H04L61/5084

Multiplexing and congestion control
11582184 · 2023-02-14 · ·

Methods, systems and devices for network congestion control exploit the inherent burstiness of network traffic, using a wave-based characterization of network traffic and corresponding multiplexing methods and approaches.

Multiplexing and congestion control
11582184 · 2023-02-14 · ·

Methods, systems and devices for network congestion control exploit the inherent burstiness of network traffic, using a wave-based characterization of network traffic and corresponding multiplexing methods and approaches.

Techniques to extend a multiple access session and access traffic steering, switching, and splitting low-layer (ATSSS-LL) policies to an enterprise network

Presented herein are techniques to facilitate extending a multiple access Protocol Data Unit (PDU) session and Access Traffic Steering, Switching, and Splitting Low-Layer (ATSSS-LL) policies to an enterprise network. In one example, a method may include obtaining a request for an ATSSS-LL policy for a user equipment (UE) for establishing a multiple access protocol data unit session for the UE via a wireless wide area access network for an enterprise network; and providing to the UE one or more ATSSS-LL rules for the ATSSS-LL policy, an Internet Protocol (IP) address for the multiple access protocol data unit session for the UE, and an identifier for the multiple access protocol data unit session for the UE in which the IP address is utilized for a wireless local area access network connection for the UE established via a wireless local area access network of the enterprise network.

System and method for optimizing network topology in a virtual computing environment
11579913 · 2023-02-14 · ·

A computer network optimization methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature selection analysis performed thereon. Provided the feature selection analysis determines that features of the components are in frequent communication and generating network latency. Provided the feature selection analysis determines that features of the components are not well defined, a similarity analysis of the features is performed. Results of the feature selection methodology are generated, and the components involved in the network traffic latency are reassigned to migrate the latency.

Position parameterized recursive network architecture with topological addressing
11582185 · 2023-02-14 · ·

A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities.

Position parameterized recursive network architecture with topological addressing
11582185 · 2023-02-14 · ·

A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities.

NETWORK CONTAINERS
20230224273 · 2023-07-13 ·

The systems and methods that maintain an IP address of a container when the container is moved from a first node to a second node in a data center are provided. Each node includes a local controller which is communicatively coupled to the central controller. The local controller generates an IP address for a container that executes on the first node. A label unique to the container is also generated on the first node. The local controller then synchronizes the IP address and the label of the container with the central controller. The central controller then passes the IP address and the label to the second node when the container is moved from the first node to the second node, and ensures that the IP address of the container remains the same before and after the move.

NETWORK CONTAINERS
20230224273 · 2023-07-13 ·

The systems and methods that maintain an IP address of a container when the container is moved from a first node to a second node in a data center are provided. Each node includes a local controller which is communicatively coupled to the central controller. The local controller generates an IP address for a container that executes on the first node. A label unique to the container is also generated on the first node. The local controller then synchronizes the IP address and the label of the container with the central controller. The central controller then passes the IP address and the label to the second node when the container is moved from the first node to the second node, and ensures that the IP address of the container remains the same before and after the move.

Method for assigning a MAC address, and database with MAC addresses

A method in which a communication device can be configured with a MAC address so that when the user logs into a network environment using a communication device from among a number of communication devices a MAC address is assigned to the user and is specific to the user. The MAC address assignment can be used for pairing with a communication device assigned to the user (e.g. a near-field communication device). A database containing MAC addresses can be connected to communication devices through a network and can provide user-specific MAC addresses that are readable into or otherwise transmittable to a predetermined communication device when a user logs into the network. The database can be managed by a server or other computer device of the network.

Method for assigning a MAC address, and database with MAC addresses

A method in which a communication device can be configured with a MAC address so that when the user logs into a network environment using a communication device from among a number of communication devices a MAC address is assigned to the user and is specific to the user. The MAC address assignment can be used for pairing with a communication device assigned to the user (e.g. a near-field communication device). A database containing MAC addresses can be connected to communication devices through a network and can provide user-specific MAC addresses that are readable into or otherwise transmittable to a predetermined communication device when a user logs into the network. The database can be managed by a server or other computer device of the network.