摘要:
A method for forwarding a connection at an interconnecting device (100) comprises receiving (S310) from an originating device (150) an incoming connection at an incoming port (136, 137), determining (S320) by at least one hardware processor (131) whether port translation is implemented for the incoming port (136, 137), in case port translation is implemented for the incoming port (136, 137), returning (S330) to the originating device by the at least one hardware processor (131) a challenge intended to distinguish humans from computers, verifying (S340) by the at least one hardware processor (131) that a response received in response to the challenge is a correct response to the challenge, and, in case the response is is a correct response to the challenge, forwarding (S350), by the at least one hardware processor (131), the connection to a translated port (134) corresponding to the incoming port according to the port translation.
摘要:
A method for managing device replacements is disclosed. The method proposes to data mine a dataset of device transitions, wherein a device transition is an entry representing a user replacing a first device by a second device at a given point in time. This dataset is exploited so as to first predict which device, or set of devices is closed to be obsolete and needs to be replaced and then, to determine a candidate new device that is the most suited to replace the obsolete device.
摘要:
A device (110) such as a gateway comprises a communication interface (113) configured to receive an inbound HTTP connection via a network (140), memory (112) configured to store a list of domain names corresponding to web search engines and at least one hardware processor (111) configured to obtain (S210) an IP address of a device from the inbound HTTP connection, obtain (S220), for example using reverse DNS, a domain name corresponding to the IP address, determine (S230) that the device is open to the network (140) if the domain name is on the list of domain names corresponding to web search engines and, in case the device is open to the network (140), perform (S240) an action.
摘要:
A method for detecting interferences in wireless networks is disclosed. A salient idea is to use a first access point for detecting an interference disturbing a wireless device associated with a second access point, wherein the device at the origin of the interference is in the range of the first access point, but not in the range of the second access point. Leveraging on the difference of coverage between different wireless networking technologies, the first access point is capable of detecting both a data traffic of a second access point and a short range interfering device in a same frequency channel. More precisely, by measuring a level of strength of a signal received in the frequency channel at a period of time where no data traffic of the second access point is detected, the first access point is capable of detecting an interference according to the measured signal. The detected interference corresponds to another device using the frequency channel of the second access point, without communicating with the second access point. As the interference detected by the first access point may not be detectable by the second access point (because not being in the range of the second access point although disturbing some of its associated devices), the first access point advantageously sends an information item indicating the interference has been detected. Sending such indication is advantageous as it allows the second access point to detect an interfering device, even if not being in its range.
摘要:
A device and a method for prediction of rare failures are disclosed. A user device collects local data and events that could indicate a future failure of at least part of the device. A local failure prediction model is used to provide an estimation of a potential failure in a temporal window. Based on this estimation and on a collection ratio representing the proportion of non-failure data to be collected, the user device decides if it should send out the collected data to a collecting device. When the temporal window elapsed, the device sends out a label representing the real failure status. The collecting device uses the collected data and labels to improve the failure prediction model. The improved model may be redistributed to the plurality of user devices.
摘要:
A method for detecting interferences in wireless networks is disclosed. A salient idea is to use a first access point for detecting an interference disturbing a wireless device associated with a second access point, wherein the device at the origin of the interference is in the range of the first access point, but not in the range of the second access point. Leveraging on the difference of coverage between different wireless networking technologies, the first access point is capable of detecting both a data traffic of a second access point and a short range interfering device in a same frequency channel. More precisely, by measuring a level of strength of a signal received in the frequency channel at a period of time where no data traffic of the second access point is detected, the first access point is capable of detecting an interference according to the measured signal. The detected interference corresponds to another device using the frequency channel of the second access point, without communicating with the second access point. As the interference detected by the first access point may not be detectable by the second access point (because not being in the range of the second access point although disturbing some of its associated devices), the first access point advantageously sends an information item indicating the interference has been detected. Sending such indication is advantageous as it allows the second access point to detect an interfering device, even if not being in its range.
摘要:
A method for managing device replacements is disclosed. The method proposes to data mine a dataset of device transitions, wherein a device transition is an entry representing a user replacing a first device by a second device at a given point in time. This dataset is exploited so as to first predict which device, or set of devices is closed to be obsolete and needs to be replaced and then, to determine a candidate new device that is the most suited to replace the obsolete device.
摘要:
An apparatus (100) receives (S21) a MAC address of a device via a network interface (130) and a processor (110) extracts (S22) its OUI, which is used (S23) to obtain the manufacturer of the device and the OUI registration date. The apparatus then uses (S24) manufacturer sales information to find models that match the OUI registration date, obtains (S25) the models' proportion of sales, computes (S26) the "MAC weight" of each model, computes (S27) the likelihood of possible models, and uses (S28) the obtained knowledge for network management.
摘要:
A device (110) such as a gateway comprises a communication interface (113) configured to receive an inbound HTTP connection via a network (140), memory (112) configured to store a list of domain names corresponding to web search engines and at least one hardware processor (111) configured to obtain (S210) an IP address of a device from the inbound HTTP connection, obtain (S220), for example using reverse DNS, a domain name corresponding to the IP address, determine (S230) that the device is open to the network (140) if the domain name is on the list of domain names corresponding to web search engines and, in case the device is open to the network (140), perform (S240) an action.
摘要:
A method for forwarding a connection at an interconnecting device (100) comprises receiving (S310) from an originating device (150) an incoming connection at an incoming port (136, 137), determining (S320) by at least one hardware processor (131) whether port translation is implemented for the incoming port (136, 137), in case port translation is implemented for the incoming port (136, 137), returning (S330) to the originating device by the at least one hardware processor (131) a challenge intended to distinguish humans from computers, verifying (S340) by the at least one hardware processor (131) that a response received in response to the challenge is a correct response to the challenge, and, in case the response is is a correct response to the challenge, forwarding (S350), by the at least one hardware processor (131), the connection to a translated port (134) corresponding to the incoming port according to the port translation.