H04L41/12

Mechanism to identify link down reasons
11582297 · 2023-02-14 · ·

Methods, systems, and devices are provided herein for a mechanism to identify link down reasons. As described herein, a first port of a first peer device may be determined to have unexpectedly changed to a port down state. Subsequently, a topology file may be referenced to identify a second port of a second peer device with which the first peer device is intended to have a link if not for the first port being in a port down state. In some examples, port settings of the first port may be compared with port settings of the second port. If a port setting for the first port mismatches an associated port setting for the second port, an alert message may be transmitted to a network administrator indicating this mismatch as a possible reason for the first port being in the port down state.

Mechanism to identify link down reasons
11582297 · 2023-02-14 · ·

Methods, systems, and devices are provided herein for a mechanism to identify link down reasons. As described herein, a first port of a first peer device may be determined to have unexpectedly changed to a port down state. Subsequently, a topology file may be referenced to identify a second port of a second peer device with which the first peer device is intended to have a link if not for the first port being in a port down state. In some examples, port settings of the first port may be compared with port settings of the second port. If a port setting for the first port mismatches an associated port setting for the second port, an alert message may be transmitted to a network administrator indicating this mismatch as a possible reason for the first port being in the port down state.

IIoT asymmetric reactive buffering to dynamically manage and optimize in-motion data batch size

A reactive buffering system for use in IIoT data pipelines dynamically adjusts data accumulation and delivery by a node of a pipeline based on aggregated downstream metrics representing current data processing latencies of downstream nodes. Based on these downstream performance metrics, a reactive node that adjusts the size of the next data batch to be sent to an adjacent downstream node. The nodes of the data pipeline are configured to support a request-response based handshaking protocol whereby the nodes that send data to downstream nodes maintain up-to-date performance level information from adjacent downstream nodes. With this performance information, together with pipeline priorities, the sending node (or reactive node) adjusts the transmission rate and intermediate buffering of data. In this way, the nodes of the pipeline can dynamically regulate interim data storage to avoid overwhelming the pipeline system with too much data during periods of high latency.

IIoT asymmetric reactive buffering to dynamically manage and optimize in-motion data batch size

A reactive buffering system for use in IIoT data pipelines dynamically adjusts data accumulation and delivery by a node of a pipeline based on aggregated downstream metrics representing current data processing latencies of downstream nodes. Based on these downstream performance metrics, a reactive node that adjusts the size of the next data batch to be sent to an adjacent downstream node. The nodes of the data pipeline are configured to support a request-response based handshaking protocol whereby the nodes that send data to downstream nodes maintain up-to-date performance level information from adjacent downstream nodes. With this performance information, together with pipeline priorities, the sending node (or reactive node) adjusts the transmission rate and intermediate buffering of data. In this way, the nodes of the pipeline can dynamically regulate interim data storage to avoid overwhelming the pipeline system with too much data during periods of high latency.

Multi-services gateway device at user premises

An application gateway including application service programming positioned at a user premises can provide voice controlled and managed services to a user and one or more endpoint devices associated with the application gateway. The application gateway can be controlled remotely by the application service provider through a service management center and configured to execute an application service provided from the application service provider. The application gateway can execute the application service at the user premises upon voice command by a user and independent of application services executing on the application service provider's network. An application service logic manager can communicate with an application service enforcement manager to verify that the request conforms with the policy and usage rules associated with the application service in order to authorize execution of the application service on the application gateway, either directly or through endpoint devices.

Multi-services gateway device at user premises

An application gateway including application service programming positioned at a user premises can provide voice controlled and managed services to a user and one or more endpoint devices associated with the application gateway. The application gateway can be controlled remotely by the application service provider through a service management center and configured to execute an application service provided from the application service provider. The application gateway can execute the application service at the user premises upon voice command by a user and independent of application services executing on the application service provider's network. An application service logic manager can communicate with an application service enforcement manager to verify that the request conforms with the policy and usage rules associated with the application service in order to authorize execution of the application service on the application gateway, either directly or through endpoint devices.

Provisioning network devices using a vendor-neutral platform

Network devices are provisioned using a single vendor-neutral data model with a non-relational database. Provisioning requirements are collected upon detecting a new network device that needs to be configured and/or installed. Based on the provisioning requirements, a configuration object is retrieved using a data model in the non-relational database. The configuration object is transformed to a concrete configuration file for the network device. After applying the configuration file to the network device, a separate process validates the configuration of the network device by comparing the observed network configuration with the initial target configuration data included in the configuration object.

Provisioning network devices using a vendor-neutral platform

Network devices are provisioned using a single vendor-neutral data model with a non-relational database. Provisioning requirements are collected upon detecting a new network device that needs to be configured and/or installed. Based on the provisioning requirements, a configuration object is retrieved using a data model in the non-relational database. The configuration object is transformed to a concrete configuration file for the network device. After applying the configuration file to the network device, a separate process validates the configuration of the network device by comparing the observed network configuration with the initial target configuration data included in the configuration object.

Techniques for sharing device capabilities over a network of user devices

Techniques are disclosed for generating device cluster capability information for a cluster of devices in a network environment. Capability information can specify capabilities of the devices in the cluster. A first user device can generate device capabilities for the first user device and obtain device capabilities for other devices in the cluster. The first user device can generate cluster capability information providing an intersection of the first set of device capabilities and device capabilities of the other user devices in the cluster. The first user device can obtain cluster capability information for other clusters in the network environment and receive a request from a service user device to perform a specific task. The first user device can transmit cluster capability information relating to a selected cluster that corresponds with the request.

Techniques for sharing device capabilities over a network of user devices

Techniques are disclosed for generating device cluster capability information for a cluster of devices in a network environment. Capability information can specify capabilities of the devices in the cluster. A first user device can generate device capabilities for the first user device and obtain device capabilities for other devices in the cluster. The first user device can generate cluster capability information providing an intersection of the first set of device capabilities and device capabilities of the other user devices in the cluster. The first user device can obtain cluster capability information for other clusters in the network environment and receive a request from a service user device to perform a specific task. The first user device can transmit cluster capability information relating to a selected cluster that corresponds with the request.