Patent classifications
H04L69/24
METHODS AND APPARATUSES FOR RDS TRANSFER
Methods and apparatuses for reliable data service (RDS) transfer are disclosed. According to an embodiment, an originator sends, to a receiver, a request for negotiating a size of a transmission window with the receiver for an acknowledged information transfer through RDS protocol. The originator receives, from the receiver, a response to the request.
METHODS AND APPARATUSES FOR RDS TRANSFER
Methods and apparatuses for reliable data service (RDS) transfer are disclosed. According to an embodiment, an originator sends, to a receiver, a request for negotiating a size of a transmission window with the receiver for an acknowledged information transfer through RDS protocol. The originator receives, from the receiver, a response to the request.
TECHNIQUES FOR CONFIGURING COMMUNICATION PROCESS FLOW ACTIONS
A method for data processing that includes receiving an indication of a configuration for a first action of a communication process flow that controls electronic communications between a tenant of a multi-tenant system and a first set of users associated with the tenant. The method further includes associating, within a storage location associated with the tenant, a unique identifier with metadata that defines the configuration. The method further includes receiving a request to apply the configuration to a second action of a communication process flow that controls electronic communications between the tenant and a second set of users associated with the tenant. The request may indicate the unique identifier associated with the metadata. The method further includes retrieving the metadata from the storage location using the unique identifier indicated by the request. The method further includes applying the configuration to the second action using the retrieved metadata.
TECHNIQUES FOR CONFIGURING COMMUNICATION PROCESS FLOW ACTIONS
A method for data processing that includes receiving an indication of a configuration for a first action of a communication process flow that controls electronic communications between a tenant of a multi-tenant system and a first set of users associated with the tenant. The method further includes associating, within a storage location associated with the tenant, a unique identifier with metadata that defines the configuration. The method further includes receiving a request to apply the configuration to a second action of a communication process flow that controls electronic communications between the tenant and a second set of users associated with the tenant. The request may indicate the unique identifier associated with the metadata. The method further includes retrieving the metadata from the storage location using the unique identifier indicated by the request. The method further includes applying the configuration to the second action using the retrieved metadata.
Mobile edge computing applications management for wireless networks
A technique may include receiving, from an external applications controller, by a mobile edge computing applications manager provided on a mobile edge computing server that is in proximity to a radio access network, a mobile edge computing application criteria that includes management rules for managing at least a portion of a lifecycle of a mobile edge computing application; and storing the mobile edge computing application criteria. In an example embodiment, a technique may further include managing at least a portion of a lifecycle of the mobile edge computing application based on the mobile edge computing application criteria.
Mobile edge computing applications management for wireless networks
A technique may include receiving, from an external applications controller, by a mobile edge computing applications manager provided on a mobile edge computing server that is in proximity to a radio access network, a mobile edge computing application criteria that includes management rules for managing at least a portion of a lifecycle of a mobile edge computing application; and storing the mobile edge computing application criteria. In an example embodiment, a technique may further include managing at least a portion of a lifecycle of the mobile edge computing application based on the mobile edge computing application criteria.
Techniques for accessing logical networks via a virtualized gateway
Disclosed are various embodiments for receiving, via a network, a request from a client to establish a network tunnel over the network. A credential is received from the client in order to establish the network tunnel. The client is authenticated based upon the credential. The client negotiates, via the network, to establish the network tunnel.
Techniques for accessing logical networks via a virtualized gateway
Disclosed are various embodiments for receiving, via a network, a request from a client to establish a network tunnel over the network. A credential is received from the client in order to establish the network tunnel. The client is authenticated based upon the credential. The client negotiates, via the network, to establish the network tunnel.
Method and apparatus for providing big data analysis service, and computer readable storage medium
Provided are a method and apparatus for providing a big data analysis service, and a computer readable storage medium. The method for providing a big data analysis service includes: generating, by network data analytics, big data information according to network operation and maintenance data, and sending the big data information to an application through a network exposure function.
Smart edge network management
Managing network interactions by engaging a networked information broadcast service, receiving information from the networked information broadcast service, filtering the information according to a profile, and sending information according to the filtered information using another network communications connection.