacon of a first node operating as a master of the WLAN in response to the event. Further, the method may include enabling a second node to operate as the master of the WLAN.