Enhancing Visibility in a Heterogeneous Network

    公开(公告)号:US20190124541A1

    公开(公告)日:2019-04-25

    申请号:US15792477

    申请日:2017-10-24

    Abstract: A method for providing enhanced visibility in heterogeneous network. The method comprises receiving, at a networking device housing a cellular base station and a WLAN access point, cellular network traffic from an electronic device. The method further comprises receiving, at the networking device, WLAN traffic from the electronic device and encapsulating, at the networking device, the cellular network traffic and the WLAN traffic using a common protocol. The method further comprises transmitting the encapsulated cellular traffic and the encapsulated WLAN traffic to a controller.

    NETWORK STATISTICS ESTIMATION AND PREDICTION

    公开(公告)号:US20180343177A1

    公开(公告)日:2018-11-29

    申请号:US15602928

    申请日:2017-05-23

    Abstract: A network computing device determines a network topology for at least one network flow path between at least one ingress network border device and at least one egress network border device. The network computing device receives a message containing data indicating flow statistics for the at least one ingress network border device. The network computing device generates flow statistics for at least one network device along the at least one network flow path from the network topology and the flow statistics for the at least one ingress network border device. The network computing device generates the flow statistics for at least one network device along the at least one network flow path without receiving flow statistics from the at least one network device along the at least one network flow path.

    Network statistics estimation and prediction

    公开(公告)号:US10608930B2

    公开(公告)日:2020-03-31

    申请号:US15602928

    申请日:2017-05-23

    Abstract: A network computing device determines a network topology for at least one network flow path between at least one ingress network border device and at least one egress network border device. The network computing device receives a message containing data indicating flow statistics for the at least one ingress network border device. The network computing device generates flow statistics for at least one network device along the at least one network flow path from the network topology and the flow statistics for the at least one ingress network border device. The network computing device generates the flow statistics for at least one network device along the at least one network flow path without receiving flow statistics from the at least one network device along the at least one network flow path.

    CONTROLLING ACCESS TO NETWORKS IN A HETEROGENEOUS NETWORK ENVIRONMENT

    公开(公告)号:US20210120000A1

    公开(公告)日:2021-04-22

    申请号:US17136426

    申请日:2020-12-29

    Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.

    Controlling access to networks in a heterogeneous network environment

    公开(公告)号:US10911453B2

    公开(公告)日:2021-02-02

    申请号:US15854155

    申请日:2017-12-26

    Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.

    Opportunistic network-based location detection using unsolicited data packets

    公开(公告)号:US10548109B2

    公开(公告)日:2020-01-28

    申请号:US15631535

    申请日:2017-06-23

    Inventor: Mark Allen Webb

    Abstract: In one embodiment, a method comprises a network device receiving one or more unsolicited data packets output by a plurality of source network devices, each unsolicited data packet comprising a corresponding link layer header and a corresponding network layer header; the network device parsing, from each unsolicited data packet within at least one of its corresponding link layer header or corresponding network layer header, a time type-length-value (TLV) element specifying a corresponding transmission time of the data packet from one or more corresponding source network devices, and a location TLV element specifying a corresponding location of the corresponding one or more source network devices; and the network device determining its corresponding location based on the time TLV elements and the location TLV elements parsed from the respective unsolicited data packets.

    Controlling Access to Networks in a Heterogeneous Network Environment

    公开(公告)号:US20190199725A1

    公开(公告)日:2019-06-27

    申请号:US15854155

    申请日:2017-12-26

    Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.

    Virtualized path identifier providing generic descriptors for reaching a destination using an identified path determination method

    公开(公告)号:US10225190B2

    公开(公告)日:2019-03-05

    申请号:US15244952

    申请日:2016-08-23

    Inventor: Mark Allen Webb

    Abstract: In one embodiment, a method comprises: acquiring a data structure containing a virtualized path identifier, the virtualized path identifier specifying a path determination method and a destination identifier that identifies a destination that is reachable according to the path determination method; determining in a route method database based on the virtualized path identifier, from among distinct types of available path determination methods identified in the route method database, a routing context for reaching the destination according to the corresponding path determination method; and causing reaching of the destination in response to executing the path determination method on the destination identifier according to the routing context obtained from the route method database.

Patent Agency Ranking