Abstract:
A method performed by a node in a wireless communication network of estimating parameters used for determining a signal-to-interference measure at a communication device served by a base station, and a node performing the method. The method comprises acquiring an estimate of channel condition between the communication device and the serving base station, and between the communication device and at least one base station of a neighbouring cell, estimating the signal-to-interference measure using the estimate of the respective channel condition, and acquired output power and Physical Resource Block (PRB) utilization of each of the base stations, and receiving an indication of quality of a channel via which the communication device is served by the base station. The method further comprises determining whether a change in the estimate of the signal-to-interference measure is required based on the indication of channel quality, and updating the estimate of the channel condition.
Abstract:
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalous behavior. Data collected by a Unified Host Collection Agent (“UHCA”) may also be used to detect anomalous behavior.
Abstract:
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalous behavior. Data collected by a Unified Host Collection Agent (“UHCA”) may also be used to detect anomalous behavior.
Abstract:
Power Over Ethernet (POE)/universal power over Ethernet (UPoE) may be enabled at multigigabit port-channel connections. This may allow for additional speed support in auto-negotiation messages while employing multigigabit speeds. An integrated connector module (referred to herein as a “ICM”) compatible with UPoE with a modified local physical layer (PHY) circuit may be capable of supporting multi-gigabit data rates (such as between 1 G to 10 G, e.g., 2.5 G and 5 G) as to not limit the data rates to 1 G. The ICM may provide multi-gig data transmission through a first plurality of pins comprising a multi-gig data pin area. Furthermore, the ICM may provide UPoE power to support the multi-gig transmission through a second plurality of pins comprising a UPoE power pin area.
Abstract:
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalous behavior. Data collected by a Unified Host Collection Agent (“UHCA”) may also be used to detect anomalous behavior.
Abstract:
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
Abstract:
Various aspects described herein relate to transmitting hybrid automatic repeat/request (HARQ) feedback. A HARQ communication can be received over a set of one or more links based on a first scheduling grant. One or more interference parameters related to receiving the HARQ communication can be determined as well as one or more predicted interference parameters for a next HARQ communication. HARQ feedback can be transmitted for the HARQ communication including the one or more interference parameters and the one or more predicted interference parameters.
Abstract:
A method and a network node (110, 111) for determining first channel state information in an upcoming time slot for use by a first radio network node (111) when determining a set of radio transmission parameters for a transmission between the first radio network node (111) and a second radio network node (121) are provided. The net work node (110, 111) receives (201) second channel state information for said upcoming time slot. Furthermore, the network node (110, 111) determines (207) third channel state information for said upcoming time slot. The second and third channel state information are at least partly non-overlapping with each other. Next, the network node (110, 111) determines (208) the first channel state information, for said upcoming time slot, based on the second channel state information and the third channel state information.
Abstract:
Applicants have discovered that error detection techniques, such as Forward Error Correction techniques, may be used to predict the degradation below a certain threshold of an ability to accurately convey information on a communication channel, for example, to predict a failure of the communication channel. In response, transmission and/or reception of information on the channel may be adapted, for example, to prevent the degradation below the threshold, e.g., prevent channel failure. Predicting the degradation may be based, at least in part, on data transmission error information corresponding to one or more blocks of information received on the channel and may include determining an error rate pattern over time. Based on these determinations, the degradation below the threshold may be predicted and the transmission and/or reception adapted. Adapting may include initiating use of a different error encoding scheme and/or using an additional communication channel to convey information.
Abstract:
Adjustable data rate data communications may be provided. First, a plurality of remote data rates at which a remote device is configured to operate may be received. Then, a plurality of local data rates at which a local device is configured to operate may be received. A greatest one of the plurality of local data rates may comprise a cable data rate comprising a greatest rate supported by a length of cable connecting the local device and the remote device. Next, an operating data rate may be determined. The operating data rate may comprise a highest one of the plurality of local data rates that has a corresponding equivalent within the plurality of remote data rates. The local device may then be operated at the operating data rate.