Patent classifications
H04L29/12
Data Retention Probes and Related Methods
A data retention probe for a packet-switched, mobile telecommunications network employs interfaces to connect to interfaces carrying traffic on a mobile network side of a gateway node and on a global internet side of the gateway node. A FPGA creates for each packet at least one fingerprint of one or more fields that are unchanged as part of the address translation performed by the gateway node and to create informative metadata for those packets. A processing unit: (1) receives from the FPGA the fingerprints and metadata and maintains flow records for each flow of packets seen on each side of the gateway node; and (2) compares the fingerprints and, where a match is found, determines those packets to be part of the same communication session and creates a record correlating internal IP address or a subscriber identifier to external IP address and port number.
CONTEXT-BASED PROTOCOL STACK PRIVACY
A method for use in a wireless transmit/receive unit (WTRU) for configuring a privacy protocol stack profile, including private addresses for the WTRU is described herein. For example, the WTRU may determine if it is in an unknown location and may set a profile of the WTRU to public network, and may set the MAC and IP addresses and other protocol identifiers to random, opaque and non-persistent. The method also includes receiving information about neighboring networks, which may then be used to determine profile options based on context of the neighboring networks. Available profile options based on the determination may be displayed and selected via a user input. Each layer of a protocol stack may be then instructed to use privacy and security settings based on the selected profile, which may include anonymous or random dynamic host configuration protocol (DHCP) parameters.
TECHNIQUES TO SUPPORT EMERGENCY CALLS WITH OVER-THE-TOP SERVICE PROVIDER
Methods, systems, and devices are described for wireless communication. A wireless device such as an in-vehicle system (IVS) may transmit an emergency call (eCall) message to a third party eCall server using a communication session which may be packet based or circuit based. The eCall message may include session information and telematics data. The third party eCall server may relay the session information and telematics data to a public safety answering point (PSAP). For example, the third party eCall server may generate an automatic text-to-speech message that is transmitted to the PSAP over a public communications network. In some cases, the third party eCall server may transmit a response to the wireless device including metadata based on the telematics data transmitted in the eCall message. The eCall message may also include a call-back number, and the PSAP may contact the wireless device directly using the call-back number.
METHOD AND SYSTEM FOR OPERATING A VEHICULAR DATA NETWORK BASED ON A LAYER-2 PERIODIC FRAME BROADCAST, IN PARTICULAR A ROUTING PROTOCOL
Method for operating a network node of a wireless digital data network based on broadcast layer-2 periodic frames, wherein said network is composed by a plurality of network nodes, wherein each network node is either a mobile node equipped with an on-board unit (OBU) node, or is a static node equipped with a road-side unit (RSU) node, said method comprising a current network node of the plurality of network nodes carrying out the following steps: periodically broadcasting a Network Status Information (NSI) frame which comprises: the node identifier and a type of node of the current network node; receiving broadcasted NSI frames from neighbouring network nodes of the plurality of network nodes reachable by the current network node through wireless communication; for any one received NSI frame, storing the received NSI frame in an entry in a NSI table (NSIT) if the received NSI frame was the first received NSI frame from a neighbouring network node, or otherwise, if the received NSI frame was not the first received NSI frame from the neighbouring network node, updating a previously stored NSIT entry with the received NSI frame; marking as expired or deleting any previously entered NSIT entry after a predetermined period of time has passed after receiving or updating said any previously entered NSIT entry. Also an electronic network node of a wireless digital data network, wherein said network node is programmed to carry out the method.
METHOD FOR IMPLEMENTING AN INDUSTRY INTERNET FIELD BROADBAND BUS
The invention relates to a method for implementing an industry internet field broadband bus, and in the method according to the invention, a bus controller and respective bus terminals transmit data in their respective time slices to thereby ensure timely and temporally determinist data transmission. Thus the embodiments of the invention implement a high-performance, highly reliable, and highly real-time method for implementing an industry internet field broadband bus. Moreover a transmission medium of the two-wire data transmission network can be a twisted pair or a shielded twisted pair so that the method according to the embodiment of the invention can be applicable to a traditional industry control facility using a bus, and thus can be highly universally applicable.
SIGNALING IP ADDRESS MOBILITY IN ETHERNET VIRTUAL PRIVATE NETWORKS
In some examples, a provider edge device provides L2 virtual bridge connectivity for at least one customer network using an EVPN instance and L3 routing using an IRB interface that is a L3 routing interface assigned to the EVPN instance; the provider edge device obtains an indication of a new binding for an endpoint device of the at least one customer network, the new binding comprising a first L2 address and a L3 address that are assigned to the endpoint device; and the provider edge device outputs, in response to determining the provider edge device stores a prior binding for the endpoint device of a second L2 address and the L3 address that are assigned to the endpoint device, an EVPN route comprising an indication of the new binding and an indication the new binding is an updated binding of the prior binding for the endpoint device.
SYSTEMS AND METHODS FOR AVOIDING DOUBLE ACCOUNTING UPON SESSION FAILOVER
Systems, methods, and software that perform offline charging. One embodiment comprises a Charging Data Function (CDF) of an Offline Charging System (OFCS). The CDF receives accounting requests for a session from a Charging Trigger Function (CTF), and generates an incomplete Charging Data Record (CDR) for the session based on the accounting requests. The CDF identifies request identifiers (ID) assigned to the accounting requests used to generate the first incomplete CDR, and inserts the request IDs in the incomplete CDR. The CDF determines whether one or more of the accounting requests used to generate the incomplete CDR were indicated as a re-transmitted accounting request by the CTF, and inserts content information for the re-transmitted accounting request(s) in the incomplete CDR.
EPDG SELECTION
Apparatuses, methods, and systems are disclosed for ePDG selection. One apparatus 200 includes a processor 605 that identifies a region in which the apparatus 200 is currently located, transmits a query 800 to a domain name system (“DNS”) server 270 based on the region not being a home region 210 of the apparatus 200, the query 800 identifying the region in which the apparatus is currently located, and selects an enhanced packet data gateway (“ePDG”) 140 based on a response to the query. The apparatus also includes a transceiver 630 that communicates with a mobile communication network 130 over a wireless local area network (“WLAN”) 235.
PROVISIONING THE HYPER-CONVERGED INFRASTRUCTURE BARE METAL SYSTEMS FROM THE TOP OF THE RACK SWITCH
Methods and devices for provisioning a hyper-converged infrastructure of bare metal systems are disclosed herein. Two fabric elements are configured in a master-slave arrangement to ensure high availability. ONIE capable fabric elements may be pre-installed with an operating system as firmware to run open network operating systems, such as Linux. The Linux operating system includes a KVM hypervisor to run virtual machines. An operating system of the virtual machines can access an external network by creating a bridge between switch management ports and a virtual network interface. New node elements may be added by connecting the network ports of the new node element to the fabric elements and booting the new node element in a network/PXE boot mode. The new node element obtains an IP address from a DHCP server and boots an image downloaded from a PXE server.
DOMAIN NAME REGISTRY DATABASE
Presented herein are methods, non-transitory computer readable media, and devices for providing and managing a Top-Level Domain that uniquely identifies an object or a role The method may comprise linking the domain name with an object (e.g., an artwork) by adding approximately eight additional fields to the domain name “Whois” record. “Whatis” (the combination of existing “Whois” and a number of additional fields) directly links the domain name, the registrant, and an (art) object. Any or all of the additional fields can be employed in many varieties of ways as a link and identification with objects or roles, transferring with the ownership of an object or, say, title or position of a role.