Patent classifications
H04L12/751
Technologies for distributed routing table lookup
Technologies for distributed table lookup via a distributed router includes an ingress computing node, an intermediate computing node, and an egress computing node. Each computing node of the distributed router includes a forwarding table to store a different set of network routing entries obtained from a routing table of the distributed router. The ingress computing node generates a hash key based on the destination address included in a received network packet. The hash key identifies the intermediate computing node of the distributed router that stores the forwarding table that includes a network routing entry corresponding to the destination address. The ingress computing node forwards the received network packet to the intermediate computing node for routing. The intermediate computing node receives the forwarded network packet, determines a destination address of the network packet, and determines the egress computing node for transmission of the network packet from the distributed router.
Generating High Resolution Inferences in Electrical Networks
Methods, systems, and computer program products for generating high resolution inferences in electrical networks are provided herein. A computer-implemented method includes collecting multiple items of data from one or more data sources arising from a power distribution network, wherein the multiple items of data comprise (i) one or more levels of temporal resolution and (ii) one or more levels of spatial resolution; determining a network topology of the power distribution network based on identification of one or more connections between each of multiple components within the power distribution network; and generating a power flow estimate for one or more nodes within the power distribution network at a pre-determined level of spatio-temporal resolution, wherein said generating comprises applying a model to (i) the multiple items of collected data, (ii) the determined network topology, and (iii) one or more relations constraining the power flow estimate at the pre-determined level of spatio-temporal resolution.
Routing of point-to-multipoint services in a multi-domain network
A multi-domain network (5) has a Hierarchical Path Computation Element, H-PCE, architecture comprising a Parent Path Computation Element, P-PCE (31) and a Child Path Computation Element, C-PCE, (21-25) at each of the domains (11-15). A C-PCE (21-25) determines summarised domain topology information about the domain (11-15). The summarized domain topology information comprises at least one of: an indication of whether the domain (11-15) is capable of supporting Point-to-Multi-Point services; an indication of whether a node of the summarised domain topology is capable of supporting a branch point for Point-to-Multi-Point services. The summarised domain topology information is sent to a P-PCE (31) via a communication interface (35). The P-PCE (31) computes an end-to-end Point-to-Multi-Point tree using a topology based on summarised domain topology information (32) received from the Child Path Computation Elements. The P-PCE (31) requests each C-PCE (21-25) of a domain in the computed end-to-end Point-to-Multi-Point tree to compute an intra-domain path.
Communication system, control apparatus, and network topology management method
A communication system includes: a control apparatus configured to set control information, which causes each control target switch to distinguish a link layer discovery protocol packet of a first network from a link layer discovery protocol packet of a second network different from the first network and to perform corresponding predetermined processing, in each control target switch; a group of switches each of which is configured to transmit a link layer discovery protocol packet of the first network to a predetermined topology management apparatus in accordance with control information set by the control apparatus; and a topology management apparatus configured to manage a network topology configured by the group of switches on the basis of information included in a link layer discovery protocol packet of the first network received from each of the switches.
Method and device for long-term storage of cross-domain path information
A method and device for long-term storage of cross-domain path information are provided. The method is applied on a stateless PCE. In the method, a first PCE computes a path; a path head node sends, to the first PCE, query information for querying intra-domain path information of the first domain corresponding to a first PATH-KEY, generates, on the basis of a query result returned by the first PCE, a third PATH-KEY having a unique identifier and corresponding to the intra-domain path information of the first domain and stores the third PATH-KEY; the path head node sends, to a head node in a second domain, an inter-domain path establishment signalling comprising the third PATH-KEY and a second PATH-KEY, to make the head node in the second domain send, to a second PCE, query information for querying intra-domain path information of the second domain corresponding to the second PATH-KEY, generate, on the basis of a query result returned by the second PCE, a fourth PATH-KEY having a unique identifier and corresponding to the intra-domain path information of the second domain, and store the fourth PATH-KEY; and, the path head node modifies information of the path from the path head node to the path tail node on the basis of a reverse signalling returned by the path tail node and comprising the third PATH-KEY and the fourth PATH-KEY.
Multicast flow overlay using registration over a reliable transport
An example method includes exchanging targeted hello messages to establish a targeted neighbor connection between a first routing device and a second routing device, wherein one of the routing devices comprises a central routing device, and wherein another one of the routing devices comprises an ingress routing device. The example method further includes processing a source-active register message that specifies a source address and an identifier that are collectively associated with a multicast stream, and wherein the source-active register message further indicates whether the multicast stream is active or withdrawn. After processing the source-active register message, the example method further includes processing a list-of-receivers register message that specifies an egress routing device and at least the identifier that is associated with the multicast stream, wherein the list-of-receivers register message further indicates whether or not the egress routing device requests receipt of data associated with the multicast stream.
TRUSTED ROUTING BETWEEN COMMUNICATION NETWORK SYSTEMS
An apparatus of a communication network system, which routes data packets and stores trusted routes between different communication network systems in a database, detects (S12) that a data packet requires a route with a specific level of trust, determines (S13), from the trusted routes stored in the database, a specific trusted route towards a destination as indicated in the data packet, and sets (S15) the data packet on the specific trusted route towards the destination.
CONFIGURING WIRELESS COMMUNICATIONS ACCORDING TO MULTIPLE COMMUNICATION PROTOCOLS
A method for communicating between a combo-endpoint device, wireless router and a wireless communication device includes monitoring communication patterns of wireless data communications between a wireless router and radio-communication circuitry of a combo-endpoint device, and storing data indicative of communication times of the wireless router based on the monitored communication patterns. The method further includes configuring a frequency-hopping (FH)-based protocol by defining connection periods according to time windows and selected frequencies for wireless communication of data between the wireless communication device and the radio-communication circuitry, and by establishing the time windows to not substantially conflict with the communication times of the wireless router
Deception to Detect Network Scans
Provided are systems, methods, and computer-program products for using deceptions to detect network scans. In various implementations, a network device, configured as a decoy network device can be configured to determine a particular network address. The network device can determine that the particular network address is unassigned. The network device can configure itself with the particular network address, wherein the network device uses the particular network address to monitor network activity for a network scan. The network device can receive a packet addressed to the particular network address. The network device can determine that received packet is associated with a scan of the network, including associating the received packet with other packets in the monitored network activity. The network device can configure one or more security settings for the network when the received packet is determined to be associated with a scan of the network.
METHOD AND SYSTEM FOR MOTION ANALYSIS AND FALL PREVENTION
A system and method of motion analysis, fall detection, and fall prediction using machine learning and classifiers. A wearable motion sensor for collecting and transmitting motion data for use in a fall prediction model using features and parameters to classify the motion data and notify when a fall is emergent. Using machine learning, the fall prediction model can be created, implemented, evaluated, and it can evolve over time with additional data. The system and method can use individual data or pool data from various individuals for use in fall prediction.