System and method for enabling communication between networks with overlapping IP address ranges

    公开(公告)号:US12058094B1

    公开(公告)日:2024-08-06

    申请号:US17504481

    申请日:2021-10-18

    摘要: A method is described that enables communication between two disjoined networks with overlapping IP address ranges. The method features receiving a first address mapping query message from a first intermediary device and returning a first private IP address map. The first private IP address map includes at least a first plurality of private IP addresses each uniquely assigned to a computing device residing in the first network. In response to a triggering event, recovering a second private IP address map by a second intermediary device. Herein, the second private IP address map includes at least a second plurality of private IP addresses each uniquely assigned to a computing device residing in the second network. Thereafter, the source IP address for a private IP address associated with the computing device is substituted prior to transmission of a message from the first intermediary device to the second intermediary device upon determining that the first network and the second network include overlapping private IP address ranges.

    Address obtaining method and an address obtaining apparatus

    公开(公告)号:US11895083B2

    公开(公告)日:2024-02-06

    申请号:US17976248

    申请日:2022-10-28

    摘要: An address obtaining method includes obtaining, by a third network device, an identifier of a first application from a terminal device. The identifier of the first application indicates a request for obtaining an address of an instance of the first application. The address obtaining method further includes sending, by the third network device, a first message to a first network device, wherein the first message comprises the identifier of the first application, and the first message is useable to request the address of the instance of the first application. The address obtaining method further includes receiving, by the third network device, the address of the instance of the first application from the first network device, and sending the address of the instance of the first application to the terminal device.

    VALIDATION OF ALIGNMENT OF WIRELESS AND WIRELINE NETWORK FUNCTION CONFIGURATION WITH DOMAIN NAME SYSTEM RECORDS

    公开(公告)号:US20240356888A1

    公开(公告)日:2024-10-24

    申请号:US18752861

    申请日:2024-06-25

    摘要: Techniques for validating alignment between network element configuration and DNS records associated with a communication network are presented. Alignment management component (AMC) can retrieve respective configuration parameter data items relating to respective configuration parameters associated with respective resource-related identifiers, and respective metadata items associated with the respective resource-related identifiers, from a configuration data store; and retrieve respective DNS records from respective DNS name servers, based on analyzing the respective metadata items associated with respective DNS records. For each resource-related identifier that is supposed to have a corresponding DNS record, based on the result of analyzing the respective configuration parameter data items and respective DNS records, AMC can determine whether the resource-related identifier has a corresponding DNS record stored in the DNS name server indicated by the metadata item. AMC can generate an audit report comprising a missing DNS record data item for each DNS record determined to be missing.

    METHODS AND DEVICES FOR NETWORK CENSORSHIP CIRCUMVENTION

    公开(公告)号:US20240267425A1

    公开(公告)日:2024-08-08

    申请号:US18608202

    申请日:2024-03-18

    申请人: Snowstorm Inc.

    发明人: Serene HAN

    摘要: Methods, non-transitory computer readable media, and peer devices are disclosed that facilitate network censorship circumvention. A censored peer sends to a rendezvous peer censored peer location information. A connection with a volunteer peer is then established using volunteer peer location information received from the rendezvous peer for a matched volunteer peer. First network traffic is then sent to the volunteer peer in accordance with a first network protocol using a second network protocol associated with the connection. The first network traffic is directed to a network host restricted with respect to the censored peer and the second network protocol is a peer-to-peer network protocol. Second network traffic responsive to the first network traffic is then extracted from network message(s) to thereby obtain access to the restricted network host via the volunteer peer. The first network messages are in accordance with the second network protocol and received via the connection.