11 research outputs found

    HETEROGENEOUS WIRELESS: DUAL LORA-NB-IOT REDUNDANT CONNECTIVITY

    Get PDF
    LoRa refers to a digital wireless data communication technology that enables very-long-range transmissions with low power consumption. Narrowband Internet-of-Things (NB-IoT) refers to a lower power standard focusing on indoor coverage. By combining LoRa and NB-IoT technologies, a low-energy device may receive the benefit of NB-IoT throughput, while consuming an amount of power similar to LoRa. The embodiments presented herein emulate a LoRa device over a NB-IoT network using a virtual gateway. Power usage of a device can be reduced by using LoRa and waking up NB-IoT on demand. A device may use LoRa as long as LoRa meets expected delivery ratio and timeliness criteria; the exact selection of which radio to use for each type of packet may be determined for each device by applying a machine learning profiler to the network at the beginning of the life of the device, with continuous learning thereafter. Heterogeneous LoRa-NB-IoT devices can also improve the reliability of a transmission by using both radios in parallel and introducing a frame replication and duplicate-elimination technique for highly critical packets. Thus, a device may be protected against network outages on either side

    OVERRIDING DETERMINISTIC FLOWS

    Get PDF
    Real aging is not desirable for Deterministic Network (DetNet) flows. Defined herein are new techniques that provide a similar service for DetNet flows. The new techniques involve: utilizing new Quality of Service (QoS) values to indicate a packet that is a normal DetNet packet versus a reclassified packet; reclassifying a DetNet packet to a higher priority to avoid discarding N contiguous packets of the flow; ensuring that a reclassified packet progresses through automatic repeat request (ARQ) methods; and declassifying a DetNet packet to a lower priority rather than discarding it using IP-in-IP encapsulation and a deadline header with a deadline that is computed on the fly based on the remaining time till the bounded time of delivery for the packet

    ENHANCED HOST DISCOVERY IN SDN/FABRIC-BASED NETWORKS

    Get PDF
    Various solutions are provided herein to facilitate the efficient discovery of hosts in large network environments, such as software-defined networking (SDN) or fabric-based networks, utilizing several techniques. A first technique supports the ability to efficiently manage silent ports and silent media access control (MAC) addresses. This technique involves applying a novel heuristic to ports and MAC addresses, classifying such entities (as silent, quiet, and noisy), and intelligently polling such entities. A second technique supports a Multicast Listener Discovery (MLD)-based host discovery approach that is applicable to Internet Protocol (IP) version 4 (IPv4) and involves a host creating an IP version 6 (IPv6) address that embeds its IPv4 address, the addition of a well-known first byte to the three bytes in a Solicited-Node multicast address (SNMA), and the use of a form of unicast ping to confirm whether a host formed a derived address. A third technique involves using a service lookup for deterministic host discovery that involves the use of upper-layer discovery services to cause a host to expose its addresses in the replies to multicast discoveries

    PRESENCE VALIDATION USING SECURED INTERNET PROTOCOL (IP) ADDRESS

    Get PDF
    Various presence-based validation technologies exist that provide for the ability add identity and presence validation to a laptop-based system. However, these technologies are primarily limited to computers (e.g., desktops and laptops) and do not include location validation. There is a need to extend these capabilities to other devices connected to a network and also to eliminate the need for a hardware-assisted solution. There is also a need to offer network location to avoid any type of attack from devices that are not connected to a local area network (LAN) or even to the same port. This proposal provides a technique to ensure that a device/person is present at a location by observing that the device/person performed an activity on-site, which can be observed by a trusted third-party

    ENHANCED NETWORK SLICING FOR INDUSTRIAL AND ENERGY PROTOCOLS

    Get PDF
    With the development of industry 4.0 and the recent evolution of the substation automation, as prescribed at least by the International Electrotechnical Commission (IEC) 61850 Standard, the network is becoming one of the key element of these trends. Network design and network architecture are becoming more and more complex and leading to challenging problems and issues, such as network security, multiplication of unmanaged broadcast domains, and bandwidth limitations. Recent tools have been introduced to help network engineers visualize different industrial Internet of Things (IIoT) protocol flows and characterizations for devices connected to the network. However, visualization is not enough and any help in the design and configuration of the network would be a great differentiator. Techniques herein provide for the ability to utilize sensors to build a network map of industrial and power data flows. The network map can then be used to configure different network slices with guaranteed bandwidth and flow isolation

    SELECTIVE FORWARD ERROR CORRECTION WITH FULL DUPLEX FEEDBACK LOOP

    Get PDF
    Numerous techniques exist for detecting and correcting errors that are introduced during the transmission of information (e.g., a data frame) between two pieces of network equipment, including, for example, forward error correction (FEC), cyclic redundancy check (CRC), hybrid automatic repeat request (HARQ), etc. Use of such techniques carries a cost, often shared between the transmitter and the receiver, comprising increased latency, consumption of bandwidth, the use of computational resources for verification and correction, etc. Techniques are presented herein that support a new method for detecting and correcting errors that leverages a return channel of a bidirectional radio environment to provide a feedback loop through which FEC may be focused just on the areas of a frame that are poorly received, thereby avoiding the latency, bandwidth, etc. costs that would be associated with retransmission of areas of the frame that are well received. The techniques presented herein build on new capabilities of full duplex radios and apply to, for example, Wi-Fi® 6 and 7 and Third Generation Partnership Project (3GPP) Fifth Generation (5G) networks

    Design and Performance of a Web Server Accelerator

    No full text
    We describe the design, implementation and performance of a Web server accelerator which runs on an embedded operating system and improves Web server performance by caching data. The accelerator resides in front of one or more Web servers. Our accelerator can serve up to 5000 pages/second from its cache on a 200 MHz PowerPC 604. This throughput is an order of magnitude higher than that which would be achieved by a high-performance Web server running on similar hardware under a conventional operating system such as Unix or NT. The superior performance of our system results in part from its highly optimized communications stack. In order to maximize hit rates and maintain updated caches, our accelerator provides an API which allows application programs to explicitly add, delete, and update cached data. The API allows our accelerator to cache dynamic as well as static data. We analyze the SPECweb96 benchmark, and show that the accelerator can provide high hit ratios and excellent performa..

    A Scalable and Highly Available Web Server Accelerator

    No full text
    : We describe the design, implementation and performance of a scalable and highly available Web server accelerator which runs under an embedded operating system and improves Web server performance by caching data. A single cache node implemented on a uniprocessor 200 MHz PowerPC 604 can serve up to 5000 pages/second, a figure which is an order of magnitude higher than that which would be achieved by a high-performance Web server running under a conventional operating system such as Unix or NT. The memory of our accelerator scales linearly with the number of cache nodes and the throughput scales almost linearly with the number of cache nodes as long as the front-end is not a bottleneck. Requests are routed to cache nodes using a combination of content-based routing and techniques which don't examine contents. Content-based routing reduces cache node CPU cycles but can make the front-end router a bottleneck. When content-based routing is not used, a request for a cached object may initi..
    corecore