Patent classifications
H04L101/622
Cable assembly with protection switching
A cable assembly includes connectors and protection switching circuitry. A first connector connects the cable assembly to a first switch, which has a first network path to a first host device. A second connector connects the cable assembly to a second switch, which has a second network path to the first host device. A third connector is connected to the first and second connectors via respectively a first cable and a second cable and connects the cable assembly to a second host device. The protection switching circuitry is embedded in the cable assembly and: establishes a communications connection to transfer data between the host devices using a first data path, which includes the first network path, connector, cable, and switch; determines the first data path is degraded; and in responsive, switches the communications connection to a second data path, which includes the second network path, connector, cable, and switch.
Internet group management protocol (IGMP) of a Layer-2 network in a virtualized cloud environment
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. IGMP configuration is distributed to the L2 virtual switches. A control plane of the L2 virtual network coordinates IGMP configuration across the L2 virtual switches.
Layer-2 networking using access control lists in a virtualized cloud environment
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Access control list (ACL) information applicable to the L2 port is sent to a network virtualization device that hosts the L2 virtual network interface.
Method and apparatus for configuring medium access control (MAC) address for ultra-wideband (UWB) communication
Disclosed is a method of a first ultra-wideband (UWB) device, including identifying an extended MAC address of the first UWB device, generating a short MAC address of the first UWB device based on the extended MAC address, selecting one of the short MAC address and the extended MAC address as a MAC address identifying the first UWB device, and performing UWB communication with a second UWB device, using the MAC address, wherein the second UWB device operates as a controller defining and controlling a control message for UWB ranging, and wherein the first UWB device operates as a controlee using information included in the control message.
Address rotation aware dynamic host control protocol
A method comprises, at a wireless network controller of wireless access points through which wireless client devices that are wireless communicate with the controller: upon receiving, from a wireless client device, a dynamic host configuration protocol (DHCP) request having a media access control (MAC) address, determining whether the wireless client device rotated its MAC address from a previous MAC address to the MAC address; when the wireless client device rotated its MAC address, forwarding, to a DHCP service, the DHCP request with a notification of a MAC address rotation to cause the DHCP service to reassign a previously assigned Internet Protocol (IP) address to the wireless client device; and upon receiving, from the DHCP service, a DHCP offer asserting the previously assigned IP address, forwarding the DHCP offer to the wireless client device.
NETWORK ADDRESS POLICY INFORMATION RECEIVED IN A PRE-ASSOCIATED STATE
In some examples, a wireless device includes a communication interface to communicate with a wireless network, and at least one processor configured to, receive, from an access point (AP), information including a network address policy of the wireless network. The at least one processor is configured to further, in response to the information including the network address policy, use an address of the wireless device according to the network address policy.
EFFICIENT AND SECURE COMMUNICATION USING WIRELESS SERVICE IDENTIFIERS
Systems and methods are provided for reducing communications between servers and a mobile device and providing enhanced security and privacy to wireless beacon services. This can involve a broadcast device transmitting a beacon transmission using a short range wireless radio, such a Bluetooth or WiFi, and including a MAC address, a first unique identifier, and a beacon service identifier. The mobile device then selects one or more unique identifiers from received beacon transmissions, by filtering (that is, selecting) those beacon transmissions which include the beacon service identifier. The wireless device then takes further action, if the first unique identifier is present among the selected one or more unique identifiers, using stored information from the server. The stored information may be delivered to the wireless device in response to the wireless device sending the first unique identifier to a server, or the stored information may have been previously downloaded.
EFFICIENT AND SECURE COMMUNICATION USING WIRELESS SERVICE IDENTIFIERS
Systems and methods are provided for reducing communications between servers and a mobile device and providing enhanced security and privacy to wireless beacon services. This can involve a broadcast device transmitting a beacon transmission using a short range wireless radio, such a Bluetooth or WiFi, and including a MAC address, a first unique identifier, and a beacon service identifier. The mobile device then selects one or more unique identifiers from received beacon transmissions, by filtering (that is, selecting) those beacon transmissions which include the beacon service identifier. The wireless device then takes further action, if the first unique identifier is present among the selected one or more unique identifiers, using stored information from the server. The stored information may be delivered to the wireless device in response to the wireless device sending the first unique identifier to a server, or the stored information may have been previously downloaded.
SSID ASSOCIATION WITH ADDRESS INFORMATION
Example embodiments of the present disclosure relate to SSID association with address information. A network device obtains an address generation mode indication from a terminal device. The address generation mode indication indicates that address information of the terminal device is generated in a static mode or a dynamic mode. The network device further receives a probe request message comprising the address information from the terminal device. The network device further determines an SSID for the terminal device based, at least in part, on the address information and associates the SSID with the address information. In this way, a unique SSID associated with address information of the terminal device can be assigned to the terminal device, which ensures the terminal device to fast associate the network.
TELECOMMUNICATIONS NETWORK
This invention provides a method of operating a wireless local area network, the wireless local area network including a user device, a wireless access point and a wireless repeater, wherein the wireless repeater is configured to virtualise a Media Access Control, MAC, address of the user device when the user device is connected to the wireless repeater by changing the Organisationally Unique Identifier, OUI, of the MAC address, the method comprising the steps of: obtaining data including a plurality of records, wherein each record of the plurality of records relates to the user device and includes a MAC address and a device label of the user device, wherein at least one record of the plurality of records includes a MAC address that has been virtualised by the wireless repeater; processing each record of the plurality of records by: determining that the MAC address of the processed record is a local MAC address, and, if so, identifying another record of the plurality of records that is uniquely associated with the user device based on the MAC address of the processed record by determining a Network Interface Controller, NIC, value of the MAC address of the processed record, determining that the determined NIC value is uniquely associated with a device label in the plurality of records, and identifying another record of the plurality of records having the associated device label, and assigning a unique identifier to the processed record based on the MAC address of the identified other record of the plurality of records; analysing the plurality of records having the unique device identifier; and causing a reconfiguration in the wireless local area network based on the analysis.