Patent classifications
H04L69/40
Analysis of system conditions from endpoint status information
A system includes Session-Initiation-Protocol (SIP) servers that provide services for a respective set of endpoints. A monitor server can receive connectivity status of the respective set of endpoints based on registration status provided by the endpoints to the SIP servers. Based upon the received connectivity status, endpoints having connectivity problems are parsed into one or more subgroups. Potential problem sources are identified for the connectivity problems of the parsed endpoints. For each of the subgroups, the monitor server determines whether the subgroup exceeds a corresponding trigger threshold. In response a corresponding trigger threshold being exceeded, an action profile specifying an entity is accessed. A notification is transmitted to the entity.
Statistic multiplexed computing system for network-scale reliable high-performance services
A system for network-scale parallel computing comprises a set of computer-readable instructions implementing the steps of executing a computational process from at least one client node by communicating via a content addressable service network implemented using the Tuple Space abstraction, data parallel semantics and Unidirectional Virtual Ring architecture, with any number of service computers, networks and storage to deliver lossless, non-stop services. A network-scale distributed storage system, an enhanced Domain Name System (DNS) system, a network-scale database system and a network-scale hybrid transactional analytical processing systems are also described.
Statistic multiplexed computing system for network-scale reliable high-performance services
A system for network-scale parallel computing comprises a set of computer-readable instructions implementing the steps of executing a computational process from at least one client node by communicating via a content addressable service network implemented using the Tuple Space abstraction, data parallel semantics and Unidirectional Virtual Ring architecture, with any number of service computers, networks and storage to deliver lossless, non-stop services. A network-scale distributed storage system, an enhanced Domain Name System (DNS) system, a network-scale database system and a network-scale hybrid transactional analytical processing systems are also described.
Failure analysis device, failure analysis method, and failure analysis program
A failure analysis device 10 is provided with an identification unit 11 that discriminates whether a predetermined failure has occurred on the basis of a learning model for discriminating the presence or absence of an occurrence of the predetermined failure learned by using a cause attribute which is associated with a cause of the predetermined failure and on the basis of a value of the attribute, and that identifies the cause of the predetermined failure discriminated to have occurred and countermeasures therefor.
Micro-level network node failover system
An improved core network that can monitor micro-level issues, identify specific services of specific nodes that may be causing an outage, and perform targeted node failovers in a manner that does not cause unnecessary disruptions in service is described herein. For example, the improved core network can include a failover and isolation server (FIS) system. The FIS system can obtain service-specific KPIs from the various nodes in the core network. The FIS can then compare the obtained KPI values of the respective service with corresponding threshold values. If any KPI value exceeds a corresponding threshold value, the FIS may preliminarily determine that the service of the node associated with the KPI value is responsible for a service outage. The FIS can initiate a failover operation, which causes the node to re-route any received requests corresponding to the service potentially responsible for the service outage to a redundant node.
Micro-level network node failover system
An improved core network that can monitor micro-level issues, identify specific services of specific nodes that may be causing an outage, and perform targeted node failovers in a manner that does not cause unnecessary disruptions in service is described herein. For example, the improved core network can include a failover and isolation server (FIS) system. The FIS system can obtain service-specific KPIs from the various nodes in the core network. The FIS can then compare the obtained KPI values of the respective service with corresponding threshold values. If any KPI value exceeds a corresponding threshold value, the FIS may preliminarily determine that the service of the node associated with the KPI value is responsible for a service outage. The FIS can initiate a failover operation, which causes the node to re-route any received requests corresponding to the service potentially responsible for the service outage to a redundant node.
Passing authentication token to authorize access to rest calls via web sockets
Various techniques for facilitating communication with and across a clinical environment and a cloud environment are described. For example, a method for authenticating a network device residing in the clinical environment using a token is described. An authentication proxy in the cloud environment can receive a request from a connectivity adapter in the clinical environment and retrieve a security token from an authentication system in the cloud. The connectivity adapter can use the security token to send signed requests to the authentication system.
Return and replacement protocol (RRP)
Systems and methods provide for managing faulting network devices. A first network device can receive an error. The first network device can generate one or more frames including data indicative of the error. The first network device can broadcast the one or more frames to one or more neighboring network devices. It may be determined that the first network device is inaccessible. The first data can be retrieved and presented from a second network device among the one or more neighboring network devices. In some embodiments, a network management system can utilize the first data to generate a machine learning model that classifies whether network devices are instances of network devices designated for a Return Merchandise Authorization (RMA) process. In some embodiments, the network management system can apply the first data to a machine learning classifier to determine whether to initiate the RMA process for the first network device.
METHOD AND SYSTEM FOR FACILITATING LOSSY DROPPING AND ECN MARKING
Methods and systems are provided for performing lossy dropping and ECN marking in a flow-based network. The system can maintain state information of individual packet flows, which can be set up or released dynamically based on injected data. Each flow can be provided with a flow-specific input queue upon arriving at a switch. Packets of a respective flow are acknowledged after reaching the egress point of the network, and the acknowledgement packets are sent back to the ingress point of the flow along the same data path. As a result, each switch can obtain state information of each flow and perform per-flow packet dropping and ECN marking.
High-availability networking as a service via Wi-Fi
A first network device may receive a request associated with forming a high-availability cluster with a second network device, wherein the first network device is associated with a session of a user device. The first network device may determine, based on authorization information associated with the first network device, that the first network device is authorized to form the high-availability cluster. The first network device may configure communication links with the second network device to form the high-availability cluster. The first network device may synchronize, with the second network device, session information associated with the session via the communication links. The first network device may route session traffic of the session to the second network device and a data network to enable the user device to receive a high-availability service during the session.