Patent classifications
H04L29/12
OPTICAL COMMUNICATION SYSTEM TO AUTOMATICALLY CONFIGURE REMOTE OPTICAL NODES
An optical Internet Protocol (IP) router serves a cell-site over an optical communication network. The optical IP router transmits a network attach request having an optical node name over a control optical wavelength. The optical communication node receives an assignment of a data optical wavelength, a cell-site mode, and an Internet Protocol (IP) address over the control optical wavelength based on the optical node name. The optical communication node operates in the cell-site mode and responsively exchanges cell-site data having the IP address over the data optical wavelength.
METHOD AND SYSTEM FOR FREQUENCY MULTIPLEXER
Aspects of methods and systems for frequency multiplexing suitable for Data Over Cable Service Interface Specification (DOCSIS) are provided. A system for multiplexing signals according to frequency comprises a DOCSIS port interface, an upstream interface, a downstream interface, and a circulator subsystem. The DOCSIS port interface comprises a plurality of channel filters. The upstream interface is operably coupled to a first channel filter of the plurality of channel filters, and the downstream interface is operably coupled to a second channel filter of the plurality of channel filters. The circulator subsystem is able to direct a first signal from the upstream interface to the DOCSIS port interface and is able to direct a second signal from the DOCSIS port interface to the downstream interface.
MECHANISMS FOR PERFORMING SWITCH UPGRADES USING REMOTE CONTAINERS
Mechanisms for switch upgrades using remote containers. An example system can export, to a server, a state of software processes associated with a first software container at the system. The system can generate a lightweight software container configured to forward traffic associated with the first software container to a second software container at the server, generated based on the state. The system can perform a switchover between the first software container and lightweight software container. The switchover can enable the lightweight software container to forward, to the second container, traffic associated with the first software container. The system can generate a fourth software container based on a snapshot of the second software container, and perform another switchover between the lightweight software container and fourth software container. The switchover can include enabling the fourth software container to handle traffic associated with the first software container, and disabling the lightweight software container.
METHOD FOR A SWITCH-INITIATED SDN CONTROLLER DISCOVERY AND ESTABLISHMENT OF AN IN-BAND CONTROL NETWORK
Controller(s) in a software defined network (SDN) are able to determine a control path towards each network switch by performing a switch-originated discovery and using an in-band control network that is an overlay on the data network. A topology tree is maintained, where each controller being the root of the tree, and where messages from the root to any switch may pass through neighboring switches to reach that switch (and vice-versa). Each switch in the SDN attempts to connect to the controller when it does not have a readily configured control connection towards the controller. Once the controller learns about the presence of a new switch and at least one or more paths to reach that switch through a novel discovery process, it can select, adjust and even optimize the control path's route towards that switch.
URL Normalization
In one embodiment, a method includes receiving a plurality of uniform resource identifiers (URI's) associated with a particular domain. Each of the URI's identifies a content page comprising one or more signature elements. The method further includes, for each URI in the plurality of URI's, successively testing the URI to identify a core of the URI and any unnecessary elements of the URI. The core of the URI is sufficient to retrieve a version of the content page including all of its signature elements. The method additionally includes, for each URI in the plurality of URI's, updating a set of rules based on the identified core and the identified unnecessary elements. The set of rules establishes a normalized version of the URI.
DNSSEC Lightweight Database Access Protocol Gateway
A system that converts standardized lightweight database access protocol (LDAP) requests into a series of domain name system (DNS) requests to look up requested information. DNS responses are validated using DNS security extensions (DNSSEC) to ensure their validity, then converted into standardized LDAP responses. The system is either operated as a service for public use on the Internet or private use in an enterprise; or as an application running on end user machines, e.g., laptops, mobile phones, to guarantee end-to-end security by validating responses on the end user machine. The standardized, widespread nature of the LDAP allows existing applications to immediately reap the benefits of global, ubiquitous, cross-organizational, trans-national data distribution via DNS secured by DNSSEC.
METHOD AND APPARATUS FOR MAPPING NETWORK DATA MODELS
In one embodiment, a method includes processing network data models at a network device operating in a network comprising a plurality of network components, each of the network components associated with one of the network data models, performing semantic matching at the network device for at least two of the network data models, the semantic matching comprising computing labels for elements of the network data models utilizing label computation algorithms configured for notational conventions used in the network data models, computing contexts for the elements based on a hierarchy of each of the network data models, removing one or more of the labels used to form the contexts to create reduced contexts, and computing a semantic relationship for the reduced contexts of the network data models. The network data models are mapped at the network device based on the semantic matching for use in a network application. An apparatus and logic are also disclosed herein.
Counteracting MAC address randomization and spoofing attempts
Systems and methods are provided for determining whether dissimilar device identifiers in a network actually represent the same physical device. A method, according to one implementation, includes obtaining first and second sets of operational parameters related to first and second set of devices operating in a section of a network. The first and second sets of operational parameters include first and second sets of device identifiers representing the first and second sets of devices, respectively. The method also includes comparing the first set of device identifiers with the second set of device identifiers to find non-matching device identifiers. With respect to the non-matching device identifiers, the first and second sets of operational parameters are analyzed to determine if a device identifier of the first set of device identifiers and a device identifier of the second set of device identifiers likely represent the same device.
Cross-LAN Communication and Group Member Contact Synchronization
Multicast and unicast communication among computing devices across different local area networks (LANs) and without static IP addresses is supported by assigning an instant-share (InS) address to an individual computing device. The InS address is recognizable by a dedicated router located in the Internet and enables the dedicated router to communicate with the individual computing device. The individual computing device embeds an InS address of a destination computing device in a data message to form an extended data message, and sends the extended data message to the dedicated router. The dedicated router then forwards the extended data message to the destination computing device. A group member contact synchronization among different computing devices in a group without Internet connectivity is also supported. Local lists of group members from different computing devices are collected. The most-recent one is used to update the local list of group members of a computing device.
LOCAL AREA NETWORK (LAN) DEVICE PRIVACY
Aspects of the present disclosure relate to wireless communications, and more particularly, to techniques for increasing local area network (LAN) device privacy. One aspect provides a method for wireless communications at an access point (AP). The method generally includes: determining a mapping between a first distribution system (DS) medium access control (MAC) address and a second DS MAC address; obtaining, from a source access terminal, a frame having the second DS MAC address; and sending at least a portion of the frame to a target access terminal based on the mapping between the first MAC address and the second MAC address.