Patent classifications
H04L1/242
COMMUNICATION CHANNEL CALIBRATION FOR DRIFT CONDITIONS
A method and system provides for execution of calibration cycles from time to time during normal operation of the communication channel. A calibration cycle includes de-coupling the normal data source from the transmitter and supplying a calibration pattern in its place. The calibration pattern is received from the communication link using the receiver on the second component. A calibrated value of a parameter of the communication channel is determined in response to the received calibration pattern. The steps involved in calibration cycles can be reordered to account for utilization patterns of the communication channel. For bidirectional links, calibration cycles are executed which include the step of storing received calibration patterns on the second component, and retransmitting such calibration patterns back to the first component for use in adjusting parameters of the channel at first component.
Unique ID generation for sensors
Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
ON-DEVICE NETWORK SIMULATION WITH USER DATA LOOPBACK FOR DEVICE TESTING
A user equipment (UE) may simulate transmissions received from a BS to perform on-device testing of the UE. For example, the UE may be configured to loopback uplink data from the UL data path and input the uplink data as simulated downlink data for processing in the DL data path. The uplink data may include data related to a video call or network diagnostics. The user application data generated by the application and proceeding through the UL data path may be used to validate the DL data path. Downlink control information (DCI) may be determined by the UE and provided to the DL data path to accompany the uplink data. The DCI may include simulated uplink grants and/or simulated downlink scheduling assignments. The simulated downlink scheduling assignments may be determined based on availability of the uplink data in the UE's memory.
Adaptive payload extraction and retransmission in wireless data communications with error aggregations
Provided are systems and methods for adaptive payload extraction and retransmission in wireless data communications. An example method commences with transmitting a network packet to a receiver via a communication channel. The method further includes receiving a further network packet including a further payload. The method continues with determining, based on the payload and the further payload, an error vector. The method includes generating, based on the error vector, a plurality of indices. An index of the plurality of indices corresponds to a portion of a plurality of non-overlapping portions of the payload. The method further continues with selecting, based on the error vector, at least one index from the plurality of indices. The method includes sending, to the receiver via the communication channel, a further network packet. The further network packet includes the selected index and a portion of the payload corresponding to the selected index.
SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION
This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.
Method of determining the quality of voice data with transmission via a network, method of and an apparatus for performing a telephone call
A method of determining the quality of transmitted voice data can include: providing voice data at a transmitter side in a first data format, providing a first test signal in the first data format, combining the voice data and the test signal to form input data, transmitting the input data in a transmittal data format, receiving the transmitted input data at a receiver side to obtain output data, removing at least portions of a data packet in the output data or of a data packet derived therefrom in order to derive a second test signal, and analysing the derived second test signal by applying a predetermined analysis criterion in order to obtain at least one value for a quality indicator. An apparatus and system can also be configured to utilize embodiments of the method.
Devices and methods for safety mechanisms
A safety mechanism device includes measuring whether a first output signal or results meets dynamically adjustable boundary criterion. The safety mechanism compares the first output signal with at least one boundary signal that is dynamically adjusted. The safety mechanism can produce a dynamically or automatically adjusted boundary signal using a second output signal. The second output signal can mimic the first output signal.
System and method of detecting hidden processes by analyzing packet flows
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
Method and apparatus for real-time monitoring and field adjustment
A system that incorporates aspects of the subject disclosure may perform operations including, for example, obtaining uplink information associated with a downlink path, wherein the uplink information includes operational parameters used by a plurality of communication devices for transmitting wireless signals on a plurality of uplink paths; performing, based on the uplink information, a plurality of measurements of the plurality of uplink paths; identifying a measurement from the plurality of measurements that is below a threshold, thereby indicating an affected uplink path of the plurality of uplink paths; initiating a first filtering of the affected uplink path, wherein the initiating is based on the identifying and wherein the first filtering is based upon one or more first filtering parameters; and receiving instructions comprising one or more updated filtering parameters, wherein the instructions are received by the system at a port of the system. Other embodiments are disclosed.
TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.