-
公开(公告)号:US20220078087A1
公开(公告)日:2022-03-10
申请号:US17435362
申请日:2020-02-26
发明人: Robert GRANT
摘要: A method of provisioning mesh communication networks is disclosed. The method involves simulating the performance of a proposed network design to ensure the proposed network design meets service level criteria before provisioning a network in accordance with the proposed network design. Such simulations are required to be comprehensive because highly improbable events can be sufficient to result in a mesh network not meeting the stringent performance criteria which such networks are required to meet. Known methods of provisioning rely on exhaustively listing the mesh network states which would adversely impact the service offered by a proposed network design as part of simulating the performance of the proposed network design—this is an error prone exercise since relevant network states can be missed. A simulation technique is proposed in which the network state after each event is represented by a weighted graph indicating a measure of path cost for each of the links in the mesh network. A graph searching algorithm is applied to seek a path across the graph, thereby systematically exploring paths over mesh network which could provide a suitable route for the service in the simulated network state represented in the graph. Networks are thus provisioned which meet stringent performance criteria without being over-engineered.
-
公开(公告)号:US11265740B2
公开(公告)日:2022-03-01
申请号:US15300592
申请日:2015-03-26
发明人: David Townend , Francis Scahill , Simon Ringland
IPC分类号: H04W24/04 , H04L12/24 , H04L12/26 , H04L12/851 , H04W84/12 , H04W24/08 , H04B3/54 , H04L29/08 , H04L41/5067 , H04L43/08 , H04L43/02 , H04L41/0893 , H04L43/04 , H04L43/062 , H04L43/0888 , H04L41/06 , H04L43/065 , H04L47/2483 , H04L67/02 , H04L43/16 , H04L43/0894
摘要: In a system formed of user devices, a home access point routing device connected to an Internet Service Provider, performance issues such as contention and interference on the home network can be determined. The home access point is arranged to monitor IP Flow information for data sessions between user devices and remote servers over a wireless or powerline Ethernet home network and performance issues are determined by the home access point or by a management server.
-
公开(公告)号:US20220060485A1
公开(公告)日:2022-02-24
申请号:US17417571
申请日:2019-12-11
发明人: Xiao-Si WANG , Zhan CUI
IPC分类号: H04L29/06
摘要: A computer implemented method of protecting a network of computer systems, the method comprising: receiving security data for the network, the security data comprising threat event data for threat events detected within the network over a period of time; extracting, from the received security data, one or more features indicative of a computer system being compromised by a particular threat; generating a forecast of a number of computer systems in the network compromised by the particular threat at a future point in time based on the one or more features; determining whether action should be taken to mitigate the particular threat based on the forecast; and in response to determining that action should be taken, causing one or more predetermined actions to be taken to mitigate the particular threat.
-
公开(公告)号:US20220060448A1
公开(公告)日:2022-02-24
申请号:US17309769
申请日:2019-12-18
发明人: Catherine WHITE
IPC分类号: H04L29/06
摘要: A network device detecting possible malicious traffic and enlists the help of a co-operative group of downstream routers to perform enhanced deep packet analysis and firewalling in parallel with the transport of the packet through the network. The routers may also use other remote computational resource to perform some of the analysis along or close to the route 80 of the packet through the network. The packets are cached at the exit edge router, which does not release the packet from the cooperative group until all analyzers report the traffic is safe, or deletes the traffic if identified as malicious. By buffering at the remote end the packet can be forwarded promptly if approved, but protects downstream components if the traffic is malicious. Routing policies through the network are chosen according to initial estimates of the likelihood that a packet will be permitted to be forwarded from the downstream router, and of the time likely to be taken to reach a decision, allowing cache capacity requirements to be minimized by using higher-latency routes for packets unlikely to be forwarded promptly.
-
公开(公告)号:US11206260B2
公开(公告)日:2021-12-21
申请号:US16067203
申请日:2017-01-05
发明人: Simon Beddus , Paul Deans
摘要: An intermediate data transmission device arranges for mutual authentication between itself and a remote terminal to allow data to be exchanged between the remote terminal and a server through the device. The server sends first and second key codes to the intermediate device, the key codes both being derived from a shared secret known to the server and remote terminal but not to the intermediate device. In response to a challenge from the intermediate device the remote terminal uses the shared secret to generate a duplicate of the first key code and transmits the duplicate to the intermediate device. The intermediate device compares the first key code and the duplicate of the first key code received respectively from the server and the remote terminal to verify the authenticity of the remote terminal. The intermediate device then transmits the second key code to the remote terminal, to be compared by the remote terminal with a duplicate of the second key code to verify the authenticity of the intermediate device. This process allows the intermediate device to be used without itself having the shared secret. The codes generated by the server may be encoded with a network identity of the intermediate device using the shared secret, such that the remote terminal can only respond to the same intermediate device that transmitted the codes. This prevents a “man-in-the middle” attack by another intermediate device, as without the shared secret no intermediate device can modify the codes to include a different network identity.
-
公开(公告)号:US11201876B2
公开(公告)日:2021-12-14
申请号:US16065482
申请日:2016-12-15
发明人: George Kallos , Fadi El-Moussa
摘要: A computer implemented method to identify malicious software in a computer system includes receiving an indication of a detection of malicious network traffic communicated via a computer network accessed by the computer system; identifying a software component involved in the malicious network traffic at the computer system; evaluating a measure of a correlation fractal dimension (CFD) for at least a portion of the software component; and storing the measure of CFD for subsequent comparison with a second measure of CFD for a corresponding portion of a second software component in the computer system to identify the second software component as a software component involved in malicious network communication.
-
公开(公告)号:US11196649B2
公开(公告)日:2021-12-07
申请号:US17250243
申请日:2019-06-21
发明人: Francis Scahill , Simon Ringland , Timothy Twell
IPC分类号: H04L12/26
摘要: Methods and apparatus are disclosed for processing local area network diagnostic data obtained in respect of a local area network (LAN). The method includes identifying, from local area network diagnostic data obtained in respect of the LAN, a set of data units including a first and an associated second data unit having a predetermined relationship; updating the first data unit of the set to include an indication that the associated second data unit of the set has been identified; and sending the updated first data unit without the associated second data unit from the LAN for performance analysis at a remote network diagnostic device outside the LAN.
-
公开(公告)号:US11196457B2
公开(公告)日:2021-12-07
申请号:US16969674
申请日:2019-02-12
发明人: Daniel Gilks , Philip Bull
摘要: Interference on DSL (Digital Subscriber Lines) systems can be identified by collecting modem data and determining, for a plurality of time intervals, whether the line is carrying traffic and/or whether there are errors on the line. The presence of interference can be inferred from the correlation of the traffic data and the error data.
-
公开(公告)号:US11171855B2
公开(公告)日:2021-11-09
申请号:US16494179
申请日:2018-02-09
摘要: A method of dimensioning a link in a telecommunications network, and a device for implementing the method, the method including determining, for a first plurality of sets of traffic observations, wherein each set of the first plurality of sets includes a series of traffic observations each indicating the amount of traffic on a link within an observation interval of a particular duration for that set, a peak value of a traffic observation of the series of traffic observations within each set of the first plurality of sets and an average value of the series of traffic observations within each set of the first plurality of sets; calculating a first peak to average ratio for each observation interval duration based on the determined peak and average values within each set of the first plurality of sets; determining a goodness of fit value for a power function of the first peak to average ratio against its respective observation interval duration; selecting a dimensioning interval duration based on the determined goodness of fit value; and estimating a capacity of the link based on the selected dimensioning interval duration.
-
公开(公告)号:US20210337440A1
公开(公告)日:2021-10-28
申请号:US17250978
申请日:2019-09-06
摘要: This disclosure relates to a method in a cellular telecommunications network, the cellular telecommunications network having a plurality of base stations each having at least one transmitter, each transmitter having at least one coverage area, the method including a first transmitter operating in a first state so as to transmit within a first coverage area according to a first cellular communications protocol only; receiving a request for service according to a second cellular communications protocol in the first coverage area; and, in response, the first transmitter operating in a second state so as to transmit within the first coverage area according to both the first cellular communications protocol and a second cellular communications protocol, wherein the second cellular communications protocol is an older generation than the first cellular communications protocol.
-
-
-
-
-
-
-
-
-