Abstract:
An example method is provided and may include steps of configuring a HeNB with plurality of global eNode B identities (global eNB IDs), where each global eNB ID is associated with one of a plurality of HeNB gateways (HeNB-GWs), and broadcasting a first global eNB ID by the HeNB when the HeNB is served by a first HeNB-GW. When/if the HeNB loses connectivity with the first HeNB-GW, the method provides a step of switching the broadcasting from the first global eNB ID to a second global eNB ID and re-parenting the HeNB, now broadcasting or is configured to start/continue broadcasting the second global eNB ID, from being served by the first HeNB-GW to being served by a second HeNB-GW.
Abstract:
Provided herein are techniques to facilitate vulnerability management for one or more endpoint devices of a network based on network infrastructure security context. In one example, a computer-implemented method may include determining a base vulnerability score for a particular vulnerability that is detected for an endpoint device of an enterprise network; determining topology information for the endpoint device within the enterprise network; translating the particular vulnerability to triggering information; performing a comparison between the security policies for the one or more network security mechanisms of network security infrastructure and the triggering information to determine whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device; and generating an updated vulnerability score for the particular vulnerability by adjusting the base vulnerability score based on whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device.
Abstract:
The present disclosure is directed to a comprehensive Route Selection Policy (URSP) based on Wi-Fi multi-link operation. In one aspect, a method includes identifying a user device connected to an enterprise network that provides network connectivity to user devices over multiple radio access technologies; receiving network capability information indicating that the user device is capable of a multi-link operation over a Wi-Fi network, the Wi-Fi network being one of the multiple radio access technologies; determining a URSP for the user device, wherein the URSP is a singular route selection policy for the user device to send and receive data over the multiple radio access technologies and defines, in part, a per-application traffic routing rule for routing a portion of traffic for an application used on the user device, over one of multiple links available on the Wi-Fi network; and transmitting the URSP to the user device.
Abstract:
Systems, methods, and computer-readable media are provided for inter-network messaging among private and public 5G networks. For instance, a first server on a public 5G mobile network can receive a first message directed to a first wireless device associated with a first network identity. The first server can determine, based on the first network identity, that the first wireless device is associated with a second network identity, wherein the second network identity is used to identify the first wireless device on a private 5G mobile network. The first server can send a copy of the first message to a second server on the private 5G mobile network for transmission to the first wireless device through the private 5G mobile network based on the second network identity.
Abstract:
In one embodiment, a device identifies a port associated with a backend probing agent for a cloud-hosted application. The device performs external probing of a path to the cloud-hosted application by sending a probe along the path to the port, to generate external probing results. The device triggers the backend probing agent to generate backend probing results by performing backend probing of a backend service used by the cloud-hosted application. The device causes formation of unified probing results that correlate the external probing results and the backend probing results.
Abstract:
Techniques are described herein for pairing disaggregated network elements. In one example, a pairing manager obtains an indication to prioritize high availability when pairing disaggregated network elements. The disaggregated network elements include first disaggregated network elements and second disaggregated network elements. The pairing manager obtains, from one or more of the disaggregated network elements, topology information of the disaggregated network elements. Based on the topology information and the indication to prioritize high availability, the pairing manager pairs topologically-adjacent ones of the first disaggregated network elements with different ones of the second disaggregated network elements.
Abstract:
Audio is captured from an online meeting and words being spoken by a participant during the online meeting from the audio are identified. One or more suggested next words or phrases to be spoken by the participant are determined based on the words being spoken by the participant and one or more scores associated with previous words spoken by the participant. The words being spoken by the participant and the one or more suggested next words or phrases are generated for display to the participant.
Abstract:
Presented herein are techniques to facilitate wireless wide area (WWA) virtualized Radio Access Network (vRAN) (e.g., 5G) to wireless local area (WLA) RAN (e.g., Wi-Fi) steering or WLA RAN to WWA vRAN steering for one or more UE. In one example, a method may include obtaining first performance metrics associated with links of a WWA vRAN (e.g., fronthaul, midhaul, and backhaul links); obtaining second performance metrics associated with links WLA RAN (e.g., backhaul links); and in response to determining that one of the WWA vRAN is experiencing degraded performance based on the first performance metrics or the WLA RAN the second performance metrics, activating a steering event that causes, at least in part, an indication to be communicated to a UE to cause the UE to connect to the WWA vRAN or the WLA RAN that is not experiencing degraded performance.
Abstract:
The present technology provides for efficient re-association of a STA from a first Wi-Fi AP to a second Wi-Fi AP where the respective Wi-Fi APs utilize different security protocols. Since the association and key management (AKM) protocols are different and the cipher suites between generations of Wi-Fi technology, a STA normally would not be able to take advantage of the fast transition process. However, since the present technology allows the STA to derive the security keys in advance, the STA can perform the fast transition and efficiently roam to the Wi-Fi AP that utilizes a different association and key management (AKM) version.
Abstract:
A system and method for stateful access point link disablement mechanisms for improving network efficiency. In one embodiment, a method includes receiving a management frame that indicates a data transfer from a station, where the management frame comprises information identifying one or more characteristics of the data transfer, selecting a communication link based at least in part on the management frame, and communicating information associated with the communication link to one or more other stations.