H04L61/2575

Distributed network address translation over network environments

This disclosure describes techniques for implementing network address translation as a distributed service over the nodes of a logical network fabric, such as a software-defined network fabric. A method includes registering, by an edge node of a network, an IP address of a client device. The method further includes forwarding, by the edge node, the registered IP address to a control plane of the network. The method further includes checking, by the control plane, a network address translation policy. The method further includes recording, by the control plane, translations between the registered IP address and an allocated IP address in a translation table, each of the translations being related to the edge node. The method further includes returning, by the control plane, the translations between the registered IP address and the allocated IP address to the edge node.

Distributed network address translation over network environments

This disclosure describes techniques for implementing network address translation as a distributed service over the nodes of a logical network fabric, such as a software-defined network fabric. A method includes registering, by an edge node of a network, an IP address of a client device. The method further includes forwarding, by the edge node, the registered IP address to a control plane of the network. The method further includes checking, by the control plane, a network address translation policy. The method further includes recording, by the control plane, translations between the registered IP address and an allocated IP address in a translation table, each of the translations being related to the edge node. The method further includes returning, by the control plane, the translations between the registered IP address and the allocated IP address to the edge node.

Stateless Protocol Translation
20220353184 · 2022-11-03 ·

Some aspects of the methods and systems presented relate to performing stateless address translation between IPv4 capable devices to IPv6 capable networks and devices. Stateless address translation may form a new IPv6 addresses by combining the IPv4 address of a device with an IPv6 prefix address assigned to the translator. The translation may also combine the IPv4 destination address and UDP port information with the new IPv6 address. Existing Domain Name Systems (DNSs) may be leveraged for resolving the IPv4 and IPv6 addresses across different networks.

Stateless Protocol Translation
20220353184 · 2022-11-03 ·

Some aspects of the methods and systems presented relate to performing stateless address translation between IPv4 capable devices to IPv6 capable networks and devices. Stateless address translation may form a new IPv6 addresses by combining the IPv4 address of a device with an IPv6 prefix address assigned to the translator. The translation may also combine the IPv4 destination address and UDP port information with the new IPv6 address. Existing Domain Name Systems (DNSs) may be leveraged for resolving the IPv4 and IPv6 addresses across different networks.

System and Method for Improving Content Fetching by Selecting Tunnel Devices
20220353105 · 2022-11-03 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

System and Method for Improving Content Fetching by Selecting Tunnel Devices
20220353105 · 2022-11-03 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

Method and system for advanced alias domain routing

A method and system for advanced alias domain routing are disclosed. According to one embodiment, a computer implemented method comprises receiving an incoming message from a first unified communications server, the incoming message comprising source address data, destination address data, and digital content. A real address of a destination address is computed by using the source address data, and an alias address of a source address is computed by using the destination address data. The incoming message is processed, wherein processing the incoming message includes enforcing policies. An outgoing message is generated comprising the digital content, the real address and the alias address. The outgoing message is transmitted to a second unified communications server.

Device, software module, system or business method for global real-time telecommunication
09807059 · 2017-10-31 · ·

A telecommunication device for real-time communication at a border between a global transport network and a private domain of a communication network may include a proxy for a communication protocol, means for traffic using real-time communication protocols to traverse a firewall, means for real-time traffic initiated by the communication protocol to traverse a firewall, means for measuring and collecting value information about the real-time traffic over the global transport network, means for creating mutual trust between the telecommunication device and a second device with which it communicates; and means for authorizing usage of a feature for a mutually trusted communication participant.

RESOLVING MEDIA DEADLOCKS USING STUN
20220060442 · 2022-02-24 ·

In one embodiment, a device in communication with a service provider network obtains first information regarding a first call leg of a media session associated with a first endpoint. The device also obtains second information regarding a second call leg of the media session associated with a second endpoint. Both of the first and second endpoints are anchored in the service provider network. The device makes a determination that the media session is being hairpinned, based on the first and second information. The device sends, based on the determination, an indication message using Session Traversal Utilities for Network Address Translators (STUN) along the first call leg that causes the first endpoint to begin sending a flow of media packets.

SYSTEM AND METHOD FOR MONITORING AND SECURING COMMUNICATIONS NETWORKS AND ASSOCIATED DEVICES

A system and method for shielding a network from malicious or unauthorized activity includes an active monitoring device connected to the network for monitoring each data packet and controlling the network connection. End devices connected to the network are isolated from each other so that data cannot flow in the event one or more data packets, devices, and so on, are flagged as untrustworthy. The active monitoring device uses the filter data to determine whether unusual behavior, unauthorized access, attempted hacking occurred, and ensure isolation between network devices and prevent transfer of data. Continuous monitoring ensures once trusted devices that abnormally change behavior are flagged as untrusted, thereby preventing breaches of the network.