15th week of 2021 patent applcation highlights part 61 |
Patent application number | Title | Published |
20210111942 | SERVICE RESILIENCY USING A RECOVERY CONTROLLER - Examples described herein relate to a management system that determines which services to redeploy on one or more platforms. A platform can receive a configuration to perform during a failure of connectivity with a management system. The platform can monitor activity of one or more services. The platform can, based on failure of connectivity with the management system and recovery of connectivity with the management system, provide the monitored activity of one or more services to the management system to influence services re-deployed by the management system. In some examples, based on failure to re-establish a connection with the management system within an amount of time, the platform can connect with the management system using a secondary management interface. | 2021-04-15 |
20210111943 | Forming Root Cause Groups Of Incidents In Clustered Distributed System Through Horizontal And Vertical Aggregation - A system and method for the aggregation and grouping of previously identified, causally related abnormal operating condition, that are observed in a monitored environment, is disclosed. Agents are deployed to the monitored environment which capture data describing structural aspects of the monitored environment, as well as data describing activities performed on it, like the execution of distributed transactions. The data describing structural aspects is aggregated into a topology model which describes individual components of the monitored environments, their communication activities and resource dependencies and which also identifies and groups components that serve the same purpose, like e.g. processes executing the same code. Activity related monitoring data is constantly monitored to identify abnormal operating conditions. Data describing abnormal operating condition is analyzed in combination with topology data to identify networks of causally related abnormal operating conditions. Causally related abnormal operating conditions are then grouped using known topological resource and same purpose dependencies. Identified groups are analyzed to determine their root cause relevance. | 2021-04-15 |
20210111944 | DEVICE AND METHOD FOR CONTROLLING NETWORK - A network control device includes a storage and a processor. The storage stores an identifying value and a severity value for each of network elements. The identifying values are hierarchized based on inclusion relationships between the network elements. The severity values respectively indicate a severity in sharing a risk of a failure in the network elements. When first and second paths are designated, the processor detects, for each of a plurality of target identifying values corresponding to a plurality of network elements implementing the first path, a longest matched identifying value having a longest region matching the target identifying value from among a plurality of identifying values corresponding to a plurality of network elements implementing the second path. The processor calculates a sum of severity values corresponding to the detected longest matched identifying values, and evaluates the second path for the first path based on the sum. | 2021-04-15 |
20210111945 | Soft-Failure Protection for Multicast Communications - In one embodiment, a first computer networking device executes an election algorithm to determine whether at least the first computer networking device or a second computer networking device is responsible for forwarding, to at least one receiving device, communications addressed to a specified group of computing devices. The first computer networking device may further store first data indicating that the first computer networking device is responsible for forwarding the communications. However, in response to the first computer networking device determining that it is no longer receiving the communications, it may store second data indicating that the first computer networking device is no longer responsible for forwarding the communications and may send, to the second computer networking device, third data indicating that the first computer networking device is not receiving the communications. | 2021-04-15 |
20210111946 | SYSTEMS AND METHODS FOR INTEGRATING NETWORK SWITCH MANAGEMENT WITH COMPUTING RESOURCE MANAGEMENT - A networking system may include a switch coupled to a computing resource. A resource management system may control the computing resource. A controller may be coupled to the switch. The controller may include a resource management interface that is coupled to the resource management system via a communications link. The resource management interface may receive computing resource information for the computing resource via the communications link. The controller may provide control data to the switch to update a cloud network for the computing resource based on the received computing resource information. | 2021-04-15 |
20210111947 | CONFIGURATION METHOD AND APPARATUS - This application provides a configuration method. The method includes: receiving, by a network repository network element, a request message from a second network element, where the request message includes information about a network slice, and the request message is used to request to obtain status information of a system feature supported by the network slice; and sending, by the network repository network element based on the request message, the status information of the system feature supported by the network slice to the second network element. Based on this solution, the second network element may obtain, from the network repository network element, the status information of the system feature supported by the network slice. The status information of the system feature supported by the network slice includes status information of an NF service corresponding to the system feature. | 2021-04-15 |
20210111948 | SYSTEMS AND METHODS FOR PROVIDING SPLIT CONTROL OF MULTIPLE EXECUTION ENVIRONMENTS - The present disclosure describes systems, methods, and computer-readable storage media implementing techniques for providing split control of an execution environment. According to aspects of the disclosure, a first entity may be configured to exert control over presentation related aspects (e.g., the look and feel) of services provided by a second entity, while the second entity may exert control over backend processing and execution of the services. To facilitate the different portions of the split control, one or more servers may be configured to provide a first execution layer, a second execution layer, and a second execution layer control panel. The first execution layer may perform operations for executing the provisioning of the service. The second execution layer may perform operations for presenting the computing/execution environment for providing the service, and the second execution environment control panel may provide the first entity to customize/modify presentation related aspects of the computing/execution environment. | 2021-04-15 |
20210111949 | HIERARCHICAL CLOUD COMPUTING RESOURCE CONFIGURATION TECHNIQUES - Techniques and systems are disclosed to provide a configuration tool that can be used to improve configuration of cloud-based network resources. In some implementations, data indicating (i) a present configuration state of a cloud computing resource, and (ii) a desired state configuration of the cloud computing resource is obtained. A determination is made that adjusting the cloud computing resource from the present state configuration to the desired state configuration includes executing one or more operations classified as likely involving user confirmation. A workflow representation is generated for configuring the cloud computing resource from the present state configuration to the desired state configuration. The workflow representation identifies a hierarchical arrangement of tasks to be performed. A user interface is provided for output to a computing device. The user interface enables a user to perceive the hierarchical arrangement of tasks to be performed in configuration of the cloud computing resource. | 2021-04-15 |
20210111950 | PERSISTENT NETWORK RESOURCE AND VIRTUAL AREA ASSOCIATIONS FOR REALTIME COLLABORATION - Apparatus and methods relating to persistent network resource and virtual area associations for realtime collaboration include managing and displaying an object associated with a virtual area that supports establishment of respective presences of communicants operating respective client network nodes. Examples of the object include an object that has one or more user-modifiable property fields and an object that is associated with screen sharing functionality of the client network node. | 2021-04-15 |
20210111951 | HYPER-CONVERGED INFRASTRUCTURE NETWORKING CONFIGURATION SYSTEM - A Hyper-Converged Infrastructure (HCI) networking configuration system includes HCI node subsystems with different configuration requirements, and a networking subsystem coupled HCI node subsystems via respective port(s). The networking subsystem identifies each of the HCI node subsystems and, based on that determine, based on those identifications, determines respective different configuration requirements for each of the HCI node subsystems. Based on those respective configuration requirements, the networking subsystem generates a networking subsystem configuration, and applies the networking subsystem configuration to the networking subsystem such that each of its respective ports coupled to the HCI node subsystems is configured to provide communication between the networking subsystem and that HCI node subsystem. | 2021-04-15 |
20210111952 | Creating a User Private Network Based on 802.11ay Wi-Fi Technology - Certain embodiments disclose systems and methods for creating a user private network (UPN) based on 11ay technology. Methods of the present disclosure include creating a personal basic service set (PBSS) having a service device and one or more 11ay devices, the service device configured to wirelessly communicate with the one or more 11ay devices in the PBSS, creating a UPN having an access point located in communicative proximity with the service device, and associating at least one 11ay device of the one or more 11ay devices with the UPN, wherein the at least one 11ay device is configured to establish a wireless connection with the one or more 11ay devices using the service device when within a coverage area of the PBSS, and to establish a wireless connection with the one or more 11ay devices using the access point when outside the coverage area of the PBSS. | 2021-04-15 |
20210111953 | EDGE DISCOVERY TECHNIQUES IN WIRELESS COMMUNICATIONS SYSTEMS - Methods, systems, and devices for wireless communications are described that provide for configuration of edge data networks based on current and projected future locations of a user equipment (UE). The UE may provide one or more expected future locations based on routing information of the UE, a polygon associated with one or more current or future UE locations, a waypoint set of the UE, and the like. Based on the provided one or more future locations, the edge data network may provide to the UE one or more edge data network configurations for different UE locations. As the UE moves to different locations, different edge data network configurations may be used, thereby enhancing efficiency of UE operation in the edge data network. | 2021-04-15 |
20210111954 | METHOD AND APPARATUS OF CONFIGURING OPERATING MODE FOR MULTI-MODE TERMINAL - A method of configuring an operating mode for a multi-mode terminal includes: a target operating mode matching the multi-mode terminal is determined from among a plurality of operating modes reported and supported by the multi-mode terminal; target network configuration information corresponding to the target operating mode is determined; and the target network configuration information is sent to the multi-mode terminal, so that the multi-mode terminal operates in the target operating mode after performing network configuration according to the target network configuration information. A base station determines, from among the plurality of the operating modes supported by the multi-mode terminal, the target operating mode matching the multi-mode terminal, and sends target network configuration information corresponding to the target operating mode to the multi-mode terminal, so as to achieve a purpose of dynamically configuring the operating mode for the multi-mode terminal. | 2021-04-15 |
20210111955 | METHODS AND SYSTEMS FOR DHCP POLICY MANAGEMENT - Methods and systems are disclosed for configuring a network consisting of an IP Policy Management (IPPM) service and a plurality of distributed network devices supporting DHCP and other service roles wherein network devices are discovered by the IPPM service and the configuration for each of the network devices is determined by the selection of a policy, wherein the policy is made up of a plurality of rules specific to the service roles and capabilities of the network devices, and the configuration of each of the network devices is deployed via the network to the network devices. | 2021-04-15 |
20210111956 | AD HOC WIRELESS MESH NETWORK - Provided is process of operating a wireless device configured to act as a node in an ad hoc multi-hop mobile network, the process including: snooping, with a wireless device, a packet transmitted from a sending node to a receiving node in a multi-hop wireless connection, the sending node and the receiving node being in a different location; extracting from the snooped packet an identifier of the sending node and an identifier of the receiving node; determining based on the identifier of the sending node, the identifier of the receiving node, and a record in memory of the wireless device that the wireless device is part of a multi-hop wireless connection including the sending node and the receiving node; determining that a signal strength of a signal conveying the snooped packet exceeds a threshold; and transmitting a kill packet to the sending node and the receiving node that reconfigures the multi-hop wireless connection to bypass the receiving node. | 2021-04-15 |
20210111957 | METHODS, SYSTEMS AND APPARATUS TO PROPAGATE NODE CONFIGURATION CHANGES TO SERVICES IN A DISTRIBUTED ENVIRONMENT - Methods, apparatus and articles of manufacture to propagate node changes in a cluster of nodes and reconfigure services based on the node changes in a cloud computing environment are disclosed. An example first node of an example cluster of nodes includes an event reporter to, in response to experiencing a node change event, transmit a node change event message to a second node, the node change event message to trigger the second node to perform at least one action to reconfigure a service supported by the second node, the at least one action to reconcile the service with the node change event; and an event listener to receive an event reporting message from the second node, the event reporting message indicative of whether the second node successfully performed the at least one action. | 2021-04-15 |
20210111958 | IDENTIFYING A PATH FOR INTERCONNECTING ENDPOINT RESOURCES TO CONSTRUCT LOGICAL SYSTEMS - Examples may construct a logical system by interconnecting endpoint resources in a memory semantic environment. Examples include identifying a first path for interconnecting endpoint resources based on at least a cost for interconnecting the endpoint resources. | 2021-04-15 |
20210111959 | METHOD AND SYSTEM FOR LATENCY-AWARE EMBEDDING OF A VIRTUAL NETWORK ONTO A SUBSTRATE OPTICAL NETWORK - The disclosed s, structures, and methods are directed to a method and a system for embedding a virtual network onto the substrate optical network comprising embedding the plurality of virtual nodes onto the plurality of substrate nodes in accordance with the plurality of location constraints, computing end-to-end latency associated with a plurality of substrate paths connecting a source substrate node and a destination substrate node, wherein the plurality of substrate paths contain the plurality of substrate links and the plurality of substrate nodes, and embedding a virtual link connecting a source virtual node and a destination virtual node onto the one of the plurality of substrate paths connecting the source substrate node and the destination substrate node, wherein the end-to-end latency associated with the one of the plurality of substrate paths is less than or equal to a maximum allowable latency for the virtual link. | 2021-04-15 |
20210111960 | BANDWIDTH PART SWITCHING FOR DUAL ACTIVE PROTOCOL STACK HANDOVER - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a base station may configure a bandwidth part (BWP) switching configuration of a user equipment in connection with a dual active protocol stack (DAPS) handover based at least in part on a BWP switching rule; and perform the DAPS handover. Numerous other aspects are provided. | 2021-04-15 |
20210111961 | METHOD AND DEVICE FOR ADJUSTING RATED BANDWIDTH - Method, apparatus, and storage medium for adjusting a rated bandwidth are provided. The method includes: for any one product line of any one network device in a data transmission network, periodically according to a preset benchmark health value and a real-time health value of the product line in a current period, determining a rated bandwidth adjustment mode; if the rated bandwidth adjustment mode is up-regulation, according to a fluctuation of the real-time health value, calculating a real-time up-regulation ratio of the rated bandwidth; according to the real-time up-regulation ratio and a pre-stored basic up-regulation ratio of the rated bandwidth, adjusting a current rated bandwidth; and if the rated bandwidth adjustment mode is down-regulation, according to a preset down-regulation ratio of the rated bandwidth and real-time bandwidth data of the network device in the current period, adjusting the current rated bandwidth. | 2021-04-15 |
20210111962 | TOPOGRAPHICAL SEARCH - In an embodiment, a graphical map display and a graphical list display relating to nodes in a node network are instantiated and displayed as part of a graphical user interface. In an embodiment, a selection if made from the graphical list display and aspects of the graphical map display are altered. In an embodiment, a selection is made from the graphical map display and the graphical list display is altered. In an embodiment, interaction between items from the graphical list display and the graphical map display cause the manipulation of data in the nodes comprising the node network. | 2021-04-15 |
20210111963 | LINK GROUP CONFIGURATION METHOD AND APPARATUS - Embodiments of this application provide a link group configuration method and an apparatus. The link group configuration method includes: obtaining, by a first network device, candidate groups to which M physical ports of the first network device belong respectively; obtaining, by the first network device from a second network device, candidate groups to which M physical ports of the second network device belong respectively; and selecting N physical links from M physical links, as a link group between the first network device and the second network device, based on the candidate groups to which the M physical ports of the first network device belong respectively and the candidate groups to which the M physical ports of the second network device belong respectively. | 2021-04-15 |
20210111964 | NETWORK MIXING PATTERNS - A mixing pattern system for networks is provided. One or more nodes in a network are analyzed. Grouping the one or more nodes into one or more classes within the network. A computer device analyzes one or more transactions between the one or more nodes in the network that include nodes within similar or distinct classes of the one or more nodes. A computer device identifies one or more mixing patterns associated with one or more transactions between the one or more nodes. | 2021-04-15 |
20210111965 | Formal Model Checking Based Approaches To Optimized Realizations Of Network Functions In Multi-Cloud Environments - In an embodiment, a computer-implemented method comprises receiving logical model input that specifies a logical topology model of networking elements and/or computing elements for deployment at least partially in a private cloud computing infrastructure and at least partially in a public cloud computing infrastructure; receiving resource input specifying an inventory of computing elements that are available at least partially in the private cloud computing infrastructure and at least partially in the public cloud computing infrastructure; automatically generating an intermediate topology comprising a set of deployment instructions that are capable of execution at least partially in the private cloud computing infrastructure and at least partially in the public cloud computing infrastructure to cause physical realization of a network deployment corresponding to the logical topology model; determining whether the intermediate topology is functionally equivalent to the logical topology model; in response to determining that the intermediate topology is functionally equivalent to the logical topology model, transmitting the deployment instructions at least partially to the private cloud computing infrastructure and at least partially to the public cloud computing infrastructure. | 2021-04-15 |
20210111966 | SYSTEMS AND METHODS FOR USING MACHINE LEARNING TECHNIQUES TO REMEDIATE NETWORK CONDITIONS - A system described herein may use automated techniques, such as machine learning techniques, to identify network events (e.g., based on user-submitted reports and/or system-generated alerts). The system may identify a type and/or attributes of the network event, and may identify past network events that share the same or similar attributes. An estimated time to remediate the network event, and/or one or more remedial measures, may be determined and implemented based on remediation measures taken to remediate the past network events. The determined remedial measures may include one or more temporary remedial measures effected until a permanent solution is put into place. Users who are affected, or who are likely to be affected, may be contacted to indicate the estimated remediation time. Feedback may be used to refine the estimation and/or remediation for future similar network events. | 2021-04-15 |
20210111967 | GRAPHICAL USER INTERFACE FOR TRAFFIC CAPTURE AND DEBUGGING TOOL - A method for diagnosing a cause of failure using automated test equipment (ATE) comprises configuring a plurality of capture modules in a programmable logic device using a graphical user interface (GUI) associated with a monitoring application. The method further comprises monitoring data traffic between a device under test (DUT) and the programmable logic device using the plurality of capture modules, wherein the plurality of capture modules are programmable and operable to selectively capture data traffic to be monitored. Further, the method comprises retrieving results associated with the monitoring from respective memories associated with each of the plurality of capture modules into the monitoring application and analyzing the results upon retrieval. | 2021-04-15 |
20210111968 | INTELLIGENT SELECTION OF VANTAGE POINTS FOR MONITORING SUBSERVICES BASED ON POTENTIAL IMPACT TO SERVICES - A method includes configuring services as respective collections of subservices on network devices of a network, and decomposing definitions of the services into subservice dependency graphs each indicating the subservices and dependencies between the subservices that collectively implement a respective one of the services. The method further includes traversing the subservice dependency graphs to identify, at one or more intersections of the subservice dependency graphs, one or more shared subservices among the subservices of the services, wherein the one or more shared subservices are shared by the services. The method also includes monitoring subservice health states of the one or more shared subservices, and determining health states of the services based on the subservice health states of the one or more shared subservices. | 2021-04-15 |
20210111969 | CLOUD LAUNCH WIZARD - One example method includes receiving an input that indicates selection of a cloud storage provider, receiving one or more product selection inputs, each of the product selection inputs indicating selection of a respective data protection product, receiving an input indicating an instance size, assembling the inputs together to define a data protection configuration, and automatically generating a script which, when executed by one or more hardware processors, deploys the data protection configuration in a cloud storage environment of the selected cloud storage provider. | 2021-04-15 |
20210111970 | DIGITAL INTELLECTUAL CAPITAL-BASED SERVICE ASSURANCE FOR INTENT-BASED NETWORKING - A method is provided that involves obtaining service pre-conditions associated with a service to be supported in a network. The method includes providing a plurality of digital Intellectual Capital (IC) modules, and providing signature pre-condition logic that specifies one or more conditions that indicate relevancy of one or more digital IC modules. The method includes selecting, from the plurality of digital IC modules, based on the service pre-conditions and the signature pre-condition logic, one or more particular digital IC modules that are applicable to the service in the network. The method further includes determining information to be obtained from one or more nodes in the network based on the one or more particular digital IC modules, and obtaining the information from the one or more nodes in the network. The information is analyzed to determine whether the one or more specific operational issues are present in the network. | 2021-04-15 |
20210111971 | SERVICE AWARE CONDITIONAL PATH MONITORING - In one embodiment, a method is provided service aware conditional path monitoring. The method includes determining, for a network that includes a plurality of nodes, which particular nodes of the plurality of nodes forward traffic associated with a service. The method involves identifying relevant forwarding instructions within the particular nodes that are used to forward traffic for the service. The method further includes configuring the particular nodes to perform monitoring of traffic with a higher priority given to the relevant forwarding instructions than other forwarding instructions on the particular nodes. Monitoring results are obtained from the monitoring of traffic on the particular nodes on the relevant forwarding instructions. The monitoring results are analyzed to determine assurance of the service in the network. | 2021-04-15 |
20210111972 | AUGMENTED REALITY/VIRTUAL REALITY PLATFORM FOR A NETWORK ANALYZER - A method, system and computer program product for overlaying network data on a physical space and/or network devices. Rules are applied to network data that was captured from a network device. Such rules are used to select which network data from the captured network data is to be visualized by a user. The selected network data is then enhanced with additional information (e.g., geographical location). The speed of the transmission and/or volume of the enhanced network data are adapted according to human brain frame rate and user preferences to generate processed network data. Holograms of the processed network data are created for visualization at an augmented reality (AR)/virtual reality (VR) device. The AR/VR device overlays the holograms on top of the physical space encompassing the network device and/or the network device. | 2021-04-15 |
20210111973 | VISUALIZATION OF ANALYSIS RESULTS OF CONTENTS - A method, system and computer program product for visualizing analysis results of contents. Contents collected from various kinds of communication tools are read into memory. The contents are analyzed to obtain analysis results, where the analysis results include information on user groups, information on topics and degrees of involvement of users with the topic. Furthermore, user objects assigned according to the degree of involvement are dynamically displayed for a designated period of time and for each topic using the analysis results, where the displaying of each of the user objects is modified according to the degree of involvement and the information on a user group. A communication volume object which represents a communication volume between users may be further displayed between the user objects associated with these users and displayed so as to be different depending on the communication volume. | 2021-04-15 |
20210111974 | METHODS AND APPARATUS TO MONITOR TELEMETRY DATA ASSOCIATED WITH COMPUTING DEVICES - Methods, apparatus, systems and articles of manufacture to monitor telemetry data associated with computing devices are disclosed. An example apparatus includes a telemetry collector collect a first set of telemetry data to form a telemetry data timeline associated with a computing device, the first set of telemetry data collected based on a policy file, and output a trigger indicative of an operational condition specified in the policy file. The disclosed example apparatus also includes an actuator to collect a second set of telemetry data associated with the computing device in response to the trigger, the second set of telemetry data collected based on the policy file. The disclosed example apparatus further includes a data reporter to report the telemetry data timeline and the second set of telemetry data to a server in response to a request. | 2021-04-15 |
20210111975 | METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR PROVIDING A DECLARATIVE NETWORK MONITORING ENVIRONMENT - The subject matter described herein includes methods, systems, and computer readable media for providing a declarative network monitoring environment. A method for providing a declarative network monitoring environment includes providing an available tool registry for storing tool information associated with networking monitoring tools that are available for use; providing a potential tool registry for storing tool information associated with networking monitoring tools that are potentially available for use; receiving declarative network monitoring input indicating a desire by a user to perform a monitoring related task; determining, using the declarative network monitoring input and the available tool registry and/or the potential tool registry, at least one set of tool configurations for configuring network monitoring tools to perform the monitoring related task; and providing the at least one set of tool configurations. | 2021-04-15 |
20210111976 | METHODS AND APPARATUS FOR AUGMENTED REALITY VIEWER CONFIGURATION - The present disclosure relates to methods and apparatus for display or graphics processing. Aspects of the present disclosure can determine a communication compatibility of one or more client devices. Further, aspects of the present disclosure can modify a user space or a kernel based on the communication compatibility of each of the one or more client devices. Additionally, aspects of the present disclosure can communicate at least some data with the one or more client devices based on the modified user space or the modified kernel. Aspects of the present disclosure can also modify the kernel based on the communication compatibility of each of the one or more client devices. Aspects of the present disclosure can also extend the kernel based on the communication compatibility. | 2021-04-15 |
20210111977 | SLAVE, WORK MACHINE, AND LOG INFORMATION STORAGE METHOD - There are provided a slave, a work machine, and a method for storing log information, which are capable of appropriately store the log information when a communication abnormality occurs such that communication cannot be kept between a master and the slave in an industrial network. The control section performs first storage processing storing the log information into a volatile storage section when a communication abnormality occurs such that communication with the master cannot be kept, communication abnormality determination processing for determining whether the communication abnormality has occurred, and second storage processing storing the log information into a non-volatile storage section by acquiring the log information from the volatile storage section, in response to a determination made in that the communication abnormality has occurred as a result of the communication abnormality determination processing. | 2021-04-15 |
20210111978 | FAULT DETECTION FOR LACP PACKET TIMEOUT - A fault detection method of LACP packet timeout provided including: receiving a LACP packet from a target port of the partner device through a local port, the LACP packet at least includes a phase identifier to indicate a negotiation phase of a LACP negotiation process between the target port and the local port; sending a response LACP packet corresponding to the LACP packet to the target port through the local port; generating a LACP service processing entry for the LACP packet to indicate a LACP service processing phase performed by the actor device for the LACP packet; in response to that no LACP packet from the target port being received through the local port continues for a preset waiting time, performing fault detection based on the phase identifier and the LACP service processing entry so to obtain fault cause information to indicate a LACP packet timeout of the target port. | 2021-04-15 |
20210111979 | DETECTION OF UNAUTHORIZED CRYPTOMINING - A processing system of a device having at least one processor may determine that a temperature of the device exceeds a threshold temperature and obtain, in response to the determining, utilization information of the device comprising: processor utilization information, memory utilization information, and network utilization information. The processing system may then detect, from the utilization information of the device, a pattern comprising: a first network utilization burst, a processor utilization exceeding a processor utilization threshold and a memory utilization exceeding a memory utilization threshold over at least a designated period of time following the first network utilization burst, and a second network utilization burst after at least the designated period of time. When the pattern is detected, the processing system may generate an unauthorized cryptomining alert. | 2021-04-15 |
20210111980 | MANAGING NETWORK SYSTEM INCIDENTS - Managing network asset incidents by receiving historical network asset incident data, analyzing the historical network asset incident data to correlate incident occurrence, receiving real time network asset incident data, generating a list of network assets predicted to be affected by a real time incident, in response to receiving the real time network asset incident data, monitoring the list of network assets, and remediating a network incident for a listed network as set. | 2021-04-15 |
20210111981 | SYSTEMS AND METHODS FOR AUTOMATICALLY PACKAGING AND DEPLOYING VIRTUAL NETWORK FUNCTIONS IN A NETWORK BASED ON NETWORK INTERFACE DEPENDENCIES AND COMPATIBILITIES - A device may receive information identifying existing virtual network functions (VNFs) associated with an existing virtual radio access network (VRAN), and may receive information identifying proposed VNFs to deploy with the existing VRAN, wherein the information identifying the proposed VNFs includes VNF descriptors indicating interface dependencies associated with the proposed VNFs. The device may generate testing configurations, for testing the proposed VNFs, based on the interface dependencies, and may determine that a set of the proposed VNFs are validated based on testing the proposed VNFs with the testing configurations. The device may derive dependency constraints for the set of the proposed VNFs based on the information identifying the existing VNFs, and may select a new VNF that satisfies the dependency constraints, based on the set of the proposed VNFs. The device may cause the new VNF to be deployed with the existing VRAN. | 2021-04-15 |
20210111982 | ANALYSIS OF NETWORK PERFORMANCE USING DETERMINISTIC DECENTRALIZED SCHEDULING ACROSS DISTRIBUTED TEST AGENTS - A method and system for testing of a communication network utilizing a plurality of test agents in the communication network using a deterministic decentralized scheduling of the plurality of test agents to test a single network service. Determining an optimal time period for executing a test of the single network service by each of the plurality of test agents without requiring global knowledge of the system and without requiring centralized coordination of individual agent test schedules. | 2021-04-15 |
20210111983 | SYSTEM AND METHOD FOR LOOPBACK AND NETWORK LOOP DETECTION AND ANALYSIS - A method of determining the presence of a loopback in one or more networks comprises storing information related to a test instance; sending a loopback detection beacon (PLD) containing information related to the test instance from a port on an originating device; monitoring the port for a predetermined time period to detect LPDBs arriving at the port during the predetermined time period; and determining whether a detected LPDB contains information corresponding to the stored information, to detect the presence of a loopback. The method may determine whether a detected loopback is a port loopback, a tunnel loopback or a service loopback. The stored information related to the test instance may be deleted if an LPDB arriving at the port and containing information corresponding to the stored information is not detected within the predetermined time period. | 2021-04-15 |
20210111984 | DYNAMIC DISCOVERY OF SERVICE NODES IN A NETWORK - This disclosure describes various methods, systems, and devices related to dynamic service node discovery in a network. In an example method, an intermediary node receives a Link Layer Discovery Protocol (LLDP) message from a first node. The LLDP message includes a discovery Type-Length-Value (TLV) that indicates a location of a service node in the network. The method further includes forwarding the LLDP message to a second node. | 2021-04-15 |
20210111985 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DISTRIBUTING NETWORK FUNCTION (NF) TOPOLOGY INFORMATION AMONG PROXY NODES AND FOR USING THE NF TOPOLOGY INFORMATION FOR INTER-PROXY NODE MESSAGE ROUTING - A method for distributing network function (NF) topology information among proxy nodes and for using the NF topology information for inter-proxy node message routing includes configuring a first proxy node as a leader service communications proxy (SCP). The method further includes configuring a plurality of second proxy nodes as worker proxy nodes. The method further includes registering the worker proxy nodes with the leader SCP. The method further includes subscribing, by the worker proxy nodes and with the leader SCP, to receive NF topology information from the leader SCP. The method further includes, at the leader SCP, receiving NF topology information from the worker proxy nodes and communicating the NF topology information to the worker proxy nodes subscribed to receive the NF topology information. The method further includes, at the worker proxy nodes, using the NF topology information to route messages to proxy nodes serving destination NFs. | 2021-04-15 |
20210111986 | PROTOCOL AND STATE ANALYSIS IN A DYNAMIC ROUTING NETWORK - A network protocol analyzer module receives one or more networking log data files, where each of the one or more networking log data files is associated with a corresponding node of a dynamic routing network comprising one or more nodes, determines a network communication protocol associated with the dynamic routing network, retrieves a set of communication protocol rules associated with the network communication protocol, analyzes the one or more networking log data files in view of the set of communication protocol rules associated with the network communication protocol, and generates a combined output file for the one or more nodes of the dynamic routing network in view of the analysis. | 2021-04-15 |
20210111987 | AUTOMATICALLY SELECTING AN OPTIMIZED COMMUNICATION CHANNEL FOR COMMUNICATIONS WITH A DEFLECT IN AN OVERLAY NETWORK - In accordance with one or more preferred implementations, an overlay network in the form of a dispersive virtual network is implemented utilizing data deflects to implement and facilitate routing in a data plane and call processing deflects to implement and facilitate routing in a control plane. Various nodes in the dispersive virtual network, such as end devices running dispersive virtual networking client software, establish communication channels to these deflects running dispersive virtual networking protocols transported by user datagram protocol (UDP) frames, transmission control protocol (TCP) streams, and hypertext transfer protocol (HTTP) streams. In accordance with one or more preferred implementations, software allows nodes in a dispersive virtual network to automatically detect the channel types that are available at the time the node must initiate a new session, and automatically configure the most efficient communication channel without requiring input from an end user or from a network administrator. | 2021-04-15 |
20210111988 | Reinforcement Learning-Based Intelligent Control of Packet Transmissions Within Ad-Hoc Networks - At a source node, a plurality of packets may be determined for transmission to a destination node in a network comprising a plurality of network nodes. A transmission rate of the plurality of packets from the source node to a neighbor node in the network may be adaptively controlled, based on a determination of a current status of the network by utilizing a plurality of parameters that are estimated via a reinforcement learning routing algorithm. The plurality of parameters include an estimated cost value representing a current cost to transmit the plurality of packets to the destination node via the network. Transmissions from intermediate nodes may also be adaptively deferred based on a determination of a current status of the network by utilizing the plurality of parameters. | 2021-04-15 |
20210111989 | SERVICE ASSURANCE OF ECMP USING VIRTUAL NETWORK FUNCTION HASHING ALGORITHM - Techniques are presented for evaluating Equal Cost Multi-Path (ECMP) performance in a network that includes a plurality of nodes. According to an example embodiment, a method is provided that includes obtaining information indicating equal cost multi-path (ECMP) paths in the network and a branch node in the network. For the branch node in the network, the method includes instantiating a virtual network function that simulates an ECMP hashing algorithm employed by the branch node to select one of multiple egress interface of the branch node; providing to the virtual network function for the branch node, a query containing entropy information as input to the ECMP hashing algorithm that returns interface selection results; and obtaining from the virtual network function a reply that includes the interface selection results. The method further includes evaluating ECMP performance in the network based on the interface selection results obtained for the branch node. | 2021-04-15 |
20210111990 | SYSTEMS AND METHODS FOR PROVIDING MULTIPLE DISJOINTED PATHS TO CORE NETWORK AT FIRST-MILE ACCESS - The present disclosure addresses single point of failure at first mile network connectivity for endpoint devices. A system includes two or more first hop nodes each providing a downstream endpoint device connectivity to a core network via a corresponding second hop node. Each first hop node is configured to determine an identifier of the corresponding second hop node; and send a message to the endpoint device to create multiple disjointed paths to the core network for the endpoint device, each message including a network identifier associated with the first hop nodes and the identifier of the corresponding second hop node, the endpoint device being configured to select at least one first hop node and the corresponding second hop node to establish a path to the core network. | 2021-04-15 |
20210111991 | Label Switched Path (LSP) protection across multiple domains of a Segment Routing (SR) network - Systems and methods for establishing path protection modes are provided. In one embodiment, a processor is configured to create a traffic policy that defines a Label Switched Path (LSP) configured to route data traffic in a unitary direction in a data plane of a telecommunications network. The LSP is configured to route the data traffic from a source router of an initial network domain to a destination router of a final network domain. The processor also creates a protection policy that defines one or more backup protection paths for routing the data traffic around one or more faulty nodes or links in a Segment Routing (SR) architecture of the telecommunications network. Furthermore, the processor distributes the traffic policy and protection policy in the telecommunication network via the Path Computation Element Protocol (PCEP). | 2021-04-15 |
20210111992 | SERVICE-BASED NODE-CENTRIC ECMP HEALTH - Techniques are presented herein for determining equal cost multi-path (ECMP) performance health in a network. In accordance with an example embodiment, a method is provided that involves obtaining information indicating ECMP paths in a network, the network comprises of a plurality of nodes that includes at least one branch node. The method includes configuring the branch node to obtain ECMP performance metrics, and obtaining the ECMP performance metrics from the branch node. The method further includes analyzing the ECMP performance metrics to determine ECMP performance health of the branch node. | 2021-04-15 |
20210111993 | SERVICE-FUNCTION CHAINING USING EXTENDED SERVICE-FUNCTION CHAIN PROXY FOR SERVICE-FUNCTION OFFLOAD - An extended service-function chain (SFC) proxy is hosted on a network node and connected to a service path formed by one or more network nodes hosting a chain of service-functions applied to packets traversing the service path. The packets each include a service header having a service path identifier and a service index. A packet of a traffic flow destined for a service-function is received from the service path and sent to the service-function. An indication to offload the traffic flow is received from the service-function. The indication is stored in a flow table having entries each identifying a respective traffic flow. A subsequent packet of the traffic flow is received from the service path. The flow table is searched for the indication to offload the traffic flow. Upon finding the indication, the service-function is bypassed, and the subsequent packet is forwarded along the service path. | 2021-04-15 |
20210111994 | ENERGY-EFFICIENT TRAFFIC SCHEDULING ALGORITHM FOR SDN DATA CENTER NETWORK BASED ON MULTI-LAYER VIRTUAL TOPOLOGY - An energy-efficient traffic scheduling algorithm based on multiple layers of virtual sub-topologies is provided. First, a mathematical optimization model for an energy-efficient traffic scheduling problem is established, to minimize network energy consumption while ensuring the capability of bearing all network data flows. Then, the mathematical optimization model is resolved using an energy-efficient traffic scheduling algorithm based on a multi-layer virtual topology, to obtain an energy-efficient scheduling scheme of the data flows. The virtual topology and switch ports in an upper layer are made dormant to save energy. The method can dynamically adjust the working state of the virtual sub-topology in the upper layer according to current link utilization. A path with a minimum number of hops and lowest maximum link utilization can be found in the booted sub-topology, to route the data flow, solving the problem that a “rich-connection” data center network has low energy resource utilization at low load. | 2021-04-15 |
20210111995 | TIME-TO-LIVE (TTL) HANDING FOR SEGMENT ROUTING PING/TRACEROUTE - An improved traceroute mechanism for use in a label-switched path (LSP) is provided by (a) receiving, by a device in the LSP, an echo request message, wherein the echo request includes a label stack having a least one label, and wherein each of the at least one label has an associated time-to-live (TTL) value; (b) responsive to receiving the echo request, determining by the device, whether or not the device is a penultimate hop popping (PHP) device for the outermost label of the label stack; and (c) responsive to determining that the device is the PHP device for the outermost label of the label stack, (1) generating an echo reply message corresponding to the echo request message, wherein the echo reply message is encoded to indicate that the device is the PHP device for the outermost label of the label stack, and (2) sending the echo reply message back towards a source of the echo request message. Responsive to receiving the echo reply message by the ingress of the LSP defined by the outermost label of the label stack, the ingress may (a) determine whether or not the received echo reply message was sourced from the PHP of the LSP defined by the outermost label of the label stack, and (b) responsive to a determination that the received echo reply message was sourced from the PHP of the LSP defined by the outermost label of the label stack, (1) generate a next echo request in which the TTL value associated with the outermost label in the label stack is increased and in which the TTL value associated with a next to outermost label, if any, in the label stack is incremented, and (2) send the next echo request message on the LSP defined by the outermost label of the label stack. | 2021-04-15 |
20210111996 | Computational accelerator for storage operations - A system includes a host processor, which has a host memory and is coupled to store data in a non-volatile memory in accordance with a storage protocol. A network interface controller (NIC) receives data packets conveyed over a packet communication network from peer computers containing, in payloads of the data packets, data records that encode data in accordance with the storage protocol for storage in the non-volatile memory. The NIC processes the data records in the data packets that are received in order in each flow from a peer computer and extracts and writes the data to the host memory, and when a data packet arrives out of order, writes the data packet to the host memory without extracting the data and processes the data packets in the flow so as to recover context information for use in processing the data records in subsequent data packets in the flow. | 2021-04-15 |
20210111997 | CENTRALIZED PATH COMPUTATION FOR INFORMATION-CENTRIC NETWORKING - This disclosure describes techniques for implementing centralized path computation for routing in hybrid information-centric networking protocols implemented as a virtual network overlay. A method includes receiving an interest packet header from a forwarding router node of a network overlay. The method further includes determining an interest path of the interest packet and one or more destination router nodes of the network overlay. The method further includes computing one or more paths over the network overlay. The method further includes determining an addressing method for the one or more computed paths over the network overlay. The method further includes performing at least one of encoding each computed path in a data packet header, and encoding each computed path as state entries of each router node of the network overlay on each respective path. The method further includes returning the computed path information to the forwarding router node. | 2021-04-15 |
20210111998 | SYSTEM, APPARATUS AND METHOD FOR PROVIDING A VIRTUAL NETWORK EDGE AND OVERLAY WITH VIRTUAL CONTROL PLANE - A network system is provided between at least a first client site and a second client site. A client site network component is implemented at least at the first client site, the client site network component aggregating one or more diverse network connections so as to configure an aggregated connection that has increased throughput. At least one network server component may be configured to connect to the client site network component using the aggregated connection. A cloud network controller may be configured to manage the data traffic and a virtual edge providing transparent lower-link encryption for the aggregated connection between the client site network component and the network server component. The network server component includes a virtual control plane interface configured to establish a unicast path between the network server component and each of a plurality of re-mote network server components. | 2021-04-15 |
20210111999 | IN-SITU PASSIVE PERFORMANCE MEASUREMENT IN A NETWORK ENVIRONMENT - Techniques for in-situ passive performance measurement are described. In one embodiment, a method includes receiving a data packet at a first network element, determining whether measurement information is to be collected for the data packet, providing one or more measurement fields for the data packet based on a determination that measurement information is to be collected for the data packet in which at least one measurement field identifies a measurement type, and forwarding the data packet to a second network element. The method further includes determining, by the second network element, the measurement type for the data packet, and performing one or more actions based on the measurement type. | 2021-04-15 |
20210112000 | SYSTEMS AND METHODS FOR FORMING ON-PREMISE VIRTUAL PRIVATE CLOUD RESOURCES - A packet forwarding network may include spine and leaf switches that forward network traffic between end hosts. The packet forwarding network may be implemented on multiple network racks in a rack-based system. A controller may control the underlying spine and leaf switches to form on-premise virtual private cloud (VPC) resources. In particular, the controller may form enterprise VPC (EVPC) tenants, each having a virtual router that performs routing between different segments within the corresponding EVPC tenant. The different segments may separately include web, application, and database servers, as end hosts. The controller may form a system VPC tenant having a virtual system router that performs routing between different EVPC tenants. A segment in an internal VPC tenant formed by the controller and/or an external VPC tenant formed by the controller may provide external network access for one or more of the EVPC tenants. | 2021-04-15 |
20210112001 | COMMUNICATION METHOD AND COMMUNICATIONS APPARATUS - A communication method includes: determining, based on first indication information and second indication information, a transmit end and a receive end that communicate with each other by using a data flow, to indicate that a first device is the transmit end and the second indication information is used to indicate that a second device is the receive end, or to indicate that the first device is the receive end and the second indication information is used to indicate that the second device is the transmit end; obtaining, bandwidth information of the data flow; and sending, data flow information and the bandwidth information to indicate at least one of a port identifier of the transmit end and a port identifier of the receive end, and the port identifier of the transmit end, the port identifier of the receive end, and the bandwidth information are used to create the data flow. | 2021-04-15 |
20210112002 | RECEIVER-BASED PRECISION CONGESTION CONTROL - Examples described herein relate to a network agent, when operational, to: receive a packet, determine transmit rate-related information for a sender network device based at least on operational and telemetry information accumulated in the received packet, and transmit the transmit rate-related information to the sender network device. In some examples, the network agent includes a network device coupled to a server, a server, or a network device. In some examples, the operational and telemetry information comprises: telemetry information generated by at least one network device in a path from the sender network device to the network agent. | 2021-04-15 |
20210112003 | NETWORK INTERFACE FOR DATA TRANSPORT IN HETEROGENEOUS COMPUTING ENVIRONMENTS - A network interface controller can be programmed to direct write received data to a memory buffer via either a host-to-device fabric or an accelerator fabric. For packets received that are to be written to a memory buffer associated with an accelerator device, the network interface controller can determine an address translation of a destination memory address of the received packet and determine whether to use a secondary head. If a translated address is available and a secondary head is to be used, a direct memory access (DMA) engine is used to copy a portion of the received packet via the accelerator fabric to a destination memory buffer associated with the address translation. Accordingly, copying a portion of the received packet through the host-to-device fabric and to a destination memory can be avoided and utilization of the host-to-device fabric can be reduced for accelerator bound traffic. | 2021-04-15 |
20210112004 | APPARATUS AND METHOD FOR FORWARDING A PACKET IN CONTENT CENTRIC NETWORK - Disclosed herein are a packet forwarding method and a node in a content centric network. The node constituting a content centric network may perform packet forwarding by including: a plurality of interfaces configured to receive and transmit an interest packet and a data packet for a plurality of remote nodes, a pending interest table (PIT) for storing information on a local interest packet, among non-responded interest packets, of which its source network or destination network corresponds to the network in which the corresponding node is located, a tag table for storing information on a transit interest packet group associated with a source network, among non-responded interest packets, of which a source network and a destination network are not the network in which the corresponding node is located, a forwarding information base (FIB) for forwarding an interest packet to a destination node and a processor for selecting the PIT or the tag table, when packet forwarding, according to whether the packet is a local packet or a transit packet, and for performing packet forwarding based on the selected table. | 2021-04-15 |
20210112005 | SOFTWARE DEFINED NETWORKING (SDN) CONTROLLER ORCHESTRATION AND NETWORK VIRTUALIZATION FOR DATA CENTER INTERCONNECTION - A data center interconnection (DCI) network may comprise a data center controller (DCC) managing a plurality of data centers (DCs) interconnected by a provider network managed by a network provider controller (NPC). The provider network may be an OpenFlow based software defined networking (SDN) transport network. The DCC may initiate a virtual network service (VNS) negotiation with the NPC to connect the DCs and may specify a network abstraction granularity level. The NPC may respond by computing paths through the provider network accordingly and providing the DCC with one or more virtual networks (VNs). The DCC may compute virtual paths through the VNs and send virtual network element (VNE) connection setup commands to the DCC. The DCC may convert the VNE connection setup commands into network element (NE) commands to setup connections in NEs of the provider network. The DCC and the NPC may perform fault monitoring, detection, and recovery. | 2021-04-15 |
20210112006 | APPLICATION-BASED QUEUE MANAGEMENT - Various example embodiments for supporting queue management in communication systems are presented. Various example embodiments for supporting queue management in communication systems may be configured to support application-based queue management. Various example embodiments for supporting application-based queue management may be configured to support application-based congestion control. Various example embodiments for supporting application-based congestion control may be configured to support application-based congestion control based on use of trigger templates. | 2021-04-15 |
20210112007 | MESSAGE PROCESSING METHOD AND APPARATUS, AND STORAGE MEDIUM - Disclosed is a message processing method, including: constructing, by a control plane device, a first proxy processing table based on a first type of message and a processing manner for the first type of message, and sending the first proxy processing table to a forwarding plane device, the first proxy processing table being configured for indicating a processing manner for the first type of message by the forwarding plane device; receiving, by the forwarding plane device, the first proxy processing table, and processing a received first message based on the first proxy processing table. A message processing apparatus, and a storage medium are further provided. | 2021-04-15 |
20210112008 | NETWORK LATENCY OPTIMIZATION - The centralized control capability of Software Defined Networking (SDN) presents a unique opportunity for enabling Quality of Service (QoS) routing. For delay sensitive traffic flows, a QoS mechanism efficiently computes path latency and minimizes a controller's response time. At the core of the challenges is how to handle short term network state fluctuations in terms of congestion and latency while guaranteeing the end-to-end latency performance of networking services. The disclosed technology provides a systematic framework that considers active link latency measurements, efficient statistic estimate of network states, and fast adaptive path computation. The disclosed technology can be implemented, for example, as an SDN controller application, and can find optimal end-to-end paths with minimum latency and significantly reduce the control overhead. | 2021-04-15 |
20210112009 | NETWORK MANAGEMENT APPARATUS AND METHOD - A network management method includes: collecting information on performance and a configuration of a network from a network device and respective nodes that constitute the network; estimating, based on the collected information, a path in the network for each communication executed between the nodes via the network; determining, based on an estimated result of the path of each communication, whether deviation exists in the paths used for communications in the network, and determining whether an overload occurs in the network; and determining, based on a determination result of whether the deviation exists in the paths and a determination result of whether the overload occurs, control content for the corresponding node, and controlling the node in accordance with a determined result. | 2021-04-15 |
20210112010 | SYSTEM AND METHOD FOR MONITORING AND MANAGING VIDEO STREAM CONTENT - A system and method for managing and monitoring video stream content. The method including: receiving a traffic flow; determining if the traffic flow is a video streaming traffic flow; if the traffic flow is a video streaming traffic flow; determine at least one attribute associated with the video streaming traffic flow; determine a probability that the traffic flow is fraudulent based on a heuristic analysis of the at least one associated attribute; if the probability is above a predetermined threshold, flag the traffic flow as a fraudulent video streaming traffic flow, otherwise allow the traffic flow to proceed to its destination without being flagged; if the traffic flow is not a video streaming traffic flow, allow the traffic flow to proceed to its destination. | 2021-04-15 |
20210112011 | EMPLOYING MACHINE LEARNING TO PREDICT AND DYNAMICALLY TUNE STATIC CONFIGURATION PARAMETERS - A system and method for dynamically altering static parameters on a live network device is disclosed. The system includes a live network device having a plurality of parameters configured thereon that control the application of services to subscriber packet flows and a machine learning device operable to monitor the subscriber packet flows and apply a machine learned model to identify patterns in the monitored subscriber pack flows. The machine learning device is further operable to dynamically alter at least one of the plurality of parameters on the network device based upon the patterns in the monitored subscriber packet flows. | 2021-04-15 |
20210112012 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING GUARANTEED TRAFFIC BANDWIDTH FOR SERVICES AT INTERMEDIATE PROXY NODES - A method for providing guaranteed minimum intermediate proxy node bandwidth for services includes configuring, at an intermediate proxy node, a guaranteed minimum bandwidth of the intermediate proxy node reserved to process messages associated with a service. The method further includes receiving a first message at the intermediate proxy node. The method further includes determining, by the intermediate proxy node, that the intermediate proxy node is in an overloaded state. The method further includes identifying, by the intermediate proxy node, the first message as being associated with the service for which the guaranteed minimum bandwidth is configured. The method further includes determining, by the intermediate proxy node, that a portion of the guaranteed minimum bandwidth for the service is available to process the first message. The method further includes routing, by the intermediate proxy node and to a producer network function (NF) that provides the service, the first message and updating a message count for the service. | 2021-04-15 |
20210112013 | MESSAGE BROKER SYSTEM WITH PARALLEL PERSISTENCE - A method and messaging system comprising a master broker computer system, a plurality of slave broker computer systems, and a plurality of event stores, for a broker computer system to change its status from a slave broker computer system to a master broker computer system. | 2021-04-15 |
20210112014 | APPARATUS FOR PROCESSING BIOMEDICAL SIGNALS FOR DISPLAY - Apparatus and methods remove a voltage offset from an electrical signal, specifically a biomedical signal. A signal is received at a first operational amplifier and is amplified by a gain. An amplitude of the signal is monitored, by a first pair of diode stages coupled to an output of the first operational amplifier, for the voltage offset. The amplitude of the signal is then attenuated by the first pair of diode stages and a plurality of timing banks. The attenuating includes limiting charging, by the first pair of diode stages, of the plurality of timing banks and setting a time constant based on the charging. The attenuating removes the voltage offset persisting at a threshold for a duration of at least the time constant. Saturation of the signal is limited to a saturation recovery time while the saturated signal is gradually pulled into monitoring range over the saturation recovery time. | 2021-04-15 |
20210112015 | ARBITER WITH RANDOM TIE BREAKING - Candidates for selection in a weighted arbitration system are assigned priority weights and random weights. The winning candidate is determined using a tree of selectors such as a comparators. At each stage of the tree, the candidate having the greatest priority weight is selected to pass to the next stage. If multiple candidates are tied for the greatest priority weight, the candidate having the greatest random weight is selected to pass to the next stage. | 2021-04-15 |
20210112016 | TRANSFER APPARATUS, TRANSFER METHOD, AND TRANSFER PROGRAM - A transfer apparatus include a distribution unit, a storage unit, and a transfer unit, in which the distribution unit is configured to identify a plurality of networks to which frames belong, distribute the frames for each of the networks based on an identification result, and store the distributed frames in the storage unit, the storage unit is configured to store information of a time at which a frame of the frames is stored in the storage unit and the frame in association with each other, and the transfer unit is configured to detect a period of time for which the frame stays in the storage unit, detect a remaining period to send which is a remaining time of a time for which the frame is permitted to stay in the storage unit, for each of the frames, based on a difference between the time for which the frame stays in the storage unit and the delay upper limit value, and output the frame to a predetermined apparatus based on the remaining period to send. | 2021-04-15 |
20210112017 | DYNAMIC MONITORING AND MIGRATION OF APPLICATIONS - An example branch gateway includes processing circuitry and a memory including instructions that cause the branch gateway to perform various functions. The various functions include determining a first uplink health threshold, determining a second uplink health threshold, calculating migration thresholds for a set of non-critical applications, determining that a QoS threshold of a critical application is likely to be imminently breached, selecting a least critical application, based on the migration threshold of the least critical application, and migrating the least critical application from the first uplink to a second uplink. | 2021-04-15 |
20210112018 | CROSS POINT SWITCH OF NETWORK DEVICE FOR REORDERING LANES OF NETWORK INTERFACES - Some embodiments provide a network device that may receive alignment information at each physical connection of a network interface of the network device. Each alignment information includes a unique value for identifying a unique logical lane associated with the corresponding physical connection. The network device may determine the order of the unique logical lanes associated with the several physical connections based on the received alignment information. The network device may configure a cross point switch of the network device to reorder the physical connections so that the unique logical lanes associated with the physical connections are ordered according to a defined order. | 2021-04-15 |
20210112019 | METHOD AND APPARATUS FOR IMPROVED DATA TRANSFER IN BIG DATA GRAPH ANALYTICS - Embodiments of an interconnect apparatus advantageously useful in handling Big Data Graph Analytics enable improved signal integrity, even at high clock rates, increased bandwidth, and lower latency. In an interconnect apparatus for core arrays a sending processing core can send data to a receiving core by forming a packet whose header indicates the location of the receiving core and whose pay load is the data to be sent. The packet is sent to a Data Vortex switch described herein and in the patents incorporated herein. The Data Vortex switch is on the same chip as an array of processing cores and routes the packet to the receiving core first by routing the packet to the processing core array containing the receiving processing core. The Data Vortex switch then routes the packet to the receiving processor core in a processor core array. Since the Data Vortex switches are not crossbar switches, there is no need to globally set and reset the Data Vortex switches as different groups of packets enter the switches. Mounting the Data Vortex switch on the same chip as the array of processing cores reduces the power required and reduces latency. | 2021-04-15 |
20210112020 | MULTICAST TRAFFIC CONTROL IN HYBRID NETWORKS CONTAINING BOTH SOFTWARE DEFINED NETWORKING DOMAINS AND NON-SDN IP DOMAINS - A Software Defined Networking (SDN) controller controls multicast traffic in an SDN domain and one or more non-SDN domains imbedded in the SDN domain. | 2021-04-15 |
20210112021 | COMPUTER-IMPLEMENTED METHOD AND A COMPUTER SYSTEM FOR IMPROVING PERFORMANCE OF A SERVICE REPRESENTATIVE - A computer-implemented method for improving performance of a service representative that provides services. The method comprises determining a performance indicator representing performance of the service representative and if the performance indicator meets a condition, starting a computing process on a computing device to interact with the service representative in order to improve the performance of the service representative. | 2021-04-15 |
20210112022 | Automatic Action Responses - Systems and methods are provided that automatically process message input and provide action responses according to the processing results. The automatic action response system may leverage at least one machine-learning algorithm that is trained using a dataset. The provided action responses may comprise of default action responses and/or intelligent action responses that are based at least in part on prior conversational data between a user and a sender. Some intelligent action responses may include text-based replies, which eliminate the need for a user to type a reply on a device screen, thereby saving previous time, conserving device battery life, and preserving the integrity of the device hardware. A portion of a message may be highlighted manually by a user or automatically by the action response system to initiate the automatic action response system. In this way, a more efficient and productive user experience across various devices and applications is achieved. | 2021-04-15 |
20210112023 | METHODS, MEDIA AND COMPUTING DEVICES FOR IMPLEMENTING INSTANT MESSAGING SYSTEM BASED ON BLOCKCHAIN - An instant messaging system based on blockchain includes: a central node and at least two domain instant messaging servers. The central node includes a management node and a blockchain node. Information about a user is stored in the blockchain node. The at least two domain instant messaging servers correspond to at least two instant messaging applications, respectively. A method for implementing the instant messaging system is implemented at the central node, and includes performing, in response to a request from the domain instant messaging server, a corresponding operation or providing corresponding information about a user to the domain instant messaging server. The central node establishes a communication connection with a plurality of domain instant messaging servers, such that each domain instant messaging server can send respectively data to the central node to realize a data sharing, and an interaction between different domain instant messaging servers. | 2021-04-15 |
20210112024 | Email Fraud Prevention - A mail transfer agent comprises processing circuitry, storage circuitry, and networking circuitry. The storage circuitry holds a database. The networking circuitry is operable to receive, via a network connection, an email message. The processing circuitry is operable to analyze the email message to detect an image present in the email message. The processing circuitry is operable to determine, based on one or more records of the database, that the detected image is associated with a particular brand, and process the email message based on whether one or more characteristics of the email message are associated with the particular brand in the database. The one or more characteristics of the email message may comprise one or more of: sender domain, sender subdomain, and sender IP address. | 2021-04-15 |
20210112025 | METHOD AND SERVER FOR PROCESSING MESSAGES - A method for processing messages can include: detecting a user input operation, and determining a second client, whose messages are to be deleted, in a target group; sending a delete request to a server, wherein the delete request includes an ID of the target group and an ID of the second client, and the server is configured to acquire an ID of a target message based on the delete request and send a delete instruction to a third client, the third client is configured to delete the target message based on the delete instruction, and the delete instruction includes the ID of the target message; wherein the target message is sent by the second client in the target group, and the first client, the second client, and the third client belong to the target group. | 2021-04-15 |
20210112026 | SYSTEMS AND METHODS FOR TEMPORARILY POSTPONING MESSAGES - A system and method for postponing an electronic message displayed for a user of a computing device. Postponement options are displayed for the user. Display of the electronic message at the computing device is inhibited based on received user input. One option enables a user to repeat the most recently selected postponement option. Another option postpones the electronic message until the computing device is at a user-designated location. Some postponement options are generated according to context of the electronic message, such as the content of the electronic message, the date or time when the user requested the postponement, or prior history of user-selected postponements. Some options are based on a sampling of postponement options selected by a plurality of users. | 2021-04-15 |
20210112027 | METHOD AND A DEVICE FOR PROCESSING INFORMATION - An embodiment of the present disclosure discloses a method, which comprises: in response to detecting an operation of triggering a hosted application in a hosted application set of a target chat session of a host application by a user in the target chat session through an interface of the target chat session, generating a chat message based on identification information of the triggered hosted application; sending the generated chat message to a server, so that the server sends the chat message to at least one user in the target chat session, and the chat message can be triggered to initiate the triggered hosted application; and displaying the chat message on the interface of the target chat session. This embodiment enables the hosted application to be used as a functional control of the target chat session, which facilitates operating the hosted application in a user group at a client. | 2021-04-15 |
20210112028 | RELAY DEVICE, NETWORK SYSTEM, AND NETWORK CONTROL METHOD - A network system according to the present invention includes: a server that provides a content to a communication terminal; a relay device that establishes a connection with the server; and a DNS server that stores an IP address of the server. When accepting an inquiry of the IP address of the server being a providing source of the content from the communication terminal, the relay device inquires the IP address from the DNS server, and performs in parallel processing of transmitting the IP address received in response to the inquiry to the communication terminal, and processing of establishing a connection with the server assigned the IP address. | 2021-04-15 |
20210112029 | INTELLIGENTLY ROUTING A RESPONSE PACKET ALONG A SAME CONNECTION AS A REQUEST PACKET - A first edge server of multiple edge servers of a distributed edge computing network receives a request from a client device regarding a resource hosted at an origin server according to an anycast implementation. The first edge server modifies the request to include identifying information for the first edge server prior to sending the request to the origin server. The origin server responds with a response packet that includes the identifying information of the first edge server. Instead of routing the response packet to the client device directly, one of the multiple edge servers receives the response packet due to the edge servers each having the same anycast address. If the edge server that receives the response packet is not the first edge server, that edge server transmits the response packet to the first edge server, who processes the response packet and transmits the response packet to the client device. | 2021-04-15 |
20210112030 | SYSTEMS AND METHODS FOR DISCOVERY OF BRAND-REGISTERED DOMAIN NAMES - Taking a zero-configuration approach, a domain name discovery system utilizes, in an iterative process, WHOIS data and infrastructure data for a seed domain to automatically discover domain names having registration and/or infrastructure details that match those of the seed domain. Registration information such as a registered email address associated with a domain name discovered through WHOIS data matching or infrastructure data matching is utilized in a reverse lookup for domain names having infrastructure or WHOIS registered information that fully matches the information associated with the domain name discovered through the iterative process. Domain names discovered through WHOIS data matching, infrastructure data matching, and reverse lookup can be presented through a user interface on a client device communicatively connected to the domain name discovery system over a network. The domain name discovery can be performed periodically or in near real time responsive to receiving a new seed domain. | 2021-04-15 |
20210112031 | NAMING SMART DEVICES - A computer implemented method of naming a smart wireless device includes detecting a first other wireless device, determining that the first other wireless device is likely in a same area of an environment, obtaining a first name of the first other wireless device, and generating a name for the smart wireless device as function of the first name of the first other wireless device in response to the first other wireless device having been determined to be in the same area of the environment. | 2021-04-15 |
20210112032 | System of a Distributed Web Application Firewall Cluster - A system, method, and computer-readable medium are disclosed for management of a distributed web application firewall (WAF) cluster that supports one or more protected applications. A WAF cluster infrastructure is configured for the protected applications. The WAF cluster includes one or more WAFs that are used to route traffic directed to the protected applications. The WAF cluster infrastructure is validated as to be current and updated. The validated WAF cluster infrastructure is then used as routing service. | 2021-04-15 |
20210112033 | SYSTEM, APPARATUS AND METHOD FOR PROVIDING A UNIFIED FIREWALL MANAGER - A network system is provided between at least a first client site and a second client site, the first and the second client site are at a distance from one another. A client site network component is implemented at least at the first client site, the client site network component bonding or aggregating one or more diverse network connections so as to configure a bonded/aggregated connection that has increased throughput. At least one network server component may be configured to connect to the client site network component using the bonded/aggregated connection. A cloud network controller may be configured to manage the data traffic and a virtual edge providing transparent lower-link encryption for the bonded/aggregated connection between the client site network component and the network server component. | 2021-04-15 |
20210112034 | DYNAMIC DISCOVERY OF PEER NETWORK DEVICES ACROSS A WIDE AREA NETWORK - A network controller can register WAN edge routers and WAN optimizers distributed across a WAN. The controller can receive a request to establish a WAN optimized connection between first and second hosts. The controller can identify a first WAN optimizer to perform first services (e.g., de-duplication, compression, application acceleration, caching, etc.) for first traffic from the first host to the second host and first complementary services for second traffic from the second host to the first host, and a second WAN optimizer for the second traffic and second complementary services for the first traffic. The controller can establish the optimized connection comprising a first path including the first host, WAN optimizer, and router; a second path including the first router and a second router, and a third path including the second router, WAN optimizer, and host. The controller can route the first and second traffic through the optimized connection. | 2021-04-15 |
20210112035 | APPARATUS AND METHOD FOR SECURE COMMUNICATION OVER RESTRICTED NETWORK - A method of communicating with a remote server via a client, the method comprises the steps of: allowing encapsulated data to be transmitted from the client and towards a remote server via a VPN; attempting to gain access to, or to increase access to, a private network with unencapsulated data and outside of the VPN; identifying a captive portal that restricts access to the private network; allowing receipt of signaling with unencapsulated data outside of the VPN that causes an authentication server associated with the captive portal to permit access or increase access to the private network; and transmitting encapsulated data from the client to the remote server via the VPN and over the private network after the authentication server grants access to the private network. | 2021-04-15 |
20210112036 | MULTIPOINT MESH VIRTUAL PRIVATE NETWORK (MMVPN) - The disclosure is directed to a method and system including a first node that stores a first multipoint mesh VPN database including a plurality of underlay addresses in an underlay network for a plurality of nodes, respectively, and a plurality of VPN addresses in a multipoint mesh VPN for the plurality of nodes, respectively. The first node also receives a second multipoint mesh VPN database from a second node, the second multipoint mesh VPN database including underlay and VPN addresses for the third node. The first node further receives a third multipoint mesh VPN database from the third node, the third multipoint mesh VPN database including underlay and VPN addresses for the second node. The first node additionally compares the databases to determine if underlay addresses and VPN addresses are missing from the first multipoint mesh VPN database. | 2021-04-15 |
20210112037 | ELECTRONIC APPARATUS AND CONTROL METHOD THEREOF - An electronic apparatus and a method of controlling the same are provided. The electronic apparatus includes a camera configured to capture an image, a communication interface, a memory configured to store at least one instruction, and a processor configured to obtain characteristics information of a user based on the image; based on the characteristics information of the user being obtained, identify whether first information corresponding to the characteristics information is stored in the memory; based on the corresponding first information not being stored in the memory, generate identification information corresponding to the characteristics information of the user, perform mapping of the characteristics information and the identification information of the user and store in the memory; and transmit the characteristics information and the identification information of the user to a second electronic apparatus. | 2021-04-15 |
20210112038 | PRIVACY-PRESERVING MACHINE LEARNING - A computer-implemented method of instantiating a machine learning model with a host processing system is provided. The host processing system includes a trusted execution environment (TEE) and an untrusted processing system (UPS). The method includes: preparing, with the host processing system, a compiler encoding an architecture of the machine learning model; receiving, from a client processing system, source data; and producing, with the compiler, software based on the received source data and model parameters stored on the host processing system. The software includes an untrusted software component for performance on the UPS and a trusted software component for performance on the TEE. The untrusted software component and the trusted software component are configured to, when performed in concert, instantiate the machine learning model. | 2021-04-15 |
20210112039 | SHARING OF ENCRYPTED FILES WITHOUT DECRYPTION - A method comprises receiving a second set of devices' public keys; authenticating the received second devices' public keys; creating subshares of a plurality of encrypted key shards stored in a file, the plurality of encrypted key shards based on a first device's symmetric key such that the symmetric key can be reconstituted from the plurality of key shards, the plurality of encrypted key shards encrypted, respectively, with public keys of a first set of devices including the first device; encrypting the subshares with the second set of devices' public keys; and storing the encrypted subshares on one more non-transitory memory devices. | 2021-04-15 |
20210112040 | ENCRYPTED SERVER NAME INDICATION INSPECTION - A method, system, and computer-usable medium are disclosed for: (i) determining if a server response from a server received at a security device and intended for a client includes original encryption key information for encrypting identifying information associated with the server; (ii) if the server response includes original encryption key information for encrypting identifying information associated with the server, determining if a network policy provides for decryption of identifying information associated with the server; and (iii) if the network policy provides for decryption of identifying information associated with the server, replacing the original encryption key information with modified encryption key information associated with the security device and communicating the server response to the client with the modified encryption key information associated with the security device. | 2021-04-15 |
20210112041 | DYNAMIC OFFLINE ENCRYPTION - A method for encrypting data when a device is offline is disclosed. In the method, a determination is made as to whether a successful connection with a remote server computer can or cannot be made. If a connection cannot be made, then data can be encrypted with an ephemeral public key. Later, then a connection is available, the encrypted data can be transmitted to the remote server computer for processing. | 2021-04-15 |