Deterministic stitching of deterministic segments across distinct deterministic domains

    公开(公告)号:US10439871B2

    公开(公告)日:2019-10-08

    申请号:US15713827

    申请日:2017-09-25

    Abstract: In one embodiment, a method comprises: receiving, by a switching device, one or more identified flows of data packets from first deterministic flows of a first deterministic segment in a first deterministic domain, the first deterministic segment established based on first deterministic attributes in the first deterministic domain; receiving, by the switching device, second deterministic attributes about second deterministic flows for a second deterministic segment in a second different deterministic domain, the second deterministic attributes different than the first deterministic attributes; and allocating, by the switching device based on the first deterministic attributes and the second deterministic attributes, at least a portion of the second deterministic flows for deterministic stitching of the one or more identified flows of data packets from the first deterministic segment in the first deterministic domain into the second deterministic segment in the second deterministic domain according to a guaranteed deterministic constraint.

    DEFEATING MAN-IN-THE-MIDDLE ATTACKS IN ONE LEG OF 1+1 REDUNDANT NETWORK PATHS

    公开(公告)号:US20190289022A1

    公开(公告)日:2019-09-19

    申请号:US15920651

    申请日:2018-03-14

    Abstract: In one embodiment, an elimination point device in a network obtains a master secret from a network controller. The elimination point device assesses, using the master secret, whether an incoming packet received by the elimination point device from a redundant path between the elimination point device and a replication point device in the network includes a valid message integrity check (MIC). The elimination point device determines whether the incoming packet was injected maliciously into the redundant path, based on the assessment of the incoming packet. The elimination point device initiates performance of a mitigation action in the network, when the elimination point device determines that the incoming packet was injected maliciously into the redundant path.

    TRAFFIC AND MOBILITY AWARE VIRTUAL ACCESS POINTS

    公开(公告)号:US20190215838A1

    公开(公告)日:2019-07-11

    申请号:US15868216

    申请日:2018-01-11

    Abstract: In one embodiment, a supervisory device in a network classifies mobility and traffic characteristics of a first node in the network. The supervisory device identifies wireless channels supported by access points (APs) in the network. The supervisory device selects one of the wireless channels for use by the first node based on the classified mobility and traffic characteristics of the first node. The supervisory device forms a first virtual access point (VAP) for the first node on the selected wireless channel. A plurality of the access points (APs) in the network that support the selected channel are mapped to the first VAP as part of a VAP mapping. The first node treats the APs in the VAP mapping as a single AP for purposes of communicating with the network.

    Methods and apparatus for use in selecting a connection path for low-latency, deterministic multi-hop D2D communications

    公开(公告)号:US10349335B2

    公开(公告)日:2019-07-09

    申请号:US15795637

    申请日:2017-10-27

    Abstract: In one illustrative example, one or more controllers may be configured to perform a path selection procedure for selecting a connection path for multi-hop device-to-device (D2D) communications. Identifiers of candidate D2D device pairings from D2D peer discovery performed by a plurality of UEs served in a plurality of base stations and link quality data associated with each candidate D2D device pairings are obtained. D2D network topology map data including a plurality of link-state relationships are generated based on the identifiers of candidate D2D device pairings. A plurality of connection paths of UEs are computed based on the generated link-state relationships and the link quality data, where each computed connection path includes UEs indicated as required nodes and at least one UE indicated as a candidate relay node. An optimal connection path that satisfies a latency parameter is selected from the plurality of computed connection paths (e.g. based on a shortest path first or SPF algorithm). The selected connection path may be part of an operational control loop for low latency, deterministic D2D communications.

    ROUTING TRAFFIC ACROSS ISOLATION NETWORKS
    245.
    发明申请

    公开(公告)号:US20190199626A1

    公开(公告)日:2019-06-27

    申请号:US15854040

    申请日:2017-12-26

    CPC classification number: H04L45/64 H04L45/245 H04L47/19

    Abstract: In one embodiment, a cloud-based service instructs one or more networking devices in a local area network (LAN) to form a virtual network overlay in the LAN that redirects traffic associated with a particular node in the LAN to a first isolation application instance hosted by the service. The first isolation application instance receives the redirected traffic associated with the particular node. The first isolation application instance determines a routing path for the traffic that comprises one or more other isolation application instances hosted by the cloud-based service. The first isolation application instance tags the traffic to indicate the determined routing path. The first isolation application forwards the tagged traffic to a second isolation application instance along the determined routing path.

    VIRTUAL ACCESS POINT (VAP) FORMATION
    246.
    发明申请

    公开(公告)号:US20190166547A1

    公开(公告)日:2019-05-30

    申请号:US16248108

    申请日:2019-01-15

    CPC classification number: H04W48/14 H04L1/18 H04W24/02 H04W88/08

    Abstract: In one embodiment, a supervisory device in a network receives from a plurality of access points (APs) in the network data regarding a network availability request broadcast by a node seeking to access the network and received by the APs in the plurality. The supervisory device uniquely associates the node with a virtual access point (VAP) for the node and forms a VAP mapping between the VAP for the node and a set of the APs in the plurality selected based on the received data regarding the network availability request. One of the APs in the mapping is designated as a primary access point for the node. The supervisory device instructs the primary AP to send a network availability response to the node that includes information for the VAP. The node uses the information for the VAP to access the network via the set of APs in the VAP mapping.

    REPAIR WALKER AGENTS IN A NETWORK
    247.
    发明申请

    公开(公告)号:US20190163548A1

    公开(公告)日:2019-05-30

    申请号:US15825248

    申请日:2017-11-29

    Abstract: In one embodiment, a supervisory device in a network receives a help request from a first node in the network indicative of a problem in the network detected by the first node. The supervisory device identifies a second node in the network that is hosting a repair walker agent able to address the detected problem. The supervisory device determines a network path via which the second node is to send repair walker agent to the first node. The supervisory device instructs the second node to send the repair walker agent to the first node via the determined path.

    AUTOMATED SENSOR COVERAGE OPTIMIZATION WITH AN ACTUATING WALKER AGENT

    公开(公告)号:US20190141540A1

    公开(公告)日:2019-05-09

    申请号:US15804064

    申请日:2017-11-06

    Abstract: In one embodiment, a first actuator in a network of sensors and actuators executes a walker agent configured to adjust an actuation setting of the first actuator. The actuation setting controls an area of coverage of the first actuator when actuated. The executing agent on the first actuator receives one or more sensor measurements from one or more of the sensors that are in communication range of the first actuator. The executing agent also controls, based on the received one or more sensor measurements, the area of coverage of the first actuator by adjusting its actuation setting, in an attempt to optimize coverage of the sensors in the network by the areas of coverage of the actuators. The first actuator unloads the executing walker agent after adjusting the actuation setting of the first actuator and propagates the agent to another one of the actuators in the network for execution.

    Voice data compensation with machine learning

    公开(公告)号:US10217466B2

    公开(公告)日:2019-02-26

    申请号:US15497650

    申请日:2017-04-26

    Abstract: A method comprises: obtaining, at an apparatus, first voice data from a first user device associated with a first speaker participant in a communication session; detecting voice data loss or degradation in the first voice data; determining whether prediction probability of correctly compensating for the voice data loss or degradation is greater than a predetermined probability threshold; if the prediction probability is greater than the predetermined probability threshold, first compensating for the voice data loss or degradation using historical voice data received by the apparatus prior to receiving of the first voice data, the first compensating producing first compensated voice data; if the prediction probability is not greater than the predetermined probability threshold, second compensating for the voice data loss or degradation by inserting noise to the first voice data to produce second compensated voice data; and outputting the first compensated voice data or the second compensated voice data.

Patent Agency Ranking