H04L67/1061

Method and arrangement for handling device-to-device communication in a wireless communications network

A method in a radio network node for handling a Device-to-Device, D2D, communication is provided. The D2D communication is wireless, and the radio network node is comprised in a wireless communication system. After receiving (201) from a first user equipment, an indication of resources that are currently available in the first user equipment for D2D communication, the radio network node identifies (202) whether or not the first user equipment currently has capacity for a D2D communication based on the received indication. The resources relates to hardware resources, to combined hardware resources and radio resources, or to combined software resources, hardware resources and radio resources.

DISCOVERY AND FORMATION OF LOCAL COMMUNICATION GROUP
20170366607 · 2017-12-21 ·

Systems, methods, software and apparatus enable communication group discovery and formation that includes operating a group communication service that is linked to communication nodes and that receives a communication group formation request from a requesting node. The group communication service transmits discovery data that is provided to a relevant group of the communication nodes, such as those within a selected range of the request node. Other nodes that wish to form a communication group send election responses to the group communication service, which then establishes the communication group. In some implementations the requesting node transmits the discovery data received from the group communication service to other communication nodes using low-energy transmissions. In some implementations the group communication service transmits the discovery data to local communication nodes located within a proximity range of the requesting node.

Peer-to-peer trading platform

Methods and systems for enabling peer-to-peer systems are disclosed. The server system includes one or more processors, memory, and one or more programs stored in the memory. The server system receives from a first peer to peer node in a plurality of peer to peer nodes, a request for item information associated with one or more items. The server system converts the requested item information into a format useful for the peer-to-peer network. The server system transmits the requested item information to the first peer-to-peer node for persistent storage such that other peer-to-peer nodes in the plurality of peer-to-peer nodes can search for item information within the peer-to-peer network. The server system receives an authentication request from a second peer-to-peer node that is used to authenticate a transaction between a first user associated with the second peer-to-peer node and a second user.

DISTRIBUTED NETWORK NODES DEFINING A DATABASE ACCESS GATEWAY

A plurality of distributed network nodes may provide a decentralized access gateway to multiple, diverse types of databases. The plurality of distributed network nodes may host a private party blockchain. Each node may execute a peer-to-peer (P2P) client to perform operations associated with the private party blockchain. A subset of the nodes may be configured as validator nodes that may implement gossip protocols to cooperatively validate one or more database operations and generate a new block for the private party blockchain. Another subset of nodes may be configured as host nodes that may receive the new block and update a corresponding local copy of the private party blockchain appending the new block. Utilizing the co-operative validation of database operations and the updates appending the new blocks, the private party blockchain may maintain an immutable digital record of access and updates to the multiple and diverse types of databases.

Network security systems and methods

This disclosure relates to systems and methods for managing connected devices and associated network connections. In certain embodiments, trust, privacy, safety, and/or security of information communicated between connected devices may be established in part through use of security associations and/or shared group tokens. In some embodiments, these security associations may be used to form an explicit private network associated with the user. A user may add and/or manage devices included in the explicit private network through management of various security associations associated with the network's constituent devices.

Method and metrics for merging with a neighborhood aware network

Methods, apparatuses, and computer program products for the selection, identification, and comparison of metrics used by a wireless device within range of a plurality of wireless communication systems, such as neighborhood aware networks, to determine which wireless communication system provides the desired capabilities and services. These metrics can be dynamically selected by a device and implemented for software decision making as additional wireless communication systems with new, different, or better characteristics fall within range of a given wireless device.

Synchronous discovery logs in a fabric storage system

Systems and methods for distributed storage systems using synchronous discovery logs for fabric subsystem discovery. Storage nodes may be configured with fabric services and a management service may provide synchronization of discovery logs across fabric subsystems and between peer fabric nodes. The peer fabric nodes may communicate with one another using a fabric network protocol and corresponding fabric subsystems may communicate with each peer fabric node. When a target subsystem fabric node updates its discovery log, the updated discovery log is sent to the corresponding peer fabric node. The corresponding peer fabric node sends the updated discovery log to each subsystem fabric node and to each peer fabric node for synchronization across all subsystem fabric nodes. A host may contact any subsystem fabric node for the updated discovery log.

Synchronous discovery logs in a fabric storage system

Systems and methods for distributed storage systems using synchronous discovery logs for fabric subsystem discovery. Storage nodes may be configured with fabric services and a management service may provide synchronization of discovery logs across fabric subsystems and between peer fabric nodes. The peer fabric nodes may communicate with one another using a fabric network protocol and corresponding fabric subsystems may communicate with each peer fabric node. When a target subsystem fabric node updates its discovery log, the updated discovery log is sent to the corresponding peer fabric node. The corresponding peer fabric node sends the updated discovery log to each subsystem fabric node and to each peer fabric node for synchronization across all subsystem fabric nodes. A host may contact any subsystem fabric node for the updated discovery log.

System, network, device and stacked spectrum method for implementing spectrum sharing of multiple contiguous and non-contiguous spectrum bands utilizing universal wireless access gateways to enable dynamic security and bandwidth policy management

A system and method in various embodiments implements a virtual spectrum band stacking technique facilitating spectrum sharing by converting and combining spectrum bands consisting of several different RF channels, common air interfaces, and radio channel protocols in the radio frequency channel domain to form IP Virtual Radio Channels (IP-VRCs) in the packet data domain. This virtual spectrum stacking technique combines the transmissions of contiguous and non-contiguous RF channels with differing physical layers into IP-VRCs. This technique enables simultaneous parallel high-speed wireless transmission; virtual radio channel hopping for enhanced security; and customized security schemes for different IP-VRC Groups. The deployment of the combination of IP-VRC Groups; Universal “Small Cell” Base Stations; and Universal Wireless End-Point Devices allows the aggregation of all available spectrum bands for use within a building environment. Some benefits of this deployment include expansion of spectrum utilization, service quality, security, applications and transmission throughput for wireless end-point devices.

Circuit migration sequence generation for network modernization
11509503 · 2022-11-22 · ·

Disclosed methods for network modernization include obtaining a list of end-to-end circuits carried in a circuit-switched network, calculating, for each circuit, an early retirement credit (ERC) score and a circuit load factor (CLF) score, selecting, dependent on the ERC and CLF scores, a circuit to migrate to a new network, adding the selected circuit to a circuit migration sequence, and removing the circuit from the list. The ERC score represents the number of circuit-switching units on which no circuits would be carried and that would remain in the network following its removal. The CLF score represents an average number of circuits that would be carried on each circuit-switching unit currently traversed by the circuit following its removal. When two circuits have the highest ERC score, the circuit with the lowest CLF score is selected for migration. The method is repeated until the list is empty.