Patent classifications
H04L41/04
Methods and systems for management of shared network slice instance (NSI) in a wireless network
The present disclosure relates to a communication method and system for converging a 5th-generation (5G) communication system for supporting higher data rates beyond a 4th-generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments herein disclose a network management apparatus, method, and computer-readable storage medium for or management of shared NSI in a communication system.
Virtual infrastructure manager enhancements for remote edge cloud deployments
A system is provided that includes one management cluster to manage network function virtualization infrastructure (NFVI) resources lifecycle in more than one edge POD locations, where resources include hardware and/or software, and where software resources lifecycle includes software development, upgrades, downgrades, logging, monitoring etc. Methods are provided for decoupling storage from compute and network functions in each virtual machine (VM)-based NFVI deployment location and moving it to a centralized location. Centralized storage could simultaneously interact with more than one edge PODs, and the security is built-in with periodic key rotation. Methods are provided for increasing NFVI system viability by dedicating (fencing) CPU core pairs for specific controller operations and workload operations, and sharing the CPU cores for specific tasks.
Virtual infrastructure manager enhancements for remote edge cloud deployments
A system is provided that includes one management cluster to manage network function virtualization infrastructure (NFVI) resources lifecycle in more than one edge POD locations, where resources include hardware and/or software, and where software resources lifecycle includes software development, upgrades, downgrades, logging, monitoring etc. Methods are provided for decoupling storage from compute and network functions in each virtual machine (VM)-based NFVI deployment location and moving it to a centralized location. Centralized storage could simultaneously interact with more than one edge PODs, and the security is built-in with periodic key rotation. Methods are provided for increasing NFVI system viability by dedicating (fencing) CPU core pairs for specific controller operations and workload operations, and sharing the CPU cores for specific tasks.
Cluster computing
In some embodiments, a computer cluster system comprises a plurality of nodes and a software package comprising a user interface and a kernel for interpreting program code instructions. In certain embodiments, a cluster node module is configured to communicate with the kernel and other cluster node modules. The cluster node module can accept instructions from the user interface and can interpret at least some of the instructions such that several cluster node modules in communication with one another and with a kernel can act as a computer cluster.
Cluster computing
In some embodiments, a computer cluster system comprises a plurality of nodes and a software package comprising a user interface and a kernel for interpreting program code instructions. In certain embodiments, a cluster node module is configured to communicate with the kernel and other cluster node modules. The cluster node module can accept instructions from the user interface and can interpret at least some of the instructions such that several cluster node modules in communication with one another and with a kernel can act as a computer cluster.
ACTUATING AN IOT DEVICE ON A FLUID TANK OR GAS USAGE DEVICE REMOTE MONITORING NETWORK
A network of wireless nodes collects data from a fluid tank or gas usage device sensor and uploads the data to the cloud or the Internet. The network allows for a temporary node to integrate into the network such that technicians can access the network without access to the cloud or internet. Data from the sensor may then be used by the system, either locally or remotely, to control or adjust one or more Internet of Things (IoT) devices based on the values of parameters such as tank fluid level or gas usage, etc.
Demand/Response Mechanism in a Wireless Sensor Network
A wireless sensor network at a monitored location can be configured to generate sensor channel(s) of data to assess operational conditions at the monitored location. Inputs based on the sensor channel(s) of data are provided to a host system for analysis of a demand to one or more resources at the monitored location. Response messages can be generated based on the demand analysis and transmitted to actuator(s) at the monitored location to effect an adjustment to the operational conditions.
Demand/Response Mechanism in a Wireless Sensor Network
A wireless sensor network at a monitored location can be configured to generate sensor channel(s) of data to assess operational conditions at the monitored location. Inputs based on the sensor channel(s) of data are provided to a host system for analysis of a demand to one or more resources at the monitored location. Response messages can be generated based on the demand analysis and transmitted to actuator(s) at the monitored location to effect an adjustment to the operational conditions.
Determining transmission path based on pre-stored quality information from client devices
A data transmission method according to an embodiment is performed by a computing device including one or more processors and a memory in which one or more programs to be executed by the one or more processors are stored. The data transmission method includes receiving, from connected client devices, peer-to-peer (P2P) network information of the client devices, extracting one or more of information on whether network access is successful and network quality information, which are matched with the P2P network information and pre-stored, and determining one of a first data transmission path and a second data transmission path as a data transmission path for the client devices based on one or more of the information on whether network access is successful and the network quality information.
Configuration for multi-stage network fabrics
A method includes deploying a network device within a fabric having a management network by attaching the network device through the management network to a port of a role allocator, wherein the role allocator includes one or more ports designated as first level port connections and one or more other ports designated as second level port connections. If the deployed network device is attached to one of the ports designated as first level port connections, the deployed network device is configured as a first level device. If the deployed network device is attached to one of the ports designated as second level port connections, the deployed network device is configured as a second level device.