Patent classifications
H04L41/344
Systems and methods for operations, administration and maintenance (OAM) in the physical coding sublayer (PCS)
Systems and methods described herein provide a method for operation, administration and maintenance (OAM) of data message transmission. The method comprises reading a transmit register of a transmitter associate with a first management entity to determine a transmit status of the transmit register. The method further comprises loading a data message into the transmit register when the transmit status of the transmit register indicates availability. The method further comprises embedding the data message as an out-of-band message with physical code sublayer modulation, and transmitting the out-of-band message on the physical code sublayer to a receiver associated with a second management entity. A transmit state machine of the transmitter and a receive state machine of the receiver establish a handshake to allow the out-of-band message to be passed asynchronously.
Apparatus, system, and method for wirelessly accessing management interfaces of routers
A disclosed apparatus ay include (1) a wireless receiver that facilitates communicatively coupling to a wireless transmitter of an access point connected to a network switch of a service provider, and (2) at least one processing device of a router communicatively coupled to the wireless receiver, wherein the processing device of the router (A) activates a wireless mode that (I) causes the router to establish a wireless connection with the access point via the wireless transmitter and the wireless receiver and (II) facilitates remote configuration of the router by a remote user who has gained access to the router via the wireless connection, (B) receives, via the wireless connection, at least one command from the remote user, and (C) applies, to an out-of-band management interface of the router, the command received from the remote user via the wireless connection. Various other apparatuses systems, and methods are also disclosed.
Validation of cross logical groups in a network
Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.
SYSTEMS AND METHODS FOR DETECTING WIRELESS COMMUNICATION JAMMING IN A NETWORK
An electronic device may include a processor and a network interface that may include a first radio and a second radio. The processor may be configured to perform wireless communication jamming attack detection by occasionally performing clear channel verification utilizing the network interface to determine whether a threshold number of devices' channels are incapacitated in a wireless network within a threshold amount of time and/or by sending a heartbeat signal from the first radio and determining whether the second radio received the heartbeat signal.
BROADBAND ACCESS DEVICES HAVING A RADIO LINK
Methods, systems, and apparatus for communicating over a radio link by devices with broadband connectivity are disclosed. In one aspect, a telecommunications device includes a first transceiver, a second transceiver, and a state monitor. The first transceiver communicates over a broadband link. The second transceiver communicates over a radio link. The radio link is a Low-Power Wide-Area Network (LPWAN) link. The state monitor includes one or more processes that monitor a state of the telecommunications device, and in response to the state of the telecommunications device being one of a plurality of pre-specified states, transmit, using the second transceiver, data specifying the state of the telecommunications device over the radio link.
System and Method for Tunneling of Management Traffic
A method of tunneling management traffic includes receiving at a managed system a control feature from a proxy-managed system that is connected to the managed system, determining that the proxy-managed system is not visible to a management system, providing the control feature to the management system in response to determining that the proxy-managed system is not visible, receiving a modification to the control feature from the management system, and providing, from the managed system, the modification to the control feature to the proxy-managed system in response to receiving the modification to the control feature from the management system.
CONFIGURATION DATA DISTRIBUTION METHOD AND APPARATUS
The present disclosure provides a configuration data distribution method, including: determining an encapsulation manner of configuration data according to identifiers of Optical Network Units (ONUs) and a preset corresponding relationship between the identifiers of the ONUs and the encapsulation manner of the configuration data of the ONUs; and encapsulating the configuration data according to the determined encapsulation manner, and distributing the encapsulated configuration data to corresponding gateways according to the encapsulation manner of the ONUs or the identifiers of the ONUs.
Internet-of-Things device autonomous activation
Various techniques are described herein for autonomously registering and/or activating Internet-of-Things (IoT) devices, provisioning wireless network access of those devices, and connecting the IoT device to an NB-IoT network with agreed-to terms for network usage. In various embodiments, IoT devices may be configured to negotiate for NB-IoT network access by (i) sharing their data with the NB-IoT network provider, (ii) security storing and using cryptocurrency to obtain NB-IoT network access, and/or (iii) automatically providing the NB-IoT network provider with access to data from other associated IoT devices and/or with payment from a separate payment provider. Individual IoT devices may be preconfigured with negotiation terms for NB-IoT network access, pre-associated with other devices/users, and/or pre-loaded with cryptocurrency in a secure storage.
Data protection for networking devices
Embodiments are described for a method and system of applying data protection software mechanisms to network equipment devices to auto-discover the networking equipment, save changes from memory (TCAM) to local storage, backup changes to protection storage, provide auditing and tracking history of changes, and provide the ability to deploy test/development copies of changes using software defined networking techniques.
End-to-end network slice selection and configuration
A system and associated method for enabling end-to-end (E2E) network slicing in a 5G network are described. A (Radio) Access Network-Network Slice Selection Function ((R)AN-NSSF) can be configured to receive a (R)AN slice selection request and to select, from a pool of (R)AN slice instances, a (R)AN network slice instance including one or more (R)AN slice components. A Core Network-Network Slice Selection Function (CN-NSSF) can be configured to receive a CN slice selection request to select, from a pool of CN slice instances, a CN network slice instance including one or more CN slice components. A Network Slice Policy Control (NSPC) function can be configured to verify that the selected (R)AN slice instance and CN slice instance are consistent with operator policies.