OPENROAMING BASED REMOTE WORKER
    31.
    发明申请

    公开(公告)号:US20220224565A1

    公开(公告)日:2022-07-14

    申请号:US17148481

    申请日:2021-01-13

    Abstract: A method for establishing a VPN with a client device is provided. In the method, an AP can receive an access request directed to an OpenRoaming (OR) Service Set Identifier (SSID) from the client device. The AP can send the access request to an OR connector. In response to the access request, the AP may receive an access response from the OR connector. The access response can include an attribute indicating an address to connect to a company Virtual Private Network (VPN) headend. The AP may then use the attribute to establish the VPN connection with the company VPN headend.

    Sparse graph coding scheduling for deterministic Ethernet

    公开(公告)号:US09705700B2

    公开(公告)日:2017-07-11

    申请号:US14519714

    申请日:2014-10-21

    CPC classification number: H04L12/417 H04L47/56

    Abstract: Embodiments provide techniques for transmitting data packets across a deterministic Ethernet network. Embodiments receive, at a first device in the deterministic Ethernet network, a deterministic binary schedule specifying timing information for transmitting data fragments relating to a plurality of data flows. Data packets to transmit to a destination device within the deterministic Ethernet network are received at the first device. Embodiments include fragmenting each of the data packets into two or more fragments and encoding at least one of the two or more fragments for each of the data packets with a respective sparse graph code. The encoded fragments are transmitted to the destination device, across multiple paths through the deterministic Ethernet network, according to timing information specified in the deterministic binary schedule.

    NETWORK DESCRIPTION MECHANISMS FOR ANONYMITY BETWEEN SYSTEMS
    34.
    发明申请
    NETWORK DESCRIPTION MECHANISMS FOR ANONYMITY BETWEEN SYSTEMS 有权
    网络描述系统之间的无关性的机制

    公开(公告)号:US20160359728A1

    公开(公告)日:2016-12-08

    申请号:US14729810

    申请日:2015-06-03

    CPC classification number: H04L45/14 H04L45/02 H04L45/04 H04L63/00

    Abstract: Techniques are disclosed for exchanging anonymized information between autonomous systems. In one example, a method comprises accessing an eigenvalue, wherein the eigenvalue is based on topology data associated with the first autonomous system; encoding the eigenvalue into a message; and transmitting, by a network element located in the first autonomous system, the message to an external edge router located in the second autonomous system. A further method can comprise receiving, by a network component located in a first autonomous system, a message, wherein the message comprises an eigenvalue and the message is received from an external network element located in a second autonomous system; accessing another other eigenvalue, the another eigenvalue corresponding to an autonomous system different from the first autonomous system; analyzing the another eigenvalue and the eigenvalue; and executing, by the network element, an action based on the analyzing.

    Abstract translation: 公开了用于在自治系统之间交换匿名信息的技术。 在一个示例中,一种方法包括访问特征值,其中特征值基于与第一自治系统相关联的拓扑数据; 将特征值编码成消息; 以及通过位于所述第一自治系统中的网络单元将所述消息发送到位于所述第二自治系统中的外部边缘路由器。 另一方法可以包括通过位于第一自治系统中的网络组件接收消息,其中所述消息包括特征值,并且所述消息是从位于第二自治系统中的外部网络元件接收的; 访问另一个特征值,对应于与第一自治系统不同的自治系统的另一个特征值; 分析另一个特征值和特征值; 并且由网元执行基于分析的动作。

    Flow matching optimization in scaled environments
    35.
    发明授权
    Flow matching optimization in scaled environments 有权
    缩放环境中的流量匹配优化

    公开(公告)号:US09407735B2

    公开(公告)日:2016-08-02

    申请号:US14486556

    申请日:2014-09-15

    CPC classification number: H04L69/22 H04L43/026

    Abstract: In one embodiment, a method includes identifying at a network device, a number of items for matching at a hash table, the number of items exceeding matching available with ternary content addressable memory (TCAM) at the network device, defining at the network device, an optimal cyclic redundancy check (CRC) polynomial based on the number of items for matching at the hash table, and generating at the network device, an optimal hash function based on the optimal CRC polynomial to extend packet classification capability at the network device. An apparatus is also disclosed herein.

    Abstract translation: 在一个实施例中,一种方法包括在网络设备处识别用于在散列表处进行匹配的项目的数量,在网络设备处定义的与网络设备上的三进制内容可寻址存储器(TCAM)可用的项目数量相匹配的数量, 基于用于在散列表处进行匹配的项目的数量的最佳循环冗余校验(CRC)多项式,以及在网络设备处生成基于最佳CRC多项式的最优哈希函数,以在网络设备上扩展分组分类能力。 本文还公开了一种装置。

    HETEROGENOUS NETWORK DEVICE EXTENSION AND STANDARDIZATION WITH DEVICE INSTRUMENTATION

    公开(公告)号:US20250030741A1

    公开(公告)日:2025-01-23

    申请号:US18356147

    申请日:2023-07-20

    Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for extending and standardizing heterogeneous network devices using instrumentation. A method includes: receiving, by a client device using a first network interface, instrumentation bytecode to supplement with a data link layer from a management device, wherein a verifier of the client device verifies that the instructions of the bytecode are constrained for security based on a plurality of rules; in response to detecting a trigger at the client device, executing the instrumentation bytecode at the client device to perform at least one function associated with the trigger; and sending a response from the client device based on an execution result of the instrumentation bytecode.

    IDENTIFYING ROGUE WIRELESS DEVICES USING MAC ADDRESS ROTATION TECHNIQUES

    公开(公告)号:US20250016568A1

    公开(公告)日:2025-01-09

    申请号:US18892955

    申请日:2024-09-23

    Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.

Patent Agency Ranking