H04L43/14

Efficient remote function execution in an information centric network

Systems and techniques for efficient remote function execution in an information centric network (ICN) are described herein. For example, a requestor node may transmit an admission probe interest packet. Here, the admission probe interest packet includes a name that includes a function. The admission probe interest packet also includes a metric of a parameter of the function. In response, the requestor node may receive a manifest data packet. The manifest includes a metric of function execution at a node that created the manifest data packet. The manifest also includes a name of an implementation of the function. The requestor node may then determine that the metric of function execution meets a threshold and transmit an interest packet that includes the name of the implementation of the function.

APPLICATION SERVICE CONFIGURATION SYSTEM
20230055723 · 2023-02-23 ·

A computing system implementing an application service can determine, from a network dataset, that a network latency for a common network service provider crosses an upper latency threshold. Based on this determination, the system can determine a subset of the computing devices that utilize the common network service provider, and transmit a set of configuration signals to the subset of computing devices. The set of configuration signals can modify a set of default application configurations of a designated application to compensate for the network latency.

Systems and methods of monitoring network devices
11502929 · 2022-11-15 · ·

Implementations of the disclosed subject matter provide systems and methods of assigning, at a server, a unique identifier to each of a plurality of devices communicatively coupled to one another and the server via a communications network. Each unique identifier may be converted to a device hash key by applying a hash function. A range of device hash keys of the plurality of devices may be split into N approximately equal sectors, where N is a prime number and each sector includes 1/N of the device hash keys of the plurality of the devices. K monitoring workers provided by the server may monitor the plurality of devices in an order based on the respective device hash key, where K is an integer.

Heuristic-based SD-WAN route reconfiguration

An example network orchestrator includes processing circuitry and a memory. The memory includes instructions that cause the network orchestrator to receive network probe information including delay times of network probes associated with a set of flows between devices. The instructions further cause the network orchestrator to generate a correlation matrix including correlations representing shared congested links between pairs of flows. The instructions further cause the network orchestrator to for each flow of the set of flows, determine a routing solution optimized for the each flow and select a total minimum cost solution from the determined routing solutions.

SYSTEMS AND METHODS FOR DETERMINING THE SHAREABILITY OF VALUES OF NODE PROFILES
20230031801 · 2023-02-02 · ·

The present disclosure relates to determining the shareability of values of node profiles. Record objects and electronic activities of a system of record corresponding to a data source provider may be accessed. Each record object may correspond to a record object type and have one or more object field-value pairs. Node profiles may be maintained. Values of fields corresponding to a predetermined type of field including fewer than a predetermined threshold number of data source providers may be identified. A restriction tag used to restrict populating other node profiles may be generated. Provision of the value with a second data source provider may be restricted.

END-TO-END NETWORK AND APPLICATION VISIBILITY CORRELATION LEVERAGING INTEGRATED INTER-SYSTEM MESSAGING

In one embodiment, an agent process performs performance monitoring according to either a network performance monitoring platform or an application performance monitoring platform. The agent process exchanges a request message with a remote agent process (performing performance monitoring according to the opposing platform), where the request message comprises a transaction identifier and a requested action. The agent process also exchanges, in response to the request message, a response message with the remote agent process, wherein the response message comprises an acknowledgment of the transaction identifier and the requested action. The agent process shares first performance monitoring platform information along with the transaction identifier, where the remote agent process shares second performance monitoring platform information along with the transaction identifier, such that the sharing causes explicit correlation of the first information and the second information based on the transaction identifier.

DYNAMIC DATA RECOMBINATION THROUGH DEPLOYABLE MODULES
20230030925 · 2023-02-02 ·

A system and method that enable data processing and dynamic recombination of data by software on a device to be enhanced without requiring a replacement of the main software image on the device. Runtime management objects are generated at a network management platform including an interpreted application. The runtime management objects, KPIs, and interpreted application are downloaded network access devices. Data is collected at the interpreted application and analytics is performed on the collected data. First new runtime management objects are dynamically created at the interpreted application. The first new runtime management objects are presented to the network management platform. Analytics on the first new runtime management objects is performed at the network management platform to generate second new runtime management objects to provide to the plurality of network access devices for processing by the downloaded interpreted applications.

Prioritizing an issue reported by a user of a wireless telecommunication network
11617093 · 2023-03-28 · ·

The disclosed system and method obtain a report of an issue reported by a user of the wireless telecommunication network, and historical information associated with the user and the wireless telecommunication network. The historical information includes multiple issues reported by users similar to the user, and multiple user statuses associated with the users similar to the user. The user status among the multiple user statuses includes active and inactive, indicating whether the user is an active member of the telecommunication network or has left the network. The system provides the historical information to an AI model, and obtains from the AI model a priority associated with the issue experienced by the user. The system causes a resolution of the issue based on the priority.

Mobile telecommunications network capacity simulation, prediction and planning
11489749 · 2022-11-01 · ·

A method includes receiving a representation of a predefined planned event that includes the use of a first set of cellular data service infrastructure elements. A performance of the first set of cellular data service infrastructure elements is simulated, and a predicted failure of at least one cellular data service infrastructure element from the first set of cellular data service infrastructure elements is identified based on the simulation. In response to identifying the predicted failure, a modification to the at least one cellular data service infrastructure element or an additional cellular data service infrastructure element is determined and included in a second set of cellular data service infrastructure elements whose performance is subsequently simulated. The simulated performance of the first set of cellular data service infrastructure elements is compared with the simulated performance of the second set of cellular data service infrastructure elements to determine a performance improvement.

SYSTEMS AND METHODS FOR GENERATING A FILTERED DATA SET
20220345543 · 2022-10-27 · ·

The present disclosure relates to generating a filtered data set. Data from a plurality of systems of record of a plurality of data source providers may be accessed. A master data set generated using the data accessed from the plurality of systems of record may be maintained. Restriction policies including one or more rules for restricting sharing of data may be maintained. A filtered data set may be generated for a data source provider responsive to an application of restriction policies of other data source providers to the master data set. The filtered data set may be provisioned.