Patent classifications
H04L41/18
Modifying realized topologies
A method of updating and editing realized topologies, comprising presenting a realized topology to a user, receiving input indicating modification of portions of the realized topology, and with a processor, executing logic associated with the modified portions based on a number of lifecycle management actions (LCMAs) of the realized topology. A system to update and edit a realized topology, comprising a processor and a graphical user interface (GUI) communicatively coupled to the processor, in which the GUI presents to a user a graphical representation of the realized topology, and in which the system receives input indicating modification of portions of the realized topology, and with a processor, executes logic associated with the modified portions based on a number of lifecycle management actions (LCMAs) of the realized topology.
CUSTOMIZABLE DATA-PROCESSING NETWORK FUNCTIONS FOR RADIO-BASED NETWORKS
Disclosed are various embodiments that provide customizable data-processing network functions for radio-based networks. In one embodiment, a data-processing network function is operated in a radio-based network for a customer. Input data is received from the customer to configure the data-processing network function to perform a customized function for the radio-based network. The data-processing network function is configured, in response to the input data, to perform the customized function when executed in the radio-based network.
Software defined networking portal
Implementations described and claimed herein provide systems and methods for custom-defined network routing. In one implementation, a set of custom defined network flow rules is received at an edge router of a primary network, which is in communication with a customer network. The set of custom defined network flow rules correspond to network traffic associated with the customer network. The set of custom defined network flow rules is stored in a forwarding table on the edge router. A packet of data is received at the edge router. The packet of data is attributed to the customer network. The set of custom defined network flow rules is applied to the pack of data using the forwarding table.
Software defined networking portal
Implementations described and claimed herein provide systems and methods for custom-defined network routing. In one implementation, a set of custom defined network flow rules is received at an edge router of a primary network, which is in communication with a customer network. The set of custom defined network flow rules correspond to network traffic associated with the customer network. The set of custom defined network flow rules is stored in a forwarding table on the edge router. A packet of data is received at the edge router. The packet of data is attributed to the customer network. The set of custom defined network flow rules is applied to the pack of data using the forwarding table.
METHOD AND APPARATUS FOR PROVIDING VENDOR REMOTE SUPPORT AND MANAGEMENT
An approach is provided for establishing a vendor portal configured to provide remote control and management of one or more devices of a customer by a plurality of vendors. The device can then be remotely controlled, accessed, or operated upon via the vendor portal.
INTENT EXECUTION METHOD AND APPARATUS
The present disclosure relates to intent execution methods and apparatus. In one example method, an element management system (EMS) receives a first intent from a network management system (NMS). The first intent indicates the EMS to execute a first command on a first network element and execute a second command on a second network element, a second intent in an active state is maintained in the EMS, the second intent indicates the EMS to execute a third command on the first network element, and the first command and the third command are mutually exclusive. The EMS receives a first parameter and conflict policy information. The EMS determines whether to execute the second command on the second network element, and executes the first command or the third command on the first network element based on the conflict policy information.
INTENT EXECUTION METHOD AND APPARATUS
The present disclosure relates to intent execution methods and apparatus. In one example method, an element management system (EMS) receives a first intent from a network management system (NMS). The first intent indicates the EMS to execute a first command on a first network element and execute a second command on a second network element, a second intent in an active state is maintained in the EMS, the second intent indicates the EMS to execute a third command on the first network element, and the first command and the third command are mutually exclusive. The EMS receives a first parameter and conflict policy information. The EMS determines whether to execute the second command on the second network element, and executes the first command or the third command on the first network element based on the conflict policy information.
POLICY ENFORCEMENT POINT FOR A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A system provides cloud-based identity and access management. The system receives a request by a web gate for an identity management service for reaching an application, and determines a tenancy from a header value of the request. The system looks up a policy configured to be applied for the tenancy, and applies the policy to the request. The system then sends the request to a microservice based on a result of the applying of the policy to the request, where the microservice performs the identity management service for reaching the application.
User-directed diagnostics and auto-correction
A method, system, and computer program product for performing user-initiated logging and auto-correction in hardware/software systems. Embodiments commence upon identifying a set of test points and respective instrumentation components, then determining logging capabilities of the instrumentation components. The nature and extent of the capabilities and configuration of the components aid in generating labels to describe the various logging capabilities. The labels are then used in a user interface so as to obtain user-configurable settings which are also used in determining auto-correction actions. A measurement taken at a testpoint may result in detection of an occurrence of a certain condition, and auto-correction steps can be taken by retrieving a rulebase comprising a set of conditions corresponding to one or more measurements, and corrective actions corresponding to the one or more conditions. Detection of a condition can automatically invoke any number of processes to apply a corrective action and/or emit a recommendation.
Systems and methods for cloud-enabled data services
Systems and methods are disclosed for permitting users to select and implement data management services. Systems and methods receive a user selection from a user interface representation of a cloud marketplace. The user selection can include a use case specific instruction relating to the user selection representing a particular one of the plurality of cloud-enabled services. Systems and methods obtain service set up data from the user corresponding to particular aspects of the user selection. Based on the received user selection and the service set up data, a computer-executable file is created for a user identified computer, where the computer executable file, upon execution on the user identified computer, establishes a data path between a user data location and a cloud-enabled service corresponding to the user selection. Following commencement of the cloud-enabled service, the system and method provide data including usage and billing to users, cloud-enabled service providers and marketplaces.