Patent classifications
H04L61/2582
Communication functions in a mesh network
A method including receiving, at an infrastructure device from a first device in a mesh network, a request to determine a communication parameter associated with communicating meshnet data with the first device; configuring a transport layer included in a network stack associated with the infrastructure device to determine the communication parameter and to transmit identification information indicating the communication parameter to an application layer included in the network stack; configuring the application layer to determine a response including the identification information; and transmitting, by the infrastructure device, the response to the first device. Various other aspects are contemplated.
METHOD FOR IMPLEMENTING COMMUNICATION CONTINUITY AND RELATED DEVICE
The present disclosure provides a method for implementing communication continuity at a computer device acting as an application function (AF) device corresponding to user equipment (UE), the UE establishing a wireless connection to a source application server (AS) using allocated UE source network address information. The method includes: determining a data service migration from the source AS to a target AS; transmitting a network address translation (NAT) parameter to a session management function (SMF), so that the SMF determines a target user plane function (UPF)/protocol data unit (PDU) session anchor (PSA) for performing NAT translation on a received data packet according to the NAT parameter; and configuring a third NAT parameter for the target AS according to the NAT parameter, and migrating the data service from the source AS to the target AS, so that the target AS performs NAT translation on the data packet according to the third NAT parameter.
METHOD OF MOBILIZAING USER DATA IN COMPUTING NETWORK
The present invention provides a method of mobilizing user data in a computing network. The method includes (i) providing a computing network that stores and delivers data, wherein the network comprises multiple lodging nodes that are geographically distributed; (ii) categorizing the data stored in and delivered by the computing network into user data and system data; and (iii) delivering an end user (EU)'s user data to one of the lodging nodes. One of the benefits from this method is that an end user does not need to carry his/her data with a mobile computing device or storage device while on the move, while the security, safety, reliability and redundancy of the user data are maintained.
Device, Method and System of Handling Access Control
A management device comprises a first authentication module, for receiving a first information and performing a first determination on whether an administrator device is correct according to the first information; an authorization module, coupled to the first authentication module, for performing a second determination on whether the administrator device comprises an access qualification for a remote device, when the first determination is positive and when receiving a first request message for accessing the remote device; a communication module, coupled to the authorization module, for transmitting a second request message for establishing a connection with a network device to the remote device, when the second determination is positive and when determining to establish the connection with the network device; an integration module, coupled to the authorization module, for transmitting a third request message for configuring a port forwarding to the network device, when the second determination is positive.
Methods and Systems for Efficient Virtualization of Inline Transparent Computer Networking Devices
Network devices that are inserted inline into network links and process in-transit packets may significantly improve their packet-throughput performance by not assigning L3 IP addresses and L2 MAC addresses to their network interfaces and thereby process packets through a logical fast path that bypasses the slow path through the operating system kernel. When virtualizing such Bump-In-The-Wire (BITW) devices for deployment into clouds, the network interfaces must have L3 IP and L2 MAC addresses assigned to them. Thus, packets are processed through the slow path of a virtual BITW device, significantly reducing the performance. By adding new logic to the virtual BITW device and/or configuring proxies, addresses, subnets, and/or routing tables, a virtual BITW device can process packets through the fast path and potentially improve performance accordingly. For example, the virtual BITW device may be configured to enforce a virtual path (comprising the fast path) through the virtual BITW device.
Method, apparatus and system for software management
A method, apparatus and system for software management are provided that relate to the technical field of communications, and that allow software installed on a Universal Plug and Play (UPnP) device by a service provider to be managed only by that service provider. The method comprises receiving a software installation command sent by a first control device, installing software according to the software installation command and storing a first authentication information required during management of the software; receiving a software management command sent by a second control device, and acquiring a second authentication information corresponding to the software management command, which command is used in managing the software; when the second authentication information is consistent with the first authentication information, executing the software management command.
ESTABLISHING CONNECTIONS BETWEEN DATA STORAGE DEVICES
Systems and methods are disclosed for establishing connections between computing devices. A first computing device may communicate data via a symmetric NAT and a second computing device may communicate data via a cone NAT. The first computing device may establish a connection, such as a peer-to-peer (P2P) connection, between the first computing device and the second computing device via the symmetric NAT and the cone NAT.
NETWORK COMMUNICATION SYSTEM AND NETWORK-TRAVERSAL METHOD
A network-traversal method includes: receiving an address information of a network device from a link server; generating a port number sequence composed of port values according to an external port number of the address information; and sending a link packet to an external network address of the address information in an order of the port values in the port number sequence until receiving an acknowledgement packet from the network device. At least one of the port values is related to the external port number. A part of the rest port values is/are generated gradually based on the external port number, and the others of the rest port values is/are generated randomly.
REAL-TIME LIGHTWEIGHT NAT KEEP-ALIVE INTERVAL OPTIMIZATION FOR MULTI-SIM MOBILE DEVICES
A method includes setting, using at least one processor of an electronic device that includes multiple subscriber identity module (SIM) cards, a maximum Network Address Translation (NAT) interval to be a maximum value among NAT keep-alive intervals associated with the multiple SIM cards. The method also includes triggering, using the at least one processor, a partial call setup from a first SIM card of the multiple SIM cards to a second SIM card of the multiple SIM cards. The method further includes determining, using the at least one processor, whether the electronic device receives the partial call setup. In addition, the method includes, in response to determining that the electronic device receives the partial call setup, setting, using the at least one processor, the NAT keep-alive interval for each of the multiple SIM cards to be equal to the maximum NAT interval.
Systems and methods for network management
Methods and systems are described for connecting to network services on a private network. A gateway device may coordinate communications between a client device on a public network and a host device on a private network. The client device may request to access the host device via the gateway device. The gateway device may authenticate the client device. The gateway device may transcode communications between the client device and the host device, thereby masking the address of the client device and the host device. The gateway device may maintain two different encryption methods between the client device and the gateway device, and the gateway device and the host device.