H04L12/56

Method and system for protecting privacy of users in session recordings

A computer system is provided. The computer system includes a memory and a processor. The processor is configured to scan user interface (UI) data representative of a plurality of UI controls; detect a portion of the UI data associated with private information, the portion corresponding to a UI control of the plurality of UI controls; record first session data comprising an obfuscated version of the UI control and unobfuscated versions of other UI controls of the plurality of UI controls; record second session data comprising an unobfuscated version of the UI control; encrypt the second session data to generate encrypted session data; and store the encrypted session data in association with the first session data.

Apparatus and method for network automation in wireless communication system

Disclosed is a 5.sup.th generation (5G) or a pre-5G communication system provided to support a higher data transmission rate than that of post-4.sup.th generation (4G) communication systems, such as long term evolution (LTE). A method of operating a network node in a wireless communication system is provided. The method includes receiving, from a plurality of first network nodes, network data, generating first recommendation operation information for a second network node based on the network data, and transmitting, to the second network node, a first analysis result message including the first recommendation operation information.

Hot-swappable no cable touch switch enclosure

A system for hot swapping a network switch without disconnecting the network switch connectors is provided. The system disaggregates the switch faceplate network cable connectors from the internal components of the network switch so that the internal switch components may be removed from the switch without disconnecting the switch network cables.

Efficient packet classification for dynamic containers

A novel algorithm for packet classification that is based on a novel search structure for packet classification rules is provided. Addresses from all the containers are merged and maintained in a single Trie. Each entry in the Trie has additional information that can be traced back to the container from where the address originated. This information is used to keep the Trie in sync with the containers when the container definition dynamically changes.

MULTIPLE ANTENNAS AND INTERRUPTION TIME VALUES FOR SOUNDING REFERENCE SIGNAL (SRS) SWITCHING

A user equipment (UE) may transmit a sounding reference signal (SRS) on a component carrier (CC) that is otherwise configured for downlink communications. Due to a carrier aggregation configuration or UE capability, the UE may need to retune certain components to transmit on the CC. If the SRS transmission, including the retuning time, collides with another transmission (e.g., in uplink or downlink) the UE may drop the SRS, drop the other transmission, or puncture the other transmission to facilitate the SRS transmission. The determination about a collision may depend on the retuning time, channel, or type of control information in the other transmission. In some cases, a UE may drop the other transmission if transmitting the SRS would prevent the UE from transmitting a demodulation reference signal, hybrid automatic repeat request (HARD) feedback. In some cases, the determination may be based upon a prioritization and may also depend on a subsequent subframe.

On-demand access to compute resources
11522811 · 2022-12-06 · ·

Disclosed are systems, methods and computer-readable media for controlling and managing the identification and provisioning of resources within an on-demand center as well as the transfer of workload to the provisioned resources. One aspect involves creating a virtual private cluster within the on-demand center for the particular workload from a local environment. A method of managing resources between a local compute environment and an on-demand environment includes detecting an event associated with a local compute environment and based on the detected event, identifying information about the local environment, establishing communication with an on-demand compute environment and transmitting the information about the local environment to the on-demand compute environment, provisioning resources within the on-demand compute environment to substantially duplicate the local environment and transferring workload from the local-environment to the on-demand compute environment. The event can be a threshold or a triggering event within or outside of the local environment.

Service traffic replication and dynamic policy enforcement in a multi-cloud service mesh

In an embodiment, a data processing method comprises receiving, at a BIER replicator node that is programmed to implement Bit Index Explicit Replication (BIER) protocol, from a data source, a multicast stream packet identifying a service-level multicast group address; using the BIER replicator node, replicating the multicast stream packet according to BIER protocol and transmitting two or more replicated packet streams to two or more BIER receiver nodes that are programmed to implement BIER; using the two or more BIER receiver nodes, transmitting the two or more replicated packet streams to two or more receivers. Other embodiments may use modified iOAM (In-situ Operations, Administration, and Maintenance) techniques.

EFFICIENT PACKET CLASSIFICATION FOR DYNAMIC CONTAINERS

A novel algorithm for packet classification that is based on a novel search structure for packet classification rules is provided. Addresses from all the containers are merged and maintained in a single Trie. Each entry in the Trie has additional information that can be traced back to the container from where the address originated. This information is used to keep the Trie in sync with the containers when the container definition dynamically changes.

Segmentation within a broadcast domain in ethernet VPN

In one embodiment, a method includes receiving a broadcast, unknown-unicast, or multicast (BUM) frame from a connected device, where the BUM frame is associated with a broadcast domain, determining a segment within the broadcast domain associated with the device, adding to the BUM frame a segment identifier that uniquely identifies the segment within the broadcast domain, and causing the BUM frame to be delivered to one or more recipient network apparatuses in a network associated with the broadcast domain, where the segment identifier added to the BUM frame is configured to be used by the one or more recipient network apparatuses to selectively forward the BUM frame to connected devices that are associated with segment identifier.

Deterministic real time multi protocol heterogeneous packet based transport

Deterministic real-time multi-protocol heterogeneous packet-based transport is achieved by traffic shaping. When receiving a plurality of packets from a root complex where contents of each packet from the plurality of packets organized in accordance with a first protocol, a sequence number is added to each packet and a packet type is identified. Every packet in the first plurality of packets is encapsulated into at least one packet organized in accordance with a second protocol to form a second plurality of packets organized in accordance with the second protocol. All the packets from the second plurality of packets pass traffic scheduling or traffic shaping prior being sent via a plurality of connections to avoid burstiness and to achieve bounded transport latency in the plurality of connections, thereby providing deterministic real-time behavior in distributed systems.