Balancing Multi-link Operation (MLO) usage may be provided. A list of a plurality of Access Points (APs) for each of a plurality of Multi-link Operation (MLO) types indicating availability of each of the plurality of APs may be received. A first request indicating an MLO type associated with the first request is a first MLO type may be received. In response to the first request, a first subset of the list of the plurality of APs that support the MLO type associated with the first request may be sent. A second request indicating that an MLO type associated with the second request is the first MLO type may be received. In response to the second request, a second subset of the list of the plurality of APs that support the MLO type associated with the second request may be sent. The first subset is different from the second subset.
In one embodiment, a device may obtain sensor measurements from an environmental sensor of an access point. The device may obtain traffic telemetry data regarding network traffic handled by the access point. The device may generate, based on the sensor measurements and the traffic telemetry data, a sampling configuration of the environmental sensor of the access point. The device may cause the access point to collect additional sensor measurements from its environmental sensor according to the sampling configuration.
A method for routing is disclosed. The method comprises provisioning an endpoint in a network with a reactive path selection policy; monitoring, by the endpoint, current conditions relating to various paths available to said end point for the transmission of traffic; and selectively applying, by the endpoint, at least a portion of the reactive path selection policy based on the current conditions of the available paths.
Automatically changing Access Point (AP) system configurations for Power over Ethernet (PoE) adaptation and Radio Frequency (RF) power improvement on band edge channels, particularly for Wireless Local Area Networks (WLAN) may be provided. A PoE budget for an AP may be determined. Then, an evaluation of inputs associated with the AP may be performed. The evaluation may include determining an entity input from an entity associated with the AP, determining a client input from a client interfacing with the AP, and/or determining a device input from the AP. Next, a configuration of the AP may be determined based on the PoE budget and the entity input, the client input, and/or the device input. The operation of the AP may be altered based on the configuration.
H04W 52/34 - TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
5.
SYSTEM AND METHOD FOR INTERNET PROTOCOL ADDRESS RESOLUTION VIA CONTROL PLANE
Systems, methods and computer-readable storage media are provided for performing Internet Protocol (IP) address resolution within a network through a control plane or network controller approach. A provider edge (PE) device receives an Address Resolution Protocol (ARP) request message from a locally connected customer edge (CE) device. The PE device transmits the ARP request message to other locally connected CE devices and generates an IP address resolution request message that includes the IP address of a destination CE device. The IP address resolution request message is transmitted to other PE devices within the network. The PE device receives remote adjacency information associated with the destination CE device and transmits an ARP reply message to the locally connected CE device.
H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
A system includes a millimeter (MM) wave radar detector, where the MM wave radar detector generates signal data associated with a person of interest (POI) within a field of view of the MM wave radar detector. The system further includes an Access Point (AP) coupled with the MM wave radar detector. The AP includes a computing device to receive and analyze the signal data provided by the MM wave radar detector to determine a movement of the POI within an environment, and facilitate generation of a feedback response in response to the determined movement or action of the POI within the environment.
In one embodiment, a method by an apparatus of a Border Gateway Protocol (BGP) network includes accessing an attestation token for the apparatus. The method further includes encoding the attestation token in a BGP signaling message. The method further includes sending the BGP signaling message with the encoded attestation token to a second apparatus of the BGP network.
A method is provided to compensate for differential delay among a plurality of paths between first and second nodes in a network. The method may involve measuring delay for each of the plurality of paths for a plurality of sub-flows transmitted between the first node and the second node on respective paths of the plurality of paths. The plurality of sub-flows are obtained by splitting a traffic flow. The method involves determining delay differences among the delay for each of the plurality of paths, and adjusting, based on the delay differences, a queue delay associated with a respective flow of the plurality of sub-flows on one or more of the plurality of paths to achieve a path delay that is equal to a target path delay for each of the plurality of paths.
Presented herein are techniques to process an image for a video conference. A method includes obtaining an image from a camera, identifying a first person and a second person in the image, labeling pixels in the image belonging to the first person and to the second person, determining a first distance between the first person and the camera and a second distance between the second person and the camera, and based on the first distance and the second distance, selectively removing or blurring at least one of the first person and the second person from the image, before transmitting the image to an endpoint of a video conference, by manipulating the pixels in the image belonging to the at least one of the first person and the second person.
Systems, methods, and computer-readable media are disclosed for validating multiple paths used for routing network traffic in a network. In one aspect, a network controller can identify one or more intermediate nodes on each of multiple paths in a network, wherein the multiple paths begin at a first network node and end at a last network node. The network controller can further generate a data packet with a label at the first network node, forward the test data packet from the first network node, along each of the one or more intermediate nodes, to the last network node, and perform a data plane validation process for validating packet forwarding from the first network node to the last network node based on the label(s) by determining if a number of the multiple paths equals to a number of packets received at the last network node.
Techniques for managing migrations of QUIC connection session(s) across proxy nodes, data centers, and/or private application nodes are described herein. A global key-value datastore, accessible by proxy nodes and/or application nodes, may store mappings between a first QUIC connection, associated with a proxy node and a client device, on the frontend of the proxy node and a second QUIC connection, associated with the proxy node and an application node, on the backend of the proxy node. With the global key-value datastore being accessible by the proxy nodes, when a proxy node receives a QUIC packet on the front end or the back end, the proxy node may determine where to map this connection to on the opposite end. Additionally, with the global key-value datastore being accessible to the application nodes, when an application node receives a QUIC packet, the application node may determine the client device associated with the connection.
H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
H04L 67/101 - Server selection for load balancing based on network conditions
H04L 67/1012 - Server selection for load balancing based on compliance of requirements or conditions with available server resources
In part, the disclosure relates to an optical coupler. The optical coupler may include two ridge waveguides that include a first waveguide and a second waveguide. One or more segments of the two waveguides extend over a coupling length or other distance. One or more sections of each ridge waveguide is at least partially defined by a set of cross-sectional profiles, a plurality of sections of each ridge waveguide have a width that tapers along a length of the two ridge waveguides. Within the coupling length, a subset of the set of cross-sectional profiles may define a first pair of transition regions and a second pair of transition regions. The coupler may include a coupling region between the two ridge waveguides and spanning at least a section of the coupling length.
G02B 6/12 - Light guides; Structural details of arrangements comprising light guides and other optical elements, e.g. couplings of the optical waveguide type of the integrated circuit kind
13.
STABLE BALANCING OF MULTI-LINK OPERATION (MLO) USAGE IN CROWDED SPACE
Balancing Multi-link Operation, MLO, usage is provided. A list of a plurality of Access Points, APs, for each of a plurality of Multi-link Operation, MLO, types indicating availability of each of the plurality of APs is received (310). A first request indicating an MLO type associated with the first request is a first MLO type is received (320). In response to the first request, a first subset of the list of the plurality of APs that support the MLO type associated with the first request is sent (330). A second request indicating that an MLO type associated with the second request is the first MLO type is received (340). In response to the second request, a second subset of the list of the plurality of APs that support the MLO type associated with the second request is sent (350). The first subset is different from the second subset.
Symmetric networking techniques disclosed herein can be applied by gateway routers in cloud networks. The techniques can ensure that both outbound traffic received at a cloud from a branch device and return traffic directed from the cloud back to the branch device are processed by a same gateway router. The gateway router can use network address translation to insert IP addresses from an inside pool and an outside pool assigned to the router.
A system and method for providing network and port address translation is provided. A global IP address and a block (chunk) of ports are allocated for each mobile subscriber (MS) on first data connection. Subsequent data connections from the same MS are assigned the same IP address and a new port from this block. The mapping information is communicated, processed, and stored once for the complete block, instead of for every new data connection. This process reduces processing, communication, and storage requirements.
H04L 61/503 - Internet protocol [IP] addresses using an authentication, authorisation and accounting [AAA] protocol, e.g. remote authentication dial-in user service [RADIUS] or Diameter
H04L 61/2514 - Translation of Internet protocol [IP] addresses between local and global IP addresses
H04L 61/2517 - Translation of Internet protocol [IP] addresses using port numbers
H04L 61/2521 - Translation architectures other than single NAT servers
H04L 61/2567 - NAT traversal for reachability, e.g. inquiring the address of a correspondent behind a NAT server
H04L 61/2575 - NAT traversal using address mapping retrieval, e.g. simple traversal of user datagram protocol through session traversal utilities for NAT [STUN]
Techniques to eliminate duplicate packets from a stream of packets. A method includes receiving a packet, hashing elements of the packet to obtain a packet partial signature, generating an action data value by appending, to the packet partial signature, unhashed packet information, accessing a hash store location in a hash store based on the action data value, determining, based on data stored at the hash store location, whether the packet is a duplicate of a previously-received packet, and based on whether the packet is a duplicate of a previously-received packet, one of allowing and preventing one of the packet and a copy of the packet to reach a downstream network node.
Techniques for orchestrating a workflow for configuring a computer networking environment or other complex workflows are described. A Directed Acyclic Graph (DAG) that defines a plurality of tasks to be executed to complete the workflow and a plurality of orders between the tasks is received. Embodiments generate a State-Machine Neural Network (SNN) based on the received DAG, by generating a plurality of SNN neurons for the SNN, based on the plurality of tasks within the received DAG and generating a plurality of SNN connections for the SNN, connecting pairs of SNN neurons within the plurality of SNN neurons, based on the plurality of connections within the received DAG. The SNN is executed to orchestrate the workflow by sending and receiving signals to and from the SNN neurons.
Techniques for virtualizing tenant transport interfaces configured to implement per-tenant network routing attribute differentiation in each tenant overlay of a multisite wide area network (WAN) and share the virtual transport interfaces between multi-tenant edge (MTE) devices providing transport services to tenant devices based on a defined tenant tier model. A Software-Defined Networking (SDN) controller may receive a physical transport interface and/or a device type associated with a tenant device. The SDN controller may determine a virtual transport interface for the tenant device based on a tier associated with the tenant. MTE device(s) may utilize the physical transport interface to establish sessions with other MTE device(s) in the WAN. The virtual transport interface may be utilized by MTE devices to implement and/or enforce network routing attributes when forwarding network traffic associated with the tenant via the sessions established between the MTE devices through the WAN.
A system and a method to dynamically reprovision network devices may include a first network device configured to reprovision a second network device in accordance with a specific location of the second network device in a predefined area. The first network device may be configured to sense the second device at the specific location in the predefined area, identify reprovisioning parameters associated with the specific location, and provide the reprovisioning parameters to the second network device. In turn, the second network device may be configured to perform one or more roles associated with the specific location in the predefined area based at least in part upon information in the reprovisioning parameters.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0853 - Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/0893 - Assignment of logical groups to network elements
Techniques for monitoring data transport in a network virtualization function chain (chain). A path tracing packet is generated having a Midpoint Compressed Data (MCD) to collect path tracing information of the chain. The network virtualization function node is configured to record an MCD containing Wide Local Path Tracing Identification (WL PT ID). The WL PT ID includes a first field having a value that indicates that a non-standard path tracing format is to be used and a second field that indicates a particular path tracing format to be used. The path tracing packet is passed through the chain and is received back after passing through the chain. Data collected by the path tracing packet is then analyzed to determine which network virtualization function nodes and chains the path tracing packet passed through and the amount of time taken for the path tracing packet to pass through the chain.
H04L 12/851 - Traffic type related actions, e.g. QoS or priority
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/122 - Discovery or management of network topologies of virtualised topologies e.g. software-defined networks [SDN] or network function virtualisation [NFV]
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 43/10 - Active monitoring, e.g. heartbeat, ping or trace-route
21.
WAVEGUIDE DELAY BASED EQUALIZATION WITH CURRENT SUMMING IN A DIFFERENTIAL TRANSIMPEDANCE AMPLIFIER
A waveguide delay-based equalization (WDEQ) system is described. The WDEQ system provides a delay in waveguides of the system and electrical signal summing in a differential transimpedance amplifier (TIA) which increases the performance (e.g., bandwidth, etc.) of the optical receiver. The WDEQ system includes an optoelectronic circuit with a directional coupler, a first photodetector, at least two transistors connected to the first photodetector, an optical delay, and a differential transimpedance amplifier (TIA).
Methods are provided in which a recording service obtains a multimedia stream along with metadata of an established collaboration session in which at least two participants collaborate via respective user devices. The recording service identifies each of the at least two participants of the established collaboration session based on the metadata and obtains an individual recording privacy control associated with each of the at least two participants based on identifying. The recording service further generates a recording of the established collaboration session restricted by the individual recording privacy control for each of the at least two participants.
Systems, methods, and computer-readable media are provided for reusing execution environments and code of serverless functions while ensuring isolation in serverless computing environments. In some examples, a method can include, in response to a first request to run a serverless function, executing, at an execution environment on a network, computer-readable code configured to perform the serverless function; after the computer-readable code has executed, modifying a pointer to an area of memory used to store a first state of the serverless function to reference a different area of memory; in response to a second request to run the serverless function, reusing, at the execution environment, the computer-readable code to perform the serverless function; and based on the pointer referencing the different area of memory, using the different area of memory to store a second state of the serverless function.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Techniques for wireless antenna multiplexing are disclosed. An antenna system for wireless communication includes a plurality of diplexers and first and second antenna arrays. The first antenna array is coupled to a first radio-frequency integrated circuit (RFIC) configured to operate at a first frequency band including a first plurality of sub-bands, and a second RFIC configured to operate at a second frequency band including a second plurality of sub-bands. The second antenna array is coupled to both the first RFIC and the second RFIC. Adjacent portions of the first plurality of sub-bands and the second plurality of sub-bands are assigned to different antenna arrays of the first and second antenna arrays using the plurality of diplexers.
In one embodiment, an illustrative method herein may comprise: obtaining, by a device, a plurality of indications of errors experienced by a bot performing tasks, wherein each of the plurality of indications includes contextual information of a corresponding error; determining, by the device, correlated errors among the errors experienced by the bot; aggregating, by the device, contextual information of each of the correlated errors into aggregated contextual data; and providing, by the device, the aggregated contextual data with an error notification for a particular correlated error.
Apparatuses, systems, and methods for a controlled-force thermal management device installation that helps thermal management of emerging, next-generation devices are provided. An apparatus includes at least two compression interfaces, each for compressing a mounting assembly of a thermal management device to a predetermined loading point. The apparatus further includes a frame configured to apply a preload force to the at least two compression interfaces. The frame has a pivoting joint at an assembly point for each of the at least two compression interfaces to balance the preload force between the at least two compression interfaces.
Systems and methods for camera height detection include a time of flight (TOF) sensor included on a camera within a camera array that emits a signal in an array of points. After receiving a reflected signal at the TOF sensor, where the reflected signal is a bounce back of the emitted signal from at least a subset of the array of points, a distance to each respective point in the array is determined based on a time it takes to receive the reflected signal from each respective point in the array. A depth map is generated from each respective point, where the depth map provides distance measurements to objects within an environment of the camera. A vertical position of the camera is determined based on the depth map.
G01S 17/89 - Lidar systems, specially adapted for specific applications for mapping or imaging
G01S 7/48 - RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES - Details of systems according to groups , , of systems according to group
G01S 17/86 - Combinations of lidar systems with systems other than lidar, radar or sonar, e.g. with direction finders
Techniques for determining that a configuration change in configurations for a network device has occurred to result in changed configurations for the network device. The techniques include creating a policy for the network device by a network controller that manages one or more network devices. The network controller may obtain data from the network device, and update the network device policy based on the obtained data. In some examples, the network controller may compare the network device configurations state with the network controller intent to determine if an Out-of-Band (OOB) configuration change has occurred in the configuration of the network device. Finally, the controller may synchronize the network device to the controller based on the updated policy.
In one embodiment, an illustrative method herein may comprise: determining, by a network controller, physical network topology of a data center network; collecting, by the network controller, virtual machine related network topology of the data center network from a virtual machine manager for the data center network; collecting, by the network controller, virtual ethernet flow mapping information of the data center network from a blade system management software for the data center network; collecting, by the network controller, container workload information of the data center network from a container orchestrator for the data center network; and generating, by the network controller, an integrated correlated visualization mapping of containers and associated network attachment points in the data center network based on the physical network topology, the virtual machine related network topology, the virtual ethernet flow mapping information, and the container workload information.
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
H04L 41/122 - Discovery or management of network topologies of virtualised topologies e.g. software-defined networks [SDN] or network function virtualisation [NFV]
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
In one embodiment, a method comprises training at least one model based at least in part on interactions between one or more users and electronic messages sent to addresses associated with the one or more users, receiving a first electronic message sent to a first address associated with a first user, analyzing the first electronic message to generate first feature data, determining one or more characteristics of the first user to generate second feature data, inputting, to the at least one model, the first feature data and the second feature data, and receiving, as output of the at least one model, data indicating whether to output, to the first user, a warning regarding the first electronic message.
A method includes receiving, at a mobile device, resource pool configuration information, the resource pool configuration information comprising a bitmap to determine the resource pool and determining, for a period having a plurality of consecutive subframes, a first subset of subframes by excluding, from the plurality of consecutive subframes, subframes in which a sidelink synchronization signal (SLSS) resource is configured and subframes other than uplink subframes. The method also includes determining, for the period, a second subset of subframes by excluding, from the first subset of subframes, one or more subframes, wherein a quantity of the second subset of subframes corresponds to an integer multiple of a length of the bitmap, and determining, based on a plurality of repetitions of the bitmap, the resource pool for a sidelink transmission from the second subset of subframes.
Hot pluggable or swappable devices that are easily removed and replaced by a network operator may be monitored for faults and utilized in post-deployment use. Device specific local monitoring and storing of operational parameters during a deployment of a device in a network is described. Additionally, utilizing the recorded operational parameters of device to generate baseline conditions for the device and individualized recommendations for the device is also described.
H04B 10/079 - Arrangements for monitoring or testing transmission systems; Arrangements for fault measurement of transmission systems using an in-service signal using measurements of the data signal
H04L 41/08 - Configuration management of networks or network elements
33.
TRANSMISSION OF PULSE POWER AND DATA IN A COMMUNICATIONS NETWORK
In one embodiment, a method includes transmitting pulse power on two wire pairs, the pulse power comprising a plurality of high voltage pulses with the high voltage pulses on the wire pairs offset between the wire pairs to provide continuous power, performing low voltage fault detection on each of the wire pairs between the high voltage pulses, and transmitting data on at least one of the wire pairs during transmittal of the high voltage pulses. Data transmittal is suspended during the low voltage fault detection.
H03M 13/03 - Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
H03M 13/37 - Decoding methods or techniques, not specific to the particular type of coding provided for in groups
H04B 3/54 - Systems for transmission via power distribution lines
H04L 41/12 - Discovery or management of network topologies
In one embodiment, a service chain data packet is instrumented as it is communicated among network nodes in a network providing service-level and/or networking operations visibility. The service chain data packet includes a particular header identifying a service group defining one or more service functions, and is a data packet and not a probe packet. A network node adds networking and/or service-layer operations data to the particular service chain data packet, such as, but not limited to, in the particular header. Such networking operations data includes a performance metric or attribute related to the transport of the particular service chain packet in the network. Such service-layer operations data includes a performance metric or attribute related to the service-level processing of the particular service chain data packet in the network.
H04L 45/00 - Routing or path finding of packets in data switching networks
H04L 41/0246 - Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
H04L 43/106 - Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
A method of establishing a secure wireless communication pairing using a wireless charging for authentication via an out-of-band channel. The method includes a telephone base detecting presence of a wireless handset and initiating a wireless charging process to charge the wireless handset upon detecting the presence of the wireless handset. The method further includes establishing a secure wireless communication pairing by telephone base with the wireless handset, based on information exchanged as part of the wireless charging process.
H02J 50/80 - Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
An Internet Key Exchange protocol message indicating a first Internet Protocol Security traffic flow is to be established via a first device is obtained at the first device. The Internet Key Exchange protocol message is forwarded from the first device to a second device. An encryption key used to transmit traffic via the first Internet Protocol Security Traffic flow is received at the first device from a key value store. The key value store is populated with the encryption key in response to the second device obtaining the Internet Key Exchange protocol message. A first data packet to be transmitted via the first Internet Protocol Security traffic flow is obtained at the first device. The first device provides the first data packet encrypted with the encryption key of the first Internet Protocol Security traffic flow.
In one embodiment, a method includes transmitting multi-phase pulse power from power sourcing equipment to a powered device in a data center, wherein the multi-phase pulse power comprises multiple phases of power delivered in a sequence of pulses defined by alternating low direct current voltage states and high direct current voltage states, and synchronizing the pulses at the power sourcing equipment with the pulses at the powered device.
H02M 3/158 - Conversion of dc power input into dc power output without intermediate conversion into ac by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only with automatic control of output voltage or current, e.g. switching regulators including plural semiconductor devices as final control devices for a single load
A system and method for improved application path selection for cloud-based applications from a client device. In one embodiment, a method includes collecting metrics of a remote user's use of one or more cloud-based applications, categorizing the one or more cloud-based applications based at least in part on the collected metrics, determining one or more secure network paths based at least in part on the categorizing of the one or more cloud-based applications, establishing the one or more secure network paths between the remote user and one or more network points-of-presence, and routing data traffic for the one or more cloud-based applications through the one or more established secure network paths.
In one embodiment, a device may transmit, via a network to an application, a series of sensor measurements captured by the device, each sensor measurement having an associated timestamp based on a clock of the device. The device may receive, from the application, an indication that at least a portion of the series of sensor measurement were not received by the application. The device may determine, for those sensor measurements not received by the application, timestamp differences between their timestamps and a current time of the clock of the apparatus, after receiving the indication. The device may resend the portion of the series of sensor measurements to the application and their timestamp differences.
H04L 1/18 - Automatic repetition systems, e.g. Van Duuren systems
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
The systems and cold plate pedestal and assembly described decrease mechanical stresses in integrated circuits, while also providing efficient thermal coupling between heat producing components and a cold plate. A cold plate assembly includes a cold plate with a pedestal portion a groove formed in a surface of the pedestal portion. The cold plate assembly also includes a thermal pad layer formed in the groove and a phase change material (PCM) layer formed on the surface of the pedestal portion and a surface of the thermal pad layer formed in the groove.
H01L 23/367 - Cooling facilitated by shape of device
H01L 23/427 - Cooling by change of state, e.g. use of heat pipes
H01L 27/02 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier
41.
Dynamic video layout design during online meetings
Presented herein is a stage area for “focused” video that is configured to allow for dynamic layout changes during an online video conference or meeting. By providing a user interface environment that allows a user (meeting participant) to customize the stage, each participant can choose their own view, and the meeting host can fully customize a view for every participant in the meeting.
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
Data defining egress bandwidth utilization on an interface of a node may be obtained and a congestion event may be detected based at least in part on an average interface utilization (Y) being greater than a first threshold (X1). A plurality of alternate links that can accommodate excess bandwidth without exceeding the first threshold may be identified. Flows associated with the plurality of alternate links may be filtered based at least in part on business logic macro flow filtering. It may be determined whether the plurality of alternate links pass a diffusing update algorithm (DUAL)-based loop-free path-finding algorithm (LPA) analysis for the destination node prefixes whether the destination node prefixes pass the DUAL-based LPA analysis for the at least one of the plurality of alternate links and a plurality of next hops associated with the at least one of the plurality of alternate links.
This disclosure describes techniques and mechanisms for improving security within SDWAN fabric and utilizing telemetry data from non-enterprise providers to remediate compromised SDWAN site(s) and/or user(s). The techniques may implement an integration of non-enterprise application(s) and API(s) with an enterprise network, thereby enabling the enterprise network to identify compromised endpoint(s), identify user(s), group(s), site(s) that are impacted, and take a corrective action (by the enterprise network and/or the non-enterprise application(s) or API(s)) on the enterprise fabric.
Various devices, systems, and methods are described herein that provide bi-directional, and even multi-directional airflow within fan systems. These fan systems can be utilized by devices such as datacenter switches to change from one direction of airflow (such as port side inlet) to another direction (such as port side exhaust). This can be done manually by having a multi-directional fan housed within an enclosure that provides access through a hatch door. The multi-directional fan can be removed and reoriented to a second direction, thus providing airflow with the same quality and pressure in multiple directions. Fan changes can also be automated through one or more interlocking rotational gears coupled to the fans within a housing, such that rotating one gear will rotate each of the fans within the housing, thus changing the direction of the airflow. By doing this, only one fan is needed to provide airflow in multiple directions.
The present technology is directed to a system and method for application aware management and recovery of link failures resulting from excessive errors observed on the link. One aspect of the proposed technology is based on identification of link errors associated with application-specific data patterns traversing link. Other aspects involve corrective actions based on relocation or modification of specific application traffic to thereby alleviate the observed excessive link errors and prevent a link failure or shut down. Relocation may involve moving the source application to a different virtual machine/container/physical device or rerouting application traffic by updating relevant routing protocols. Modification may involve harmlessly changing payload data pattern to remove data-pattern dependent signal attenuation. Information corresponding to identified faulty payload data patterns and associated frame data quality parameters maybe stored and utilized to provide analytics evaluation of network wide physical resource issues that maybe affecting application traffic.
H04L 45/28 - Routing or path finding of packets in data switching networks using route fault recovery
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
This disclosure describes methods and systems to externally manage network-to-network interconnect configuration data in conjunction with a centralized database subsystem. An example of the methods includes receiving and storing, in the centralized database subsystem, data indicative of user intent to interconnect at least a first network and a second network. The example method further includes, based at least in part on the data indicative of user intent, determining and storing, in the centralized database subsystem, a network intent that corresponds to the user intent. The example method further includes providing data indicative of the network intent from the centralized database subsystem to a first data plane adaptor, associated with the first network, and a second data plane adaptor, associated with the second network.
Disclosed herein are systems, methods, and computer-readable media for authentication in a multi-cloud cellular service. In one aspect, a method includes receiving, at a controller of a local site within the multi-cloud cellular service, a network connection request from a device, the cloud-based authentication component being a central network component configured to store device credentials and network policies for authenticating devices connecting to the multi-cloud cellular service across all sites associated with the multi-cloud cellular service. In one aspect, the method also includes locally authenticating, by the controller, the device using stored credential information obtained from the cloud-based authentication component prior to losing the connectivity to the cloud-based authentication component.
Techniques for power reduction of a camera system are disclosed. A camera system receives, via an image sensor, a video signal including a plurality of image frames, each frame including a plurality of pixels representing a plurality of objects. The camera system detects an object in an image frame and determines an amount of motion of the object by identifying and comparing the position of the object between each frame of the plurality of frames. The camera system identifies the object as belonging to a category of objects and generates a bounding box around the object. Based on the category and amount of motion, the camera system outputs a control signal to the image sensor to set a power level of the image sensor. The camera system encodes data representing the object in the bounding box at a compression level based on quality parameters associated with the category.
Techniques are provided for indoor navigation using display devices. In one example, a server obtains, from a user device, an indication that a user of the user device is attempting to navigate to a target location in a building. In response to the indication that the user is attempting to navigate to the target location in the building, the server provides, to respective display devices in the building, a unique identifier associated with the user. When the respective display devices obtain the unique identifier from the user device, the respective display devices display respective navigational information to guide the user from respective locations of the respective display devices to the target location.
A natural language markup for meetings is introduced that facilitates planning and facilitation of online meetings. Shared content is obtained during an online meeting. The shared content is shared by a first participant in the online meeting for display on devices of one or more second participants in the online meeting. A visual object is detected in the shared content and additional content is obtained based on detecting the visual object. The additional content is transmitted with the shared content for display on the devices of the one or more second participants.
Roaming validation for Access Network Providers (ANPs), and particularly to protecting communications between Stations (STAs) and ANPs while providing roaming validation for ANPs may be provided. An ANP may first register a roaming federation system. The ANP may determine a roaming message based on subscription features of the network, and the ANP may request signing of the roaming message by the roaming federation system. The ANP may receive the signed roaming message from the roaming federation system and send the signed roaming message to a STA. The ANP may then receive a request to connect to the network from the STA and initiate a connection for the STA.
The systems and cold plate pedestal and assembly described decrease mechanical stresses in integrated circuits, while also providing efficient thermal coupling between heat producing components and a cold plate. A cold plate assembly includes a cold plate with a pedestal portion a groove formed in a surface of the pedestal portion. The cold plate assembly also includes a thermal pad layer formed in the groove and a phase change material (PCM) layer formed on the surface of the pedestal portion and a surface of the thermal pad layer formed in the groove.
Systems, methods, and devices are disclosed for cognitive collaboration systems on a hybrid node. A query is received by a virtual assistant running on a public cloud, and it is determined whether the query pertains to data available on a public cloud resource, or the query pertains to data available on a private cloud resource. When it is determined that the query pertains to the data available on the public cloud resource, the query is interpreted by using a first model trained on at least one machine learning technique on data from the public cloud. When it is determined that the query pertains to the data available on the private cloud resource, the query is interpreted by using a second model trained on at least one machine learning technique on the data from the private cloud.
In one embodiment, the disclosure includes a network node synchronization system. The system may include a first node. The first node may include a first host card comprising a first (TOD) time of day counter, a first digital signal processor (DSP) comprising a first DSP counter; and a first optical communication device comprising a first DSP communication channel, wherein the first DSP communication channel transports DSP frames. In various embodiments, the DSP is a coherent DSP.
H04L 7/00 - Arrangements for synchronising receiver with transmitter
H04L 7/033 - Speed or phase control by the received code signals, the signals containing no special synchronisation information using the transitions of the received signal to control the phase of the synchronising-signal- generating means, e.g. using a phase-locked loop
55.
METHOD AND APPARATUS FOR TRANSMITTING BUFFER STATUS REPORT IN WIRELESS COMMUNICATION SYSTEM SUPPORTING DEVICE TO DEVICE COMMUNICATION
A method of supporting a buffer status report associated with a device-to-device (D2D) communication includes: establishing an RRC connection with an eNB; receiving, by a UE, configuration information associated with a D2D communication from the eNB, the configuration information including information of a resource selection mode for a D2D data transmission, the information of a resource selection mode indicating a resource pool from which the UE selects a resource for a D2D data transmission to another UE; identifying a D2D target identity of at least one target UE to which the UE transmits D2D data by performing a D2D discovery procedure; setting an RRC message to be transmitted to the eNB, the RRC message including information of the identified D2D target identity; and transmitting the RRC message to the eNB, the information of the identified D2D target identity being transmitted through UEinformation message for a D2D data transmission.
Embodiments for handling multidestination traffic in a network are described. It is determined that a destination of a packet, received at a network device, is a multihomed destination. In response to determining that the destination of the packet is a multihomed destination, a hash value is determined from a selection of header values of the packet using a hash function. The packet is forwarded to the destination using a shadow hash forwarding table based at least in part on determining, based on the hash value and a hash forwarding table, that the network device is a designated forwarder for the packet.
Systems and methods provide for optimizing video review using motion recap images. A video review system can identify background image data of a video clip including an amount of motion satisfying a motion threshold. The video review system can generate foreground mask data segmenting foreground image data, representing a moving object in the video clip, from the background image data. The video review system can select a set of instances of the moving object represented in the foreground image data. The video review system can generate a motion recap image by superimposing the set of instances of the moving object represented in the foreground image data onto the background data.
Techniques for dynamically load balancing traffic based on predicted and actual load capacities of data nodes are described herein. The techniques may include determining a predicted capacity of a data node of a network during a period of time. The data node may be associated with a first traffic class. The techniques may also include determining an actual capacity of the data node during the period of time, as well as determining that a difference between the actual capacity and the predicted capacity is greater than a threshold difference. Based at least in part on the difference, a number of data flows sent to the data node may be either increased or decreased. Additionally, or alternatively, a data flow associated with a second traffic class may be redirected to the data node during the period of time to be handled according to the first traffic class.
Personal network Software Defined-Wide Area Networks (SD-WANs) with attested permissions may be provided. A first one of a plurality Personal Area Network (PAN) devices in a PAN may seed a routing table entry for at least one application that the first one of the plurality PAN devices supports. The routing table entry may include at least one characteristic associated with an egress link between the first one of the plurality PAN devices and a device outside of the PAN. The routing table entry may be exchanged among the plurality of PAN devices in the PAN. Then data may be routed, based on the exchanged routing table entry, in the PAN through the first one of the plurality PAN devices through the egress link to the device outside of the PAN.
Presented herein are techniques to perform call failure diagnostics. A method includes receiving, at a network device, an indication of calls-of-interest, detecting, at the network device, a failure of one of the calls-of-interest, triggering, in response to the detecting, at the network device, diagnostics data analysis of data associated with the failure of one of the calls-of-interest, determining, based on the diagnostics data analysis, a cause of the failure of the one of the calls-of-interest, and notifying, by the network device, a management system of the cause of the failure of the one of the calls-of-interest and of recent configuration changes on the network device that are related to the cause of the failure of the one of the calls-of-interest.
H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
A method comprises: by a controller to communicate with devices of a network, storing classifiers assigned to groups of the devices to identify device commonality for each group; associating, to the classifiers, historical probabilities of success with which an automated response executed by one or more of the devices remediates a device alarm event; when a device of the devices reports the device alarm event, identifying each classifier to which the device belongs, each historical probability for each classifier, and a rule with classifier thresholds for the automated response; determining to execute the automated response on the device by evaluating the rule using each historical probability and the classifier thresholds; after the automated response is executed, performing a service test supported across the devices, and monitoring test results from the service test; and after the service test, updating each historical probability using the test results.
A system and method for an extended security scheme for reducing the prevalence of broken object level authorization. In one embodiment, a method includes receiving code associated with an application programming interface (API), wherein the code includes one of an API definition and an API server stub, and parsing the code for one or more keywords associated with an extended security scheme. If the code includes the API definition, the method further includes generating an associated API server stub based on at least one of the one or more keywords and the API definition. If the code includes the API server stub, the method further includes generating an associated API definition based on at least one of the one or more keywords and the API server stub.
In one embodiment, Ethernet Virtual Private Network (EVPN) is implemented using Internet Protocol Version 6 (IPv6) Segment Routing (SRv6) underlay network and SRv6-enhanced Border Gateway Protocol (BGP) signaling. A particular route associated with a particular Internet Protocol Version 6 (IPv6) Segment Routing (SRv6) Segment Identifier (SID) is advertised in a particular route advertisement message of a routing protocol (e.g., BGP). The SID includes encoding representing a particular Ethernet Virtual Private Network (EVPN) Layer 2 (L2) flooding Segment Routing end function of the particular router and a particular Ethernet Segment Identifier (ESI), with the particular SID including a routable prefix to the particular router. The particular router receives a particular packet including the particular SID; and in response, the particular router performs the particular EVPN end function on the particular packet.
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
H04L 67/63 - Routing a service request depending on the request content or context
H04L 69/324 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the data link layer [OSI layer 2], e.g. HDLC
64.
IDENTIFYING TRUSTED SERVICE SET IDENTIFIERS FOR WIRELESS NETWORKS
Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network, a first network message is received from a first access point (AP) identifying a first service set identifier (SSID) associated with a first wireless network, a second network message is received from a second AP identifying a second SSID associated with a second wireless network, and a visual similarity is determined between a first visual representation of the first SSID and a second visual representation of the second SSID. The second SSID is designated as suspicious based on the determined visual similarity.
In one embodiment, a method includes identifying, using a Static Context Header Compression (SCHC) rules engine, one or more packets matching a rule, selecting a firewall decision based on the identified one or more packets and the rule, and applying the firewall decision to the one or more identified packets.
A managed network supporting backscattering communication devices may be provided. A computing device may determine a plurality of locations respectively associated with a plurality of devices in a preterminal space. At least one of the plurality of devices may be power with energy transmitted from at least one Access Point (AP) to the least one of the plurality of devices at its location. Data may be received from the at least one of the plurality of devices in response to powering the at least one of the plurality of devices.
In one embodiment, a method includes detecting, at a virtual authenticator in an endpoint device, a linkup event, transmitting, to a supplicant in the endpoint device, a request for an identity associated with the endpoint device, receiving, at the virtual authenticator, a response from the supplicant, wherein the response comprises the identity, receiving, from an authentication server, an authorization result, wherein the authorization result is based on authenticating the endpoint device using the received identity, and enforcing, by the virtual authenticator, the authorization result at the endpoint device.
Radio discovery for a mesh Access Point (AP) may be provided. Topology information associated with a first network may be received wherein the first network may comprise a mesh network. A Topology Descriptor Message (TDM) may then be created based on the topology information. The TDM may then be transmitted by a first Access Point (AP).
Optimal coding scheme parameters may be provided. Information associated with a plurality of client devices may be received by a computing device. A map of locations of the plurality of client devices relative to an Access Point (AP) may be created based on the information. A connected dominating set of client devices within the plurality of client devices may be identified based on the map. A first client device in the connected dominating set may then be caused to relay data between the AP and a second client device comprising a client device in the plurality of client devices that is dominated by the first client device in the connected dominating set.
Roaming validation for Access Network Providers (ANPs), and particularly to protecting communications between Stations (STAs) and ANPs while providing roaming validation for ANPs may be provided. An ANP may first register a roaming federation system. The ANP may determine a roaming message based on subscription features of the network, and the ANP may request signing of the roaming message by the roaming federation system. The ANP may receive the signed roaming message from the roaming federation system and send the signed roaming message to a STA. The ANP may then receive a request to connect to the network from the STA and initiate a connection for the STA.
In part, the disclosure relates to a photonic device that may include a curved waveguide that includes a plurality of layers; a curved elongate structure defining an upper surface, an inner elongate surface, and an outer elongate surface, the curved elongate structure comprising a first end, and a second end; and a ridge extending from the upper surface, the ridge having a first side and a second side; and a trench defined by one or more of the plurality of layers and the first side; the curved elongate structure defines a first elongate section and a second elongate section, wherein a first cross-section of the ridge has a first shape that substantially extends along the first elongate section of the structure, the first shape is defined by the first side and a step extending from the first side and above the bottom of the trench.
In one embodiment, a device obtains transaction data regarding a transaction attempted within a software development environment, wherein the transaction data is captured by instrumentation code inserted into the software development environment at runtime. The device identifies, based on the transaction data, an access policy for the transaction. The device makes, based on the access policy, a determination that the transaction is not authorized. The device causes, via the instrumentation code, the transaction to be blocked from completing within the software development environment.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Techniques for extending network elements to inspect, extract, and complement tracing information added to L7 flows by application distributed tracing systems. The techniques may include receiving a Layer-7 (L7) message of an L7 flow associated with a distributed application and determining that the L7 message includes tracing information. In some examples, the tracing information may be mapped to a marking that is to be included in a Layer 3 (L3) or Layer-4 (L4) packet carrying the L7 message, and the L3 or L4 packet including the marking may be sent to an L3 or L4 network element. In some examples, the L3 or L4 network element may be configured to utilize the marking to determine a network decision for the L3 or L4 packet.
maxmax) comprising a first predetermined value and a preemption Arbitrary Interframe Space Number (AIFSN) of less than or equal to a second predetermined value. AC parameters for others of the plurality of ACs may be received wherein a non-preemption AIFSN associated with any of the others of the plurality of ACs is greater than a sum of the first predetermined value the second predetermined value. Preemption for traffic in the preemption AC may be allowed.
Symbol multiplexing Physical Medium Attachment (PMA) may be provided. A plurality of first lanes may be received and then Alignment Markers (AMs) from the plurality of first lanes may be used to determine symbol boundaries and identify the plurality of first lanes. Next, groups of the plurality of first lanes may be de-skewed and checkerboard patterns in the plurality of first lanes may be undone. Then the plurality of first lanes may be symbol-wise multiplexed to a plurality of second lanes. The plurality of second lanes may then be sent.
Symbol multiplexing Physical Medium Attachment (PMA) may be provided. A plurality of first lanes may be received and then Alignment Markers (AMs) from the plurality of first lanes may be used to determine symbol boundaries and identify the plurality of first lanes. Next, groups of the plurality of first lanes may be de-skewed and checkerboard patterns in the plurality of first lanes may be undone. Then the plurality of first lanes may be symbol-wise multiplexed to a plurality of second lanes. The plurality of second lanes may then be sent.
Techniques for extending network elements to inspect, extract, and complement tracing information added to L7 flows by application distributed tracing systems. The techniques may include receiving a Layer-7 (L7) message of an L7 flow associated with a distributed application and determining that the L7 message includes tracing information. In some examples, the tracing information may be mapped to a marking that is to be included in a Layer 3 (L3) or Layer-4 (L4) packet carrying the L7 message, and the L3 or L4 packet including the marking may be sent to an L3 or L4 network element. In some examples, the L3 or L4 network element may be configured to utilize the marking to determine a network decision for the L3 or L4 packet.
Certain embodiments of the present disclosure are directed towards an optical assembly such as a multiplexers/demultiplexers (MDM). One example optical assembly generally includes: a fiber array configured to provide an optical signal with a plurality of wavelengths; optical wavelength filters configured to separate the plurality of wavelengths into respective optical signals; a lens array configured to receive the respective optical signals from the optical wavelength filters and focus the respective optical signals before reaching an optical interface for a photonic chip; and a birefringent crystal disposed between the lens array and the optical interface.
G02B 6/42 - Coupling light guides with opto-electronic elements
G02B 6/27 - Optical coupling means with polarisation selective and adjusting means
G02B 6/293 - Optical coupling means having data bus means, i.e. plural waveguides interconnected and providing an inherently bidirectional system by mixing and splitting signals with wavelength selective means
79.
TRANSITION OF USER EQUIPMENT TO A 5GC NETWORK POST VOICE CALL TERMINATION IN VIEW OF EPS FALLBACK
Systems and methods are provided for providing transference of a user equipment to a 5G network when a voice call is terminated. The systems and method can include receiving, at a mobility management entity, a voice call termination message from a serving gateway, determining, by the mobility management entity, whether the user equipment includes a 5G subscription and 5G capability based on the voice call termination message, and providing, by the mobility management entity, a handover message to the user equipment to initiate a handover to the 5G network based on the determining of whether the user equipment includes the 5G subscription and 5G capability.
The present technology is generally directed to optimizing a non-3GPP untrusted Wi-Fi to 5G system handover followed by Evolved Packet System (EPS) fallback, more specifically, to delaying removal of the Wi-Fi session resources and creating a voice flow as part of the EPS fallback. The present technology can receive a request for an EPS fallback from a mobile device for a handover to a 5G network while the mobile device is in communication over non-3GPP access network, maintain one or more resources of the non-3GPP access network during data path switching from the non-3GPP access network to the 5G network, generate a list of EPS bearer identifiers to transmit to an access and mobility management function (AMF), wherein the list of EPS bearer identifiers is associated with a voice flow to transfer the one or more resources of the non-3GPP access network as part of the handover from the non-3GPP access network to the 5G network, and transmit the list of EPS bearer identifiers to a mobility management entity (MME).
A flexible witness service system architecture is provided that comprises one or more cluster sites each having at least two storage/compute nodes; at least one local external device associated with at least one of the one or more cluster sites, the at least one local external device configured to run a local witness service. A central cloud management platform is in communication with the one or more cluster sites, the central cloud management platform being configured to run a cloud witness service. The local witness service and the cloud witness service perform identical arbitration services if a storage/compute node in one of the one or more cluster sites fails or communication between storage/compute nodes in a cluster fails.
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 67/1034 - Reaction to server failures by a load balancer
H04L 67/133 - Protocols for remote procedure calls [RPC]
82.
MODELING COMMUNICATION DATA STREAMS FOR MULTI-PARTY CONVERSATIONS INVOLVING A HUMANOID
A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid process software,” can be configured to participate in multi-parry conversations. The humanoid can monitor electronic communications in a conversation involving the humanoid and at least one other party. The humanoid can model the electronic communications by uniquely identifying each of the electronic communications as a stream of data. For example, the data can be labeled and sorted in a database and/or arranged in a nodal graph representation. The humanoid can participate in the conversation based on the modeling.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
83.
LICENSE BASED TRAFFIC MANAGEMENT IN HYBRID NETWORKS
Systems and methods for managing traffic in a hybrid environment include monitoring traffic load of a local network to determine whether the traffic load exceeds or is likely to exceed a maximum traffic load, where the maximum traffic load is a traffic load for which a service can be provided by the local network, based on a license. An excess traffic load is determined if the traffic load exceeds or is likely to exceed the maximum traffic load. One or more external networks which have a capacity to provide the service to the excess traffic load are determined, to which the excess traffic load is migrated. The local network includes one or more service instances for providing the service for up to the maximum traffic load, and the service to the excess traffic load is provided by one or more additional service instances in the one or more external networks.
An optical modulator may include a lower waveguide, an upper waveguide, and a dielectric layer disposed therebetween. When a voltage potential is created between the lower and upper waveguides, these layers form a silicon-insulator-silicon capacitor (also referred to as SISCAP) guide that provides efficient, high-speed optical modulation of an optical signal passing through the modulator. In one embodiment, at least one of the waveguides includes a respective ridge portion aligned at a charge modulation region which may aid in confining the optical mode laterally (e.g., in the width direction) in the optical modulator. In another embodiment, ridge portions may be formed on both the lower and the upper waveguides. These ridge portions may be aligned in a vertical direction (e.g., a thickness direction) so that ridges overlap which may further improve optical efficiency by centering an optical mode in the charge modulation region.
G02F 1/025 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour based on semiconductor elements with at least one potential jump barrier, e.g. PN, PIN junction in an optical waveguide structure
G02B 6/132 - Integrated optical circuits characterised by the manufacturing method by deposition of thin films
G02B 6/136 - Integrated optical circuits characterised by the manufacturing method by etching
G02F 1/01 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour
G02F 1/225 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour by interference in an optical waveguide structure
85.
TIME SENSITIVE NETWORK (TSN) QUALITY OF SERVICE (QOS) MANAGEMENT
Time Sensitive Network (TSN) Quality of Service (QoS) management may be provided. A number of Transmit Opportunities (TxOPs) to use for transmitting data between an Access Point (AP) and a client device over a wireless link may be received. An initial gate configuration to the AP for transmitting data between the AP and the client device over the wireless link for a transmit period of each cycle of a number of cycles may be provided based on the number of TxOPs. A change in a network condition of the wireless link may be detected. The initial gate configuration for the transmit period in a current cycle of the number of cycles may be adjusted in response detecting the change in the network condition of the wireless link.
A managed network supporting backscattering communication devices may be provided. A computing device may determine a plurality of locations respectively associated with a plurality of devices in a preterminal space. At least one of the plurality of devices may be power with energy transmitted from at least one Access Point (AP) to the least one of the plurality of devices at its location. Data may be received from the at least one of the plurality of devices in response to powering the at least one of the plurality of devices.
H04B 5/79 - for data transfer in combination with power transfer
G01S 13/75 - Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems using transponders powered from received waves, e.g. using passive transponders
87.
INTEGRATION OF POWER AND OPTICS THROUGH COLD PLATES FOR DELIVERY TO ELECTRONIC AND PHOTONIC INTEGRATED CIRCUITS
In one embodiment, an apparatus includes an upper cold plate and a lower cold plate, at least one of the upper cold plate or the lower cold plate comprising an electrical or optical path extending therethrough, a substrate and die package interposed between the upper cold plate or the lower cold plate, and a connector coupled to one of the upper cold plate or the lower cold plate for transmitting power or an optical signal through the electrical or optical path to the substrate and die package.
This disclosure describes techniques for generating a conversation summary. The techniques may include processing at least one statement indication of the conversation to determine at least one statement that is a candidate highlight of the conversation. The techniques may further include applying linguistic filtering rules to the candidate highlight to determine the candidate highlight is an actual highlight. The techniques may further include generating the conversation summary including providing the actual highlight as at least a portion of the conversation summary.
Federated multi-access edge computing availability notifications may be provided by: transmitting, from a User Equipment (UE) to a node of a wireless network of a federated service, an attach request for the wireless network that includes authentication credentials for an independent identity provider in an identity federation, wherein the independent identity provider is external and independent from the wireless network and used to authenticate the UE to the wireless network; forwarding, from the node to the independent identity provider, the authentication credentials; transmitting, from the independent identity provider to the node, an authentication success message; receiving, at the UE via the node, the authentication success message; transmitting, from the UE to the node, a Multi-access Edge Computing (MEC) query; and receiving, at the UE from the node, a MEC response that identifies MEC resources that are available to the UE.
A method includes generating a first shortest path tree for traffic routing in a network, the first shortest path tree identifying a corresponding shortest path from the network node to other nodes in the network and generating a second shortest path tree for traffic routing after removing an element from the network. The second shortest path tree identifies a corresponding shortest path from the network node to the other nodes in the network with the element removed. A third shortest path tree is generated, which is a weighted version of the second shortest path tree with a weight value added to any node or link in the network sharing a SRLG value with the element removed from the network. Network traffic is enforced based on a comparison of the third shortest path tree with at least one of the first shortest path tree and the second shortest path tree.
Rotation of a wireless client device address is based on an encryption key and a nonce value. Key information and nonce value information are shared between a wireless client device and a network infrastructure component over a secure communication channel. The wireless client device encrypts the nonce value using the key information and encodes the encrypted value as a device address. The wireless client device then identifies itself via a source address value in a message transmitted over a wireless network. Upon receiving the message, the network infrastructure component decrypts information derived from the source address value and compares the resulting data to the nonce value. If a match is identified, the network infrastructure identifies the wireless client device as a source of the message. In some embodiments, the nonce value is updated with each rotation to provide for improved entropy of generated device addresses.
Techniques for using device proximity of a primary device and a secondary device to allow or deny connections to network resource(s), as well as terminate existing connections to the network resource(s). The techniques may include monitoring a proximity-based direct networking connection between a primary device and a secondary device, the proximity-based direct networking connection established in association with authenticating the primary device to access a resource. The techniques may also include determining, based at least in part on the monitoring, that a network proximity between the primary device and the secondary device exceeds a threshold proximity. Based at least in part on determining that the network proximity exceeds the threshold proximity, the techniques may include causing termination of the access to the resource for the primary device.
Techniques for using device proximity of a primary device and a secondary device to allow or deny connections to network resource(s), as well as terminate existing connections to the network resource(s). The techniques may include monitoring a proximity-based direct networking connection between a primary device and a secondary device, the proximity-based direct networking connection established in association with authenticating the primary device to access a resource. The techniques may also include determining, based at least in part on the monitoring, that a network proximity between the primary device and the secondary device exceeds a threshold proximity. Based at least in part on determining that the network proximity exceeds the threshold proximity, the techniques may include causing termination of the access to the resource for the primary device.
H04W 4/02 - Services making use of location information
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Preemption in wireless may be provided. Access Category (AC) parameters may be received for a preemption AC within a plurality of ACs. The preemption AC parameters may comprise a Contention Window maximum (CWmax) comprising a first predetermined value and a preemption Arbitrary Interframe Space Number (AIFSN) of less than or equal to a second predetermined value. AC parameters for others of the plurality of ACs may be received wherein a non-preemption AIFSN associated with any of the others of the plurality of ACs is greater than a sum of the first predetermined value the second predetermined value. Preemption for traffic in the preemption AC may be allowed.
Aspects described herein include an optical apparatus. The optical apparatus includes a first optical waveguide formed in a first semiconductor layer and a second optical waveguide formed in a second semiconductor layer and separated from the first optical waveguide by a dielectric layer. The first optical waveguide extends in a direction of an optical path. The first optical waveguide and the second optical waveguide are at least partly overlapping along the direction. At least the first optical waveguide has a first ridge extending along the direction. The first ridge defined between spacers having a predetermined width.
Presented herein are techniques to facilitate providing slice attribute information to a user equipment (UE) for one or more slice types with which the user equipment is allowed to establish one or more session(s). In one example, a method may include obtaining, by a network element, a registration request for connection of a UE to a mobile network; performing an authentication for connection of the UE to the mobile network; and upon successful authentication, providing, by the network element, a registration response to the UE, wherein the registration response identifies one or more network slice types with which the UE is authorized to establish a session and the registration response identifies one of: attribute information for each of the one or more network slice types or network location information from which attribute information for each of the one or more network slice types is to be obtained.
Automated techniques for converting network devices from a Layer 2 (L2) network into a Layer 3 (L3) network in a hierarchical manner are described herein. The network devices may be configured to boot such that their ports are in an initialization mode in which the ports are unable to transmit locally generated DHCP packets. When a network device detects that a neighbor (or “peer”) device has acquired an IP address or has been configured by a network controller, then the port on which the neighbor device is detected can then be transitioned from the initialization mode into a forwarding mode. In the forwarding mode, the port can be used to transmit packets to obtain an IP address. Thus, the network devices are converted from an L2 device to an L3 device in a hierarchical order such that upstream devices are discovered and converted into L3 devices before downstream devices.
In one embodiment, a method includes transmitting, to a multi-factor authentication (MFA) agent running on a user device, a request for a location of the user device, receiving, from the MFA agent, the location of the user device, wherein the location is determined by the MFA agent to be a most common location indicated by a plurality of location indicators, receiving, from a policy server, a location-based access policy, appending, to the location-based access policy, the location of the user device and determining, based on the location of the user device and the location-based access policy, whether to allow the user device to access one or more of: a remote service, a remote database, and a remote device.
Time Sensitive Network (TSN) Quality of Service (QoS) management may be provided. A number of Transmit Opportunities (TxOPs) to use for transmitting data between an Access Point (AP) and a client device over a wireless link may be received. An initial gate configuration to the AP for transmitting data between the AP and the client device over the wireless link for a transmit period of each cycle of a number of cycles may be provided based on the number of TxOPs. A change in a network condition of the wireless link may be detected. The initial gate configuration for the transmit period in a current cycle of the number of cycles may be adjusted in response detecting the change in the network condition of the wireless link.
A method, computer system, and computer program product are provided for stress-testing electronics using telemetry modeling. Telemetry data is received from one or more devices under test during a hardware testing phase, the telemetry data including one or more telemetry parameters. The telemetry data is processed using a predictive model to determine future values for the one or more telemetry parameters. Additional hardware testing is performed, wherein the additional hardware testing includes adjusting one or more testing components based on the determined future values.