Patent classifications
H04L12/4625
Method and System for Interaction Between 5G and Multiple TSC/TSN Domains
A method (1200) by a network node (160, 160c) includes determining (1202) a plurality of Time Sensitive Communication, TSC, or Time Sensitive Networking, TSN, domains (12) that exist in a network. The network node instantiates (1204) at least one virtual bridge (14), wherein each virtual bridge serves at least one TSC and/or TSN domain.
Communications bridge
A system includes a plurality of computer devices connected to a network. The computer devices are operable by a plurality of users. The system further includes a server connected to the network. The server is to communicate data with the plurality of computer devices. The system further includes a bridge device connected to the network. The bridge device is to receive connection requests from the plurality of computer devices via the network. The bridge device is further to receive connection requests from the server via the network. The bridge device is further to mediate data communications between the plurality of computer devices and the server by communicating data through open connections made based on connection requests received from the plurality of computer devices and the server.
DETECTION DEVICE, MANAGEMENT DEVICE, DETECTION METHOD, AND DETECTION PROGRAM
A detection device includes: a switch provided to a transmission path that connects a plurality of function units to each other; a measurement unit configured to measure a signal that passes the transmission path, at a first node on a first end side of the switch and at a second node on a second end side of the switch; and a detection unit configured to compare a measurement result at the first node and a measurement result at the second node, which are obtained by the measurement unit, with a reference measurement result which is a measurement result for reference, and detect abnormality regarding the transmission path, based on a result of the comparison.
Method and system for detecting message injection anomalies
A method and system for detecting illegitimate messages injected into legitimate messages of a bus, such as a Controller Area Network (CAN) bus, are provided. Legitimate messages are broadcasted over the bus with a period whereby the legitimate messages are periodic legitimate messages. A controller connected to the bus receives at a first time instant a first message from the bus and receives at a second time instant a second message from the bus. The controller compares a first difference in time between the second time instant and the first time instant with a limit. The limit is two-thirds of the period. An anomaly is detected when the first difference in time is less than the limit.
MANAGING TUNNEL INTERFACE SELECTION BETWEEN GATEWAYS IN A COMPUTING ENVIRONMENT
Described herein are systems, methods, and software to manage the selection of an edge gateway or edge for processing a packet. In one implementation, a first edge may receive a packet and hash addressing information in the packet to select a second edge to process the packet. The first edge may further forward the packet to the second edge, permitting the second edge to process the packet. Once processed, the second edge may forward the packet to a destination host computing system and notify the host computing system to use the second edge for response packets directed at a source internet protocol (IP) address in the packet.
Key splitting
According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.
DYNAMIC CELLULAR CONNECTIVITY BETWEEN THE HYPERVISORS AND VIRTUAL MACHINES
Systems, methods, and computer-readable media for requesting a cellular IP address by initiating a call with a modem, establishing data packet network connectivity with the cellular IP address, assigning the cellular IP address to a virtual L2-bridge interface, wherein the virtual L2-bridge interface includes a MAC address, mapping a MAC address of a virtual machine with the MAC address of the virtual L2-bridge interface, detecting a change in the cellular IP address, and updating the virtual L2-bridge interface with a different cellular IP address while maintaining the data packet network connectivity.
Device provisioning
A computing device may receive, based on a scan of a bar code associated with a device, information associated with the bar code. The information may be used to retrieve a dedicated activation service set identifier (SSID), which may be sent to one or more gateways. A first gateway may indicate that it is connected to the device using the dedicated activation SSID, and the device may be connected to the first gateway using a specific SSID that is different from the dedicated activation SSID.
Smart point of presence (SPOP) aircraft-based high availability edge network architecture
A high availability aircraft network architecture incorporating smart points of presence (SPoP) is disclosed. In embodiments, the network architecture divides the aircraft into districts, or physical subdivisions. Each district includes one or more mission systems (MS) smart network access point (SNAP) devices for connecting MS components and devices located within its district to the MS network. Similarly, each district includes one or more air vehicle systems (AVS) SNAP devices for connecting AVS components and devices within the district to the AVS network. The AVS network may remain in a star or hub-and-spoke topology, while the MS network may be configured in a ring or mesh topology. Selected MS and AVS SNAP devices may be connected to each other via guarded network bridges to securely interconnect the MS and AVS networks.
Adaptive Signaling for Network Performance Measurement, Access, and Control
Systems and methods are provided for initiation, use, access, and control of functionality of a network. In one aspect, the systems and methods can be utilized to generate information defining signaling or control performance and operational characteristics associated with the functionality in a variety of network environments. In another aspect, based on such information, adaptive signaling can be utilized to monitor, analyze and detect specific signaling signatures associated with the functionality. Managing signaling or control messages in response to information collected by monitoring and analyzing the adaptive signaling permits originating or requesting the functionality without conventional operation of a network component.