Using Machine Learning Techniques to Predict Device Buffer Status

    公开(公告)号:US20240381166A1

    公开(公告)日:2024-11-14

    申请号:US18465380

    申请日:2023-09-12

    Abstract: Devices, systems, methods, and processes are described herein that can reduce network communication overhead by reducing data that is sent. This reduction in data can be achieved by reducing the requests for data related to the buffers of one or more network devices. This buffer status data reduction can be achieved by predicting the current status of the buffers in other network devices. When the buffer predictions are sufficient, the need to request or poll for buffer status reports can be reduced. The buffer predictions can be evaluated through one or more confidence levels. These buffer predictions and confidence levels can be generated by one or more machine learning processes that are configured to operate on one or more network devices. Based on the confidence levels of the predictions, the number of buffer status report polls and of any unsolicited buffer service reports can be reduced.

    TELEPROTECTION REQUIREMENT COMPLIANCE
    12.
    发明申请

    公开(公告)号:US20190020372A1

    公开(公告)日:2019-01-17

    申请号:US15650359

    申请日:2017-07-14

    Abstract: A methodology includes determining a first delay between a first relay and a first label edge router, a second delay between a second relay and a second label edge router, and a third delay of a label-switched path between the first label edge router and the second label edge router. Based on the first, second, and third delays, it is determined whether an end-to-end latency between the first relay and the second relay exceeds an end-to-end latency threshold.

    Identifying rogue wireless devices using MAC address rotation techniques

    公开(公告)号:US12192770B2

    公开(公告)日:2025-01-07

    申请号:US17731689

    申请日:2022-04-28

    Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.

    IDENTIFYING ROGUE WIRELESS DEVICES USING MAC ADDRESS ROTATION TECHNIQUES

    公开(公告)号:US20230354034A1

    公开(公告)日:2023-11-02

    申请号:US17731689

    申请日:2022-04-28

    CPC classification number: H04W12/122 H04W12/73 H04W12/106

    Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.

    METHOD AND SYSTEM FOR TELEPROTECTION OVER SEGMENT ROUTING-BASED NETWORKS

    公开(公告)号:US20190356600A1

    公开(公告)日:2019-11-21

    申请号:US15982935

    申请日:2018-05-17

    Abstract: A method for teleprotection over a segment routed network comprises receiving network requirements for communication between a first teleprotection relay and a second teleprotection relay, the first teleprotection relay associated with a first router of the segment routed network, and the second teleprotection relay associated with a second router of the segment routed network, identifying a primary path from the first router to the second router satisfying the network requirements, determining a congruent reverse of the primary path satisfies the network requirements, sending, to the first router, the primary path, the first router routing traffic from the first teleprotection relay to the second teleprotection relay using the primary path, and sending, to the second router, the congruent reverse of the primary path, the second router routing traffic from the second teleprotection relay to the first teleprotection relay using the congruent reverse of the primary path.

    Integrating computer vision and wireless data to provide identification

    公开(公告)号:US10176379B1

    公开(公告)日:2019-01-08

    申请号:US15995846

    申请日:2018-06-01

    Abstract: In one example embodiment, an integration system obtains, based on data from a wireless location system, location data of a wireless device in a spatial area. The integration system determines location data of a person in the spatial area based on at least one image of the person captured by a camera. Based on the location data of the wireless device and the location data of the person, the integration system calculates a proximity parameter representing a spatial relationship between the wireless device and the person. Based on the proximity parameter, the integration system computes a probability of association between the wireless device and the person and determines, based on the probability of association, whether the person is a user of the wireless device.

    IDENTIFYING ROGUE WIRELESS DEVICES USING MAC ADDRESS ROTATION TECHNIQUES

    公开(公告)号:US20250016568A1

    公开(公告)日:2025-01-09

    申请号:US18892955

    申请日:2024-09-23

    Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.

Patent Agency Ranking