H04L41/00

Dynamic processing distribution for utility communication networks

Technologies for implementing edge intelligence for utility communication networks are provided. For example, a system includes a mesh network and a utility fog configured to manage the mesh network. The utility fog includes a secure utility system configured for executing a private utility application and a first edge intelligence device configured for executing a first subset of software applications. Each software application is configured to manage endpoints in the mesh network or process data collected by the mesh network. The mesh network includes the endpoints and an edge intelligence device configured for executing a second subset of the software applications that is different from the first subset of software applications.

Intent-based, network-aware network device software-upgrade scheduling

A controller device manages a plurality of network devices. The controller device includes one or more processing units configured to receive an upgrade request; obtain a redundancy model indicating network device redundancies or service redundancies; determine, based on the upgrade request and the redundancy model, an update graph having nodes each representing one of the network devices or one of the services, the update graph also having at least one edge that connects two of the nodes and that indicates the network redundancy or the service redundancy; determine, based on the update graph including the at least one edge, an update schedule for performing an update of software for the network devices that ensures availability for the first network device or second network device or availability for the service; and update the software of each of the network devices according to the update schedule.

INTERCONNECTION PLATFORM FOR REAL-TIME CONFIGURATION AND MANAGEMENT OF A CLOUD-BASED SERVICES EXCHANGE

In one example, a cloud-based services exchange comprises a plurality of interconnection assets configured to connect a customer of the cloud-based services exchange to one or more cloud service providers, the plurality of interconnection assets including a virtual circuit by which the customer accesses a cloud service from the one or more cloud service providers; and an orchestration engine configured to modify the plurality of interconnection assets.

INTERCONNECTION PLATFORM FOR REAL-TIME CONFIGURATION AND MANAGEMENT OF A CLOUD-BASED SERVICES EXCHANGE

In one example, a cloud-based services exchange comprises a plurality of interconnection assets configured to connect a customer of the cloud-based services exchange to one or more cloud service providers, the plurality of interconnection assets including a virtual circuit by which the customer accesses a cloud service from the one or more cloud service providers; and an orchestration engine configured to modify the plurality of interconnection assets.

TRAFFIC FLOW MONITORING
20170373950 · 2017-12-28 ·

A method is provided comprising monitoring, in a network node, a user plane traffic flow transmitted in a network, to perform measurements on selected data packets. Based on the monitoring, the network node collects in a correlated way, one or more of user measurement data, application measurement data, quality of experience measurement data, network side quality of service measurement data and a set of key performance indicators. Based on the collecting, the network node generates real-time correlated insight to customer experience.

SYSTEMS AND METHODS FOR AVOIDING DOUBLE ACCOUNTING UPON SESSION FAILOVER
20170374203 · 2017-12-28 ·

Systems, methods, and software that perform offline charging. One embodiment comprises a Charging Data Function (CDF) of an Offline Charging System (OFCS). The CDF receives accounting requests for a session from a Charging Trigger Function (CTF), and generates an incomplete Charging Data Record (CDR) for the session based on the accounting requests. The CDF identifies request identifiers (ID) assigned to the accounting requests used to generate the first incomplete CDR, and inserts the request IDs in the incomplete CDR. The CDF determines whether one or more of the accounting requests used to generate the incomplete CDR were indicated as a re-transmitted accounting request by the CTF, and inserts content information for the re-transmitted accounting request(s) in the incomplete CDR.

Method and apparatus for layer 2 discovery in a managed shared network
09853865 · 2017-12-26 · ·

Methods and systems are provided for Layer 2 (L2) discovery in a managed shared network, such as a Multimedia over Coax Alliance (MoCA) network. A network controller node of the MoCA network node may receive, from a node entering the MoCA network, a submission requesting discovery of information regarding communication capabilities of a plurality of nodes in the network. In response to the request, the network controller node may obtain from one or more nodes of the plurality of nodes information regarding communication capabilities of the plurality of nodes, and may send the communication capabilities of the plurality of nodes, such as to a second plurality of nodes.

Verification of computer system prior to and subsequent to computer program installation

Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the invention, an anomaly is detected in a computing environment of multiple different computing devices disposed in multiple different network domains. Thereafter, administrative network privileges to access the multiple different network domains are acquired and existing resources in the computing environment are identified. Additionally, a signature file is loaded into a memory of the computer, where the signature file denotes infrastructure requirements of the computing environment, and the existing resources and the infrastructure requirements denoted in the signature file are compared to determine whether a disparity exists between the existing resources and the infrastructure requirements. Upon determining that the disparity exists between the existing resources and the infrastructure requirements a configuration of the computing environment of the multiple different computing devices is adjusted to fix the disparity.

Authentication of service requests using a communications initiation feature

Described are computer-based methods and apparatuses, including computer program products, for facilitating communications initiated through a social networking account. A detected message communicated using a social networking account can be determined to satisfy a response criteria. Code for displaying a communications initiation feature on a customer communications apparatus associated with the social networking account can be transmitted. Selection information representing a selection of the communications initiation feature can be received and can include a parameter associated with the selection and origin information. The selection information can be validated by determining that the selection is associated with the social networking account and by comparing the parameter with a stored credential associated with the communications initiation feature. When the selection is validated, the communications can be facilitated.

Authentication of service requests using a communications initiation feature

Described are computer-based methods and apparatuses, including computer program products, for facilitating communications initiated through a social networking account. A detected message communicated using a social networking account can be determined to satisfy a response criteria. Code for displaying a communications initiation feature on a customer communications apparatus associated with the social networking account can be transmitted. Selection information representing a selection of the communications initiation feature can be received and can include a parameter associated with the selection and origin information. The selection information can be validated by determining that the selection is associated with the social networking account and by comparing the parameter with a stored credential associated with the communications initiation feature. When the selection is validated, the communications can be facilitated.