H04L41/0233

Sharing configuration resources for network devices among applications

In an example, a method includes receiving, by a network management system (NMS), a configuration request comprising first configuration data for a network device, the first configuration data defining a data structure comprising a first property/value pair; generating, by the NMS from the first configuration data, a corresponding first path/value pair for the first property/value pair, wherein a path of the first path/value pair uniquely identifies the first path/value pair in an associative data structure; modifying, by the NMS, the associative data structure based on the first path/value pair; generating, by the NMS, from the associative data structure, a configuration resource comprising second configuration data for the network device, the second configuration data comprising a second property/value pair that corresponds to the first path/value pair; and sending, by the NMS, the second configuration data to the network device to modify a configuration of the network device.

Generic data exchange method using hierarchical routing
09843469 · 2017-12-12 · ·

A process including retrieving a list of one or more candidate objects with which an origin object can communicate using a standard command language, wherein at least one of the one or more candidate objects uses a command language different than the standard command language. The process queries the schema of one or more target objects selected from among the one or more candidate objects and uses the standard command language to transmit to the one or more target objects commands and/or data consistent with the schemas of the target objects.

Edge database management of the network data plane

Novel tools and techniques for network data plane management are provided. A system includes a host machine that includes a database, processor, and non-transitory computer readable media comprising instructions executable by the processor to obtain, via the database, a network configuration, spawn a container according to the network configuration, wherein the container is configured, based on the network configuration, to be coupled to a network overlay via a network interface, receive, via the network interface, incoming data associated with the container, the incoming data having attached one or more attached network data attributes, and identify, via the database, the attached one or more network data attributes attached to the incoming data as one or more network data attributes of the network data model.

Object-oriented network virtualization

Object-oriented network virtualization may involve creating and operating virtual network objects (VNO) using a software-programmed networking operating system (SPN OS). A VNO may be a complete representation of a virtual network service provided under the SPN OS. A VNO may have a unique identity and properties, along with an internal set of methods for executing functionality encapsulated by the VNO. A VNO may exhibit persistence and autonomous control to enable improved virtual network services.

Transformative requests

A method is implemented by a node for implementing computational transformations conveyed in a content centric networking (CCN) request by a computation engine. The method includes receiving a CCN request containing a unique resource identifier (URI) and a computation field, decoding the computation field to determine a computation pipeline, retrieving a first content object identified by the URI, executing the computation pipeline with the first content object as input, and encoding a result of the computation pipeline as a second content object.

ALARM CORRELATION IN NETWORK FUNCTION VIRTUALIZATION ENVIRONMENT
20170346676 · 2017-11-30 ·

Correlation of information related to network operations may be useful in many communication systems. For example, certain wireless communication networks may benefit from alarm correlation in network function virtualization environments. A method can include correlating alarms within a lower layer of a network function virtualization environment. The method can also include forwarding at least one of the correlated alarms to an entity managing an upper layer of the network function virtualization environment for further correlation with upper layer alarms.

VISUAL DESIGNER FOR EDITING LARGE SCHEMALESS XML FILE
20170344227 · 2017-11-30 · ·

A method for a XML editor includes loading one or more files, extracting elements that extend a browser user interface from the one or more files, and presenting a graphical user interface (GUI) for editing the plug-in XML manifest file. The method further includes receiving one or more user edits to the plug-in XML manifest file through the GUI, validating the one or more user edits against properties of the elements, and generating a warning in the GUI for a user edit that conflicts with a property of an element. The method also includes generating or updating XML code in the plug-in XML manifest file in response to the one or more user edits, and saving the XML code.

Resource change management in machine to machine network

The disclosure is related to managing a resource change in a machine to machine (M2M) network. Managing the resource change in M2M network by creating an abstract M2M entity object associated with a resource change, and creating an M2M entity object instance by embodying the abstract M2M entity object according to each application development environment.

SYSTEM AND METHOD OF FLOW SOURCE DISCOVERY

An example method comprises receiving flow packets from network traffic analyzing platforms, for each particular flow packet: identify the particular flow packet as belonging to one of at least two flow packet types based on a format, if the particular flow packet is sFlow, determine if the particular flow packet is an sFlow sample, counter record, or a third packet type, if the particular flow packet is the sFlow sample or counter record, identify a flow source of the particular flow packet and at least one metric, and update a flow source data structure else ignore the particular flow packet, and if the particular flow packet is a second flow packet type: if the particular flow packet is of a format that matches a template, identify the flow source, and update the flow source data structure to include the identified flow source and the at least one metric.

SYSTEM AND METHOD OF FLOW SOURCE DISCOVERY

An example method comprises receiving flow packets from network traffic analyzing platforms, for each particular flow packet: identify the particular flow packet as belonging to one of at least two flow packet types based on a format, if the particular flow packet is sFlow, determine if the particular flow packet is an sFlow sample, counter record, or a third packet type, if the particular flow packet is the sFlow sample or counter record, identify a flow source of the particular flow packet and at least one metric, and update a flow source data structure else ignore the particular flow packet, and if the particular flow packet is a second flow packet type: if the particular flow packet is of a format that matches a template, identify the flow source, and update the flow source data structure to include the identified flow source and the at least one metric.