Patent classifications
H04L41/20
Network function virtualization compute element image upgrade
A network function virtualization (NFV) compute element installs an image supporting a virtualized network function (VNF) on the element. The image includes instructions/data to initiate a TCP connection between the element and a Software Defined Network (SDN) controller upon reboot of the element. Upon rebooting, the element establishes, as client in accordance with the instructions/data, a TCP connection with the controller. The element then accepts, as a cryptographic network protocol server, a connection via the TCP connection from the controller as a client in accordance with the instructions. Next, the element accepts, as a network management protocol server, a connection via the cryptographic network protocol connection from the controller as network management protocol client. The element receives, from the controller over the network management protocol connection, commands regarding the status of the rebooted element, and then transmits, to the controller over the network management protocol connection, responses to the commands.
EDGE COMPUTING-BASED CONTROL METHOD AND APPARATUS, EDGE DEVICE AND STORAGE MEDIUM
Provided are an edge computing-based control method and apparatus, an edge device and a storage medium. The method includes that: an analysis processing tool for implementing image analysis processing in a cloud server is acquired; in a case where the cloud server is in a fault state, image analysis processing is performed on a to-be-processed image with the analysis processing tool to obtain an analysis processing result; and the analysis processing result is synchronized to the cloud server.
Assisting Users with Efficient Information Sharing among Social Connections
In one embodiment, a method includes receiving a user input from a first user at the first client system, determining that the user input is a sharing request to share content, determining multiple second users the sharing request is directed to, determining, for each second user, modalities associated with the respective second user based on the content, a user profile associated with the respective second user, and modalities supported by a second client system the respective second user is currently engaged with, the respective second user being associated with two or more second client systems, and sending, to one or more second client systems currently associated with the second users, instructions for accessing the content based on the determined modalities for each second user.
Systems and methods to control operation of virtualized networks
An intelligent agent monitors operation of at least one software virtualized network (VN). Context information associated with the VN is used to analyze a state of the VN. At least one configuration change is caused to the VN in response to analysis of the state of the VN. A change is identified to the state of the VN caused by the configuration change. A determination is made as to whether or not the change to the state of the VN is an improvement to operation of the VN. A response to the determination is made by causing at least one other configuration change to the VN.
Network Function Virtualization Compute Element Image Upgrade
A network function virtualization (NFV) compute element installs an image supporting a virtualized network function (VNF) on the element. The image includes instructions/data to initiate a TCP connection between the element and a Software Defined Network (SDN) controller upon reboot of the element. Upon rebooting, the element establishes, as client in accordance with the instructions/data, a TCP connection with the controller. The element then accepts, as a cryptographic network protocol server, a connection via the TCP connection from the controller as a client in accordance with the instructions. Next, the element accepts, as a network management protocol server, a connection via the cryptographic network protocol connection from the controller as network management protocol client. The element receives, from the controller over the network management protocol connection, commands regarding the status of the rebooted element, and then transmits, to the controller over the network management protocol connection, responses to the commands.
Systems and methods for flexible software update in a network of moving things
Communication network architectures, systems and methods for supporting a network of mobile nodes. As a non-limiting example, various aspects of this disclosure provide communication network architectures, systems, and methods for supporting a dynamically configurable communication network comprising a complex array of both static and moving communication nodes (e.g., the Internet of moving things).
Cloud-based network architecture centered around a software-defined spectrum controller
The disclosed embodiments provide a software-defined spectrum controller that may be used to dynamically and adaptively change rules and/or policies in a wireless network. The SDSC may dynamically change the rules or policies based on usage of spectrum and/or network resources or any other criterion, e.g., established by a service provider, to allow the service provider to use the spectrum and network resources more efficiently for delivering content and services to customers. In accordance with the disclosed embodiments, the SDSC may use at least one optimization algorithm to determine which policies or rules should be enforced at each of the network nodes in the wireless network. Based on the optimization algorithm, the SDSC may interact with other network nodes to dynamically change one or more of the rules or policies that are enforced in the service provider's network to provide content and services to customers.
Techniques for dynamically modifying operational behavior of network devices in a wireless network
A network device includes one or more processors and a memory storing firmware that when executed by the one or more processors causes the network device to perform operations including executing the firmware according to a configuration file, wherein the executing includes receiving one or more commands updating the configuration file to become a modified configuration file; and executing the firmware according to the modified configuration file. Wherein executing the firmware according to the modified configuration file includes: extracting a mode from the modified configuration file, the mode indicating a condition, a set of parameters, and a rule mapping the condition to an action; evaluating the condition based on one or more parameter values associated with the set of parameters; and in response to determining that the condition has been met, performing the action, wherein performing the action modifies how a resource is distributed at a location.
System and method for providing an intelligent ephemeral distributed service model for server group provisioning
A system for distributing firmware, comprising a group controller operating on a processor and configured to perform an algorithmic process of sending an update task with a download host to one of two or more group members. A group member operating on a processor and configured to perform an algorithmic process of receiving the update task with the download host and to request a payload file from the download host.
SYSTEMS AND METHODS FOR TRAFFIC ACCOUNTING FOR SAAS USAGE
A client application installed on a client device may monitor communications flows between embedded browsers of the client application and one or more servers, including enterprise servers and non-enterprise servers, at upper layers of a network stack of the client device including the application layer, session layer, and presentation layer. Communications to different endpoints may be classified as enterprise or non-enterprise, measured, and aggregated to provide disambiguation of enterprise and non-enterprise communications of the device transiting a single communications link (e.g. cellular data connection). Server and network policies may be applied in accordance with the measurements with higher accuracy than policies based on total bandwidth utilized by the device without regard to its classification. These policies may include load balancing, communication pooling, multiplexing, buffering, pre-fetching or edge caching of data, instantiating or halting execution of virtual machines in a cloud environment, or other such functions.