H04L12/70

Resource state monitoring method, device and communication network
11153148 · 2021-10-19 · ·

The application provides a method for monitoring resource state in a communication network that includes a plurality of nodes. A node in the communication network determines whether a label switching path connection, which connects the node with an adjacent node, is established successfully. Based on a determination that the label switching path connection is not established successfully, the node determines whether a data plane resource state of the node and a control plane resource state of the node are consistent. Based on a determination that the data plane resource state of the node and the control plane resource state of the node are inconsistent, the node reports the inconsistency to a management plane of the node.

Packet generation in the data plane of a forwarding element

A method of generating packets in the data plane of a forwarding element is provided. The method selects a configuration set from a plurality of configuration sets of based on a triggering event. The method generates a set of packets using a packet template that corresponds to the selected configuration set. The method sets values of a plurality of the packet fields to identify different information such as the destination of packets. The method places the generated set of packets into an ingress pipeline of the forwarding element.

Propagating origin information for applications during application installation

An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.

Providing content to co-located devices with enhanced presentation characteristics
11089082 · 2021-08-10 · ·

Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. A user of an initiating device is identified. Profile information for the identified user is located. The initiating device includes a display for presenting content to the user. An indication is received from an application running on the initiating device of an intent by the user to receive a first content item on a separate but co-located presentation device having enhanced presentation characteristics for presenting content. Additional content items are selected for delivery along with the first content item. The selection includes identifying a second different content item based on the profile information for the identified user and the enhanced presentation characteristics. The first and second different content items are delivered directly to the co-located presentation device without delivering the first and second different content items to the initiating device.

Methods for transmitting and receiving data in 5G NR device based on data/service tagging from application processor

Techniques and devices for service-specific tagging of data by an application processor (AP) of a user equipment device (UE). A first indication may be sent from the UE to a baseband processor (BB) of the UE of one or more quality of service preferences for an upcoming data session, and the BB may configure one or more layers of the BB according to the quality of service preferences. The BB may further communicate with a network to establish protocols for the quality of service preferences. The BB may determine one or more network conditions, and may transmit feedback from the BB to the AP related to the determined network conditions. In response, the AP may send a second indication of one or more updated quality of service preferences to the BB based at least in part on the feedback received from the BB.

Communication failure detection device

There is provided a communication failure detection device configured to detect a communication failure of a two-wire CAN communication device that makes communication between nodes according to a CAN protocol. Each of the nodes is provided with two signal detection circuits configured to detect signals on the two communication lines. Each node makes communication for failure dentification to output signals of predetermined patterns onto the two communication lines when an execution condition is satisfied in response to the occurrence of a protocol error of CAN communication. Each node then performs failure identification to identify the type of a failure based on a combination of the signals respectively detected by the two signal detection circuits during the communication for failure identification.

Internet-of-things device autonomous activation

Various techniques are described herein for autonomously registering and/or activating Internet-of-Things (IoT) devices, provisioning wireless network access of those devices, and connecting the IoT device to an NB-IoT network with agreed-to terms for network usage. In various embodiments, IoT devices may be configured to negotiate for NB-IoT network access by (i) sharing their data with the NB-IoT network provider, (ii) security storing and using cryptocurrency to obtain NB-IoT network access, and/or (iii) automatically providing the NB-IoT network provider with access to data from other associated IoT devices and/or with payment from a separate payment provider. Individual IoT devices may be preconfigured with negotiation terms for NB-IoT network access, pre-associated with other devices/users, and/or pre-loaded with cryptocurrency in a secure storage.

Triggered in-band operations, administration, and maintenance in a network environment

Embodiments of the disclosure pertain to activating in-band OAM based on a triggering event. Aspects of the embodiments are directed to receiving a first notification indicating a problem in a network; triggering a data-collection feature on one or more nodes in the network for subsequent packets that traverse the one or more nodes; evaluating a subsequent packet that includes data augmented by the data collection feature; and determining the problem in the network based on the data augmented to the subsequent packet.

Switching between mediator services for a storage system
11128578 · 2021-09-21 · ·

A storage system switching mediators within a storage system synchronously replicating data, where the switching between mediators includes: determining, among one or more of the plurality of storage systems, a change in availability of a first mediator service, wherein one or more of the plurality of storage systems are configured to request mediation from the first mediator service; communicating, among the plurality of storage systems and responsive to determining the change in availability of the first mediator service, a second mediator service to use in response to a fault; and switching, in dependence upon the change in availability of the first mediator service, from the first mediator service to the second mediator service.

Device control apparatus, device control system, device control method, and recording medium

A control apparatus is connected to another control apparatus that is connected to a network. The control apparatus acquires control information of another device controlled by the other control apparatus. The control apparatus, during control of the other device connected to the other control apparatus, executes a predetermined command having a format that is the same as that of an interface in the control apparatus and to which an identifier other than that of the control apparatus is appended, the control apparatus using a response from the other control apparatus as a result for the executed command.