Patent classifications
H04L41/04
Reservation management for polling requests in a communication system
Techniques for committing back end computing resources to an online stream of requests for data from client devices are described herein. A polling schedule server (e.g., a reservation management system), may receive polling reservation requests from a plurality of client devices, may evaluate each client device's need for “fresh” data based on a number of input signals, and may assign the client device a polling slot (e.g., a reservation for a future polling time). The polling scheduler server may subsequently receive a polling request from a client device and, upon validating a token received from the client device as well as a difference between an assigned polling time and the polling request timestamp, may grant the polling request by transmitting a request to one or more communication system servers, receiving data from the communication system servers, and providing the data to the client device.
Apparatus, system, and method for wirelessly accessing management interfaces of routers
A disclosed apparatus ay include (1) a wireless receiver that facilitates communicatively coupling to a wireless transmitter of an access point connected to a network switch of a service provider, and (2) at least one processing device of a router communicatively coupled to the wireless receiver, wherein the processing device of the router (A) activates a wireless mode that (I) causes the router to establish a wireless connection with the access point via the wireless transmitter and the wireless receiver and (II) facilitates remote configuration of the router by a remote user who has gained access to the router via the wireless connection, (B) receives, via the wireless connection, at least one command from the remote user, and (C) applies, to an out-of-band management interface of the router, the command received from the remote user via the wireless connection. Various other apparatuses systems, and methods are also disclosed.
SYSTEMS AND METHODS FOR DETECTING WIRELESS COMMUNICATION JAMMING IN A NETWORK
An electronic device may include a processor and a network interface that may include a first radio and a second radio. The processor may be configured to perform wireless communication jamming attack detection by occasionally performing clear channel verification utilizing the network interface to determine whether a threshold number of devices' channels are incapacitated in a wireless network within a threshold amount of time and/or by sending a heartbeat signal from the first radio and determining whether the second radio received the heartbeat signal.
BROADBAND ACCESS DEVICES HAVING A RADIO LINK
Methods, systems, and apparatus for communicating over a radio link by devices with broadband connectivity are disclosed. In one aspect, a telecommunications device includes a first transceiver, a second transceiver, and a state monitor. The first transceiver communicates over a broadband link. The second transceiver communicates over a radio link. The radio link is a Low-Power Wide-Area Network (LPWAN) link. The state monitor includes one or more processes that monitor a state of the telecommunications device, and in response to the state of the telecommunications device being one of a plurality of pre-specified states, transmit, using the second transceiver, data specifying the state of the telecommunications device over the radio link.
System and Method for Tunneling of Management Traffic
A method of tunneling management traffic includes receiving at a managed system a control feature from a proxy-managed system that is connected to the managed system, determining that the proxy-managed system is not visible to a management system, providing the control feature to the management system in response to determining that the proxy-managed system is not visible, receiving a modification to the control feature from the management system, and providing, from the managed system, the modification to the control feature to the proxy-managed system in response to receiving the modification to the control feature from the management system.
System, security and network management using self-organizing communication orbits in distributed networks
A method is provided of managing a non-static collection of machines. A first client machine runs a first communication protocol. The non-static collection of machines includes a first linear communication orbit, the first linear communication orbit comprising a sequence of machines that run the first communication protocol, and a second linear communication orbit, the second linear communication orbit comprising a sequence of machines that run a second communication protocol distinct from the first communication protocol. The first client machine receives an instruction from a server to install the second communication protocol, installs the second communication protocol, and then submits a registration request to the server. The first client machine receives, from the server, contact information of a list of potential neighbors. The first client machine then, proactively constructs and maintains a respective local segment of the second linear communication orbit.
System, security and network management using self-organizing communication orbits in distributed networks
A method is provided of managing a non-static collection of machines. A first client machine runs a first communication protocol. The non-static collection of machines includes a first linear communication orbit, the first linear communication orbit comprising a sequence of machines that run the first communication protocol, and a second linear communication orbit, the second linear communication orbit comprising a sequence of machines that run a second communication protocol distinct from the first communication protocol. The first client machine receives an instruction from a server to install the second communication protocol, installs the second communication protocol, and then submits a registration request to the server. The first client machine receives, from the server, contact information of a list of potential neighbors. The first client machine then, proactively constructs and maintains a respective local segment of the second linear communication orbit.
OPERATIONS, ADMINISTRATION AND MANAGEMENT (OAM) IN OVERLAY DATA CENTER ENVIRONMENTS
Systems, methods, and computer-readable media for OAM in overlay networks. In response to receiving a packet associated with an OAM operation from a device in an overlay network, the system generates an OAM packet. The system can be coupled with the overlay network and can include a tunnel endpoint interface associated with an underlay address and a virtual interface associated with an overlay address. The overlay address can be an anycast address assigned to the system and another device in the overlay network. Next, the system determines that a destination address associated with the packet is not reachable through the virtual interface, the destination address corresponding to a destination node in the overlay network. The system also determines that the destination address is reachable through the tunnel endpoint interface. The system then provides the underlay address associated with the tunnel endpoint interface as a source address in the OAM packet.
ASSISTING ENTITIES IN RESPONDING TO A REQUEST OF A USER
A third-party service may be used to assist entities in responding to requests of users. A third-party service may receive, directly or indirectly, a request of a first user for assistance from a first entity. The third-party service may request information about the first user by sending a request to a computer of the first entity. The third-party service may use the request of the first user and the information about the first user to automatically generate a response to the request of the first user. The third-party service may then transmit, directly or indirectly, the response to the first user.
Internet-of-Things device autonomous activation
Various techniques are described herein for autonomously registering and/or activating Internet-of-Things (IoT) devices, provisioning wireless network access of those devices, and connecting the IoT device to an NB-IoT network with agreed-to terms for network usage. In various embodiments, IoT devices may be configured to negotiate for NB-IoT network access by (i) sharing their data with the NB-IoT network provider, (ii) security storing and using cryptocurrency to obtain NB-IoT network access, and/or (iii) automatically providing the NB-IoT network provider with access to data from other associated IoT devices and/or with payment from a separate payment provider. Individual IoT devices may be preconfigured with negotiation terms for NB-IoT network access, pre-associated with other devices/users, and/or pre-loaded with cryptocurrency in a secure storage.