H04L69/40

Group leader role queries

Examples include group leader role queries. Examples include detection of a loss of communication, via a first communication protocol, between first and second computing devices, transmission, via a second communication protocol, of a query for information about the second computing device currently having the group leader role. Examples further include a determine not to assume the group leader role with the first computing device based on receiving a response to the query via the second communication protocol from the second computing device.

Group leader role queries

Examples include group leader role queries. Examples include detection of a loss of communication, via a first communication protocol, between first and second computing devices, transmission, via a second communication protocol, of a query for information about the second computing device currently having the group leader role. Examples further include a determine not to assume the group leader role with the first computing device based on receiving a response to the query via the second communication protocol from the second computing device.

AUTONOMOUS DRIVING CONTROL SYSTEM AND CONTROL METHOD AND DEVICE

An autonomous driving control system, comprising a main control system and a backup control system. The main control system comprises a main control module and main execution modules, and the backup control system comprises a backup control module and backup execution modules; the main control module monitors an operating status of the main control system in real time; the main control module further sends, when detecting that a failure occurs in the main control system, a failure notification to the backup control module, and sends a response termination control instruction to each of the main execution modules, the response termination control instruction being a control instruction for instructing each of the main execution modules not to respond to any control over a vehicle; and the backup control module controls, after receiving the failure notification, the backup execution modules to start to execute a backup control instruction.

Devices, systems and methods for internet and failover connectivity and monitoring

The disclosed apparatus, systems and methods relate a failover and internet connection monitoring system featuring a cloud server running an API, a probe, a firewall and a policy routing system. The failover connection monitoring system is capable of gathering and analyzing performance data and controlling the flow of packets to and from the internet over one or more connections to optimize performance of the network.

INTERNET-BASED PROXY SERVICE TO MODIFY INTERNET RESPONSES

A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the proxy server as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server retrieves the requested network resource. The proxy server determines that the requested resource is an HTML page. The proxy server scans the HTML page to locate one or more modification tokens that each indicates content that is subject to being modified. For at least one of the located modification tokens, the proxy server automatically modifies at least a portion of the content of the HTML page that corresponds to that modification token. The proxy server then transmits the modified HTML page to the client device.

RESILIENT PEER-TO-PEER APPLICATION MESSAGE ROUTING
20180006941 · 2018-01-04 ·

A network routing table includes destination addresses of destination applications hosted on peer nodes of a network. A primary processor registers a first destination application and a second destination application, where the first destination application is the same as the second destination application and both the first destination application and the second destination application have the same destination address. That processor also provides the peer nodes and a secondary processor with a copy of the table. When the first destination application is inactivated, all peer nodes and the secondary processor are provided with a copy of an updated routing table indicating inactivation of the first destination application and routing of the application message to the second destination application. A further application message addressed from any of the peer nodes to the destination address associated with the inactivated first destination application will be routed, via the updated routing table, to the second destination application having the same destination address as the inactivated first destination application. The secondary processor provides the copy of the routing table and the copy of the updated routing table in case of failure of the primary processor in response to a request from the querying peer node.

TELECOMMUNICATIONS APPARATUS AND METHODS

A method of operating first and second terminal devices for transmitting data in a device-to-device communication mode in a wireless telecommunications system supporting communications on a first carrier operating over a first frequency band and a second carrier operating over a second frequency band. The first terminal device transmits control signalling on the first carrier and this is received by the second terminal device. The control signalling comprises an indication of an allocation of radio resource blocks on the second carrier to be used for transmitting user-plane data from the first terminal device to the second terminal device. The first terminal device then proceeds to transmit the user-plane data to the second terminal device on the second carrier using the radio resource blocks on the second carrier identified by the control signalling. The control signalling may also provide an indication of an allocation of radio resource blocks on the first carrier to be used for transmitting user-plane data to the second terminal device.

Front End Traffic Handling In Modular Switched Fabric Based Data Storage Systems

Systems, methods, apparatuses, and software for data storage systems are provided herein. In one example, a data storage system is provided that includes storage drives each comprising a PCIe interface, and configured to store data and retrieve the data stored on associated storage media responsive to data transactions received over a switched PCIe fabric. The data storage system includes processors configured to each manage only an associated subset of the storage drives over the switched PCIe fabric. A first processor is configured to identify first data packets received over a network interface associated with the first processor within a network buffer of the first processor as comprising a storage operation associated with at least one of the plurality of storage drives managed by a second processor, and responsively transfer the first data packets into a network buffer of the second processor.

REMOTELY CONFIGURABLE ROUTERS WITH FAILOVER FEATURES, AND METHODS AND APPARATUS FOR RELIABLE WEB-BASED ADMINISTRATION OF SAME

Web-enabled routers are remotely and securely administered in a centralized fashion. A router receives a configuration profile from a dedicated web domain that maintains a repository of configuration profiles for multiple routers. The web domain also provides a web portal for customized generation of new configuration profiles based on stored profiles. When a new profile is deployed to and instantiated on a router, the router transmits a “heartbeat” to ensure that it can maintain connectivity with the web domain; if not, the router reverts to a previous “failover” configuration profile that ensures connectivity to the web domain. A router also may be equipped with both a wired and a wireless (e.g., a 3G, 4G, or 4G LTE) WAN communication interface. In the event of a wired connectivity issue, the router controls the wireless WAN interface to prioritize traffic for the router heartbeat and data backup/restore operations between a computer network for which the router serves as a gateway and the web domain.

SYSTEM AND METHOD FOR DETECTION AND PREVENTION OF ATTACKS ON IN-VEHICLE NETWORKS

Systems and methods for detection of attacks on a communication authentication layer of an in-vehicle network, including determining, by at least one network node, at least one attack attempt on the communication authentication layer of the in-vehicle network, wherein the determination is carried out by identifying anomalies in at least one of messages, data and metadata directed to the communication authentication layer, and selecting, by the at least one network node, a response corresponding to the determined attack attempt from at least one of modification of parameter values corresponding to a security protocol, a failsafe response, and rejection of messages identified as anomalies.