H04L43/0847

DETERMINING NETWORK RELIABILITY USING MESSAGE SUCCESS RATES
20230045907 · 2023-02-16 ·

One embodiment of the present invention sets forth a technique for evaluating connections between nodes in a mesh network. The technique includes determining, at a first node, one or more first accumulated message success rates associated with transmitting messages from the first node to a target destination within the mesh network via an established parent node and with receiving messages from the target destination via the established parent node; determining, based on the one or more first accumulated message success rates, that a search for a different parent node should be performed; identifying a plurality of potential parent nodes; computing, for each potential parent node, one or more second accumulated message success rates associated with transmitting messages from the first node to a target destination within the mesh network via the potential parent node and with receiving messages from the target destination via the potential parent node; and based on the second accumulated message success rates, selecting a new parent node from the plurality of potential parent nodes or maintaining the established parent node

DETERMINING NETWORK RELIABILITY USING MESSAGE SUCCESS RATES
20230046129 · 2023-02-16 ·

One embodiment of the present invention sets forth a technique for evaluating connections between nodes in a mesh network. The technique includes listening, at a first node and across a plurality of listening windows, for one or more messages transmitted by a second node during a first period of time; determining a number of messages received by the first node during the first period of time; computing, based on the number of messages received by the first node, a received message success rate associated with a first connection between the first node and the second node, wherein the received message success rate indicates a probability of successfully receiving, at the first node, messages transmitted by the second node via the first connection; and computing, based on at least one message received during the first period of time, a transmitted message success rate associated with the first connection, wherein the transmitted message success rate indicates a probability of successfully transmitting messages from the first node to the second node via the first connection.

Prioritized message routing

Systems, apparatuses, and methods are described for routing messages in a network. Gateways may be selectively chosen to forward messages from a user device to a network server. Gateways may forward messages based on forwarding priorities for the user device. The forwarding priorities may, for example, indicate a repeat count threshold for a quantity of times the gateway may receive a message from a particular user device before the gateway forwards the message.

Creating a packet with a loopback label stack to detect network link/node failures

Systems and methods for creating loopback packets for transmission through a section of a network for the purpose of testing the operability of links and nodes in this section of the network are provided. A method, according to one implementation, includes a step of obtaining information, by a Network Element (NE), about the topology of the network related to at least the nodes in direct communication with a peer node. The method also includes a step of generating one or more loopback packets, where each loopback packet includes at least a header having a path list including one or more nodes of the plurality of nodes in the network. Each path list defines an order of nodes through which the respective loopback packet is to be transmitted.

Systems and methods for distributed P25 LMR radio vulnerability management and real-time interference monitoring

A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network. The system further includes a server coupled to the sensors and configured to receive the collected data from the plurality of sensors, compare the collected data with previously stored historical data to determine whether an anomaly exists within data patterns of the collected data, responsive to determining that the anomaly exists, determine at least one of: whether use of a cloned radio that mimics an authorized connection occurs, whether jamming of a radio frequency (RF) communication occurs, or whether jamming of a voice communication occurs within the P25 network by comparing the collected data with preset thresholds, and send a real-time alert to a dispatch and control console unit coupled to the server and the P25 network in response to determining that some of the collected data exceeds at least one of the preset thresholds, such that the dispatch and control console unit provides one or more corrective actions to the P25 network.

CRC bits for joint decoding and verification of control information using polar codes

Aspects of the disclosure relate to wireless communication systems configured to provide techniques for polar coding control information together with combined cyclic redundancy check (CRC) information. The combined CRC information may include a number of CRC bits selected to jointly decode and verify the control information to reduce the CRC overhead.

Testing networked system using abnormal node failure
11711179 · 2023-07-25 · ·

Techniques for testing a networked system using simulated abnormal node failure are disclosed. In some embodiments, a computer system performs operations comprising: repeatedly transmitting simulated requests to a networked system on which a software application is implemented using a plurality of nodes, the networked system being configured to respond to the simulated requests using the plurality of nodes; randomly selecting one or more nodes from the plurality of nodes; terminating the randomly selected one or more nodes; restarting the terminated randomly selected one or more nodes; repeating the randomly selecting one or more nodes, the terminating the randomly selected one or more nodes, and the restarting the terminated randomly selected one or more nodes until each one of the plurality of nodes has been terminated and restarted at least once during the first period of time; and determining response times of the networked system in responding to the simulated requests.

TCP/IP socket resiliency and health management

Disclosed herein are system, method, and apparatus for account inheritance. The method performed at an application server includes receiving, via an application programming interface (API), data information received by each authorization gateway of a plurality of authorization gateways. The method includes performing calculation of an overall health of each authorization gateway of the plurality of authorization gateways based on a predetermined value of a weight assigned to each server of the plurality of servers and the value of service level corresponding to each server of the plurality of servers. The method includes balancing load of each authorization gateway of the plurality of authorization gateways by routing at least one client request message to a set of one or more authorization gateways of the plurality of authorization gateways based on the calculated overall health of each authorization gateway of the plurality of authorization gateways that is above a specific threshold value.

Predictive routing using machine learning in SD-WANs

In one embodiment, a supervisory service for a software-defined wide area network (SD-WAN) obtains telemetry data from one or more edge devices in the SD-WAN. The service trains, using the telemetry data as training data, a machine learning-based model to predict tunnel failures in the SD-WAN. The service receives feedback from the one or more edge devices regarding failure predictions made by the trained machine learning-based model. The service retrains the machine learning-based model, based on the received feedback.

DISCONTINUITY DETECTION IN TRANSPORT STREAMS
20230239229 · 2023-07-27 ·

Methods and apparatuses for detecting timestamp discontinuities and video resolution discontinuities within a packet stream and marking locations of the detected discontinuities within the packet stream are described. Prior to transmission of the packet stream, an electronic device may perform timestamp discontinuity detection by acquiring a sequence of packets to be transmitted, identifying a first timestamp associated with an earliest packet within the sequence of packets, identifying a second timestamp associated with a latest packet within the sequence of packets, determining a timestamp time difference between the first timestamp and the second timestamp, determining a maximum chunk time difference based on a data rate at which the sequence of packets were encoded and a data size of the encoded packets, and detecting that a timestamp discontinuity exists within the sequence of packets if the timestamp time difference is greater than the maximum chunk time difference.