Patent classifications
H04L12/26
METHOD, A COMPUTER PROGRAM PRODUCT, AND A CARRIER FOR INDICATING ONE-WAY LATENCY IN A DATA NETWORK
Disclosed herein is a method, a computer program product, and a carrier for indicating one-way latency in a data network (N) between a first node (A) and a second node (B), wherein the data network (N) lacks continuous clock synchronization, comprising: a pre-synchronisation step, a measuring step, a post-synchronisation step, an interpolation step, and generating a latency profile. The present invention also relates to a computer program product incorporating the method, a carrier comprising the computer program product, and a method for indicating server functionality based on the first aspect.
MOTE-ASSOCIATED LOG CREATION
Methods and/or systems relating to mote networks having one or more logs.
METHOD AND APPARATUS FOR PERFORMING DISCONTINUOUS RECEPTION AND DOWNLINK INTER-FREQUENCY AND INTER-RADIO ACCESS TECHNOLOGY MEASUREMENTS IN CELL_FACH STATE
A method and apparatus of performing discontinuous reception (DRX) and downlink inter-frequency and inter-radio access technology (RAT) measurements in CELL_FACH state are disclosed. While in DRX mode, a wireless transmit/receive unite (WTRU) may perform inter-frequency and inter-RAT measurements in a measurement occasion that fall into a DRX period. The WTRU may take the measurements on first predetermined number of frame in which a DRX frame would coincide after a last reception frame if DRX operation was ongoing. The WTRU may periodically wake up for downlink reception in CELL_FACH state in accordance with common DRX pattern that is common to all WTRUs in a cell or may wake up from DRX upon reception of the order and receiving a common traffic.
Network User Usage Profiling
Methods, systems, devices, and software are disclosed for generating a network usage profile. Certain embodiments of the network usage profile include a devices-by-node profile, indicating the set of customer devices available for use in communicating with a customer-side network node located at a customer side of an access network over a period of time, where some of the customer devices are not in operative communication with the customer-side network node during a portion of that time. Other embodiments associate the network usage profile with customer information to generate device-by-customer profiles. Still other embodiments associate the network usage profile with network traffic information to generate traffic-by-device profiles. Even other embodiments associate the multiple sources and types of information to generate traffic-by-customer profiles and/or traffic-by-device-by-customer profiles. Any of the profiles may then be accessed by one or more parties for use in affecting various network services, including targeting content delivery.
DATA LEAKAGE PROTECTION IN CLOUD APPLICATIONS
A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.
WORKLOAD MANAGEMENT
A messaging system comprises a plurality of connected components and including a schema defining fields for messages, at least one field defined as non-essential. A mechanism for operating the messaging system comprises the steps of collecting one or more performance metrics for one or more components of the messaging system, determining that at least one performance metric has crossed a predetermined threshold, informing one or more components of the messaging system that a surge in workload has occurred, and the informed components removing non-essential fields from transmitted messages and/or not processing non-essential fields from received messages.
TRANSFORMING EVENT DATA USING REMOTE CAPTURE AGENTS AND TRANSFORMATION SERVERS
The disclosed embodiments provide a method and system for processing network data. During operation, the system obtains, at a remote capture agent, configuration information for the remote capture agent from a configuration server over a network. Next, the system uses the configuration information to configure the generation of event data from network data obtained from network packets at the remote capture agent. The system then uses the configuration information to configure transformation of the event data or the network data into transformed event data at the remote capture agent.
Network Control
Systems and methods for managing a network are disclosed. For example, systems and methods are disclosed for selectively disabling and/or otherwise configuring devices to avoid interference, overlapping service, and/or the like. Signal information for nearby devices can be detected and analyzed to determine device configuration settings.
SYSTEMS AND METHODS FOR DETECTING WIRELESS COMMUNICATION JAMMING IN A NETWORK
An electronic device may include a processor and a network interface that may include a first radio and a second radio. The processor may be configured to perform wireless communication jamming attack detection by occasionally performing clear channel verification utilizing the network interface to determine whether a threshold number of devices' channels are incapacitated in a wireless network within a threshold amount of time and/or by sending a heartbeat signal from the first radio and determining whether the second radio received the heartbeat signal.
FLEXIBLE ANALYTICS-DRIVEN WEBPAGE DESIGN AND OPTIMIZATION
In an approach for selecting a version of a webpage to present to a user, a processor receives a request to access a webpage from a device, wherein the webpage includes a plurality of versions of the webpage. A processor receives information about the device. A processor determines a version of the webpage to present, based on the information about the device and a predefined goal associated with the webpage. A processor causes the version of the webpage to be presented.