Patent classifications
H04L41/0246
Data representation generation without access to content
Techniques for generating a data representation without access to content are described. A method for generating a data representation without access to content comprises receiving a request to analyze one or more data items in a protected area of the provider network, sending the request to the protected area of the provider network, wherein the cluster model is used to identify a cluster identifier associated with each of the one or more data items, receiving the cluster identifier associated with each of the one or more data items, and regenerating each of the one or more data items based on the cluster identifier.
Data representation generation without access to content
Techniques for generating a data representation without access to content are described. A method for generating a data representation without access to content comprises receiving a request to analyze one or more data items in a protected area of the provider network, sending the request to the protected area of the provider network, wherein the cluster model is used to identify a cluster identifier associated with each of the one or more data items, receiving the cluster identifier associated with each of the one or more data items, and regenerating each of the one or more data items based on the cluster identifier.
NODE CONFIGURATION ASSIGNMENT USING A MOBILE COMMUNICATION DEVICE
A mobile communication device is used to assign a configuration to a designated compute node by wirelessly transmitting a configuration identifier to the designated compute node. The designated compute node receives the configuration identifier and provides the configuration identifier to a management node accessible over a network in order to receive configuration data associated with the configuration identifier. The designated compute node receives the configuration data and applies the configuration data to achieve the assigned configuration. This method may be used to configure a plurality of compute nodes, although each of the compute nodes may assigned the same or different configuration.
System and Method for Dataplane-Signaled Packet Capture in a Segment Routing Environment
Presented herein are segment-routing methods and systems that facilitate data plane signaling of a packet as a candidate for capture at various network nodes within a segment routing (SR) network. The signaling occurs in-band, via the data plane—that is, a capture or interrogation signal is embedded within the respective packet that carries a user traffic. The signaling is inserted, preferably when the packet is classified, e.g., at the ingress node of the network, to which subsequent network nodes with the SR network are signaled to capture or further inspect the packet for capture.
ENHANCED OPERATIONS BETWEEN SERVICE LAYER AND MANAGEMENT LAYER IN AN M2M SYSTEM BY ALLOWING THE EXECUTION OF A PLURALITY OF COMMANDS ON A PLURALITY OF DEVICES
The present application is directed to a computer-implemented device and method for performing group-on-group operations over the M2M interface. The device and method includes the step of receiving a request to initiate the group-on-group operation from a device owner including commands of a group resource defined in a uniform resource indicator. The device and method includes the step of processing the request and also a step for sending a group management request API to a management server to execute the commands on the devices. Further, there is a step of receiving a response from the management server indicating execution status of the commands by the device. The application also is directed to a computer-implemented method for establishing group-on-group operation over the M2M interface.
Control protocol encapsulation
A processor is configured to determine non-core functions to be performed by an unmanaged device disposed on a packet based computer network. A control message generator is configured to (i) generate a point-to-point control message conforming to a point-to-point control protocol for controlling the unmanaged device over a point-to-point serial bus connection to perform the determined non-core functions, and (ii) encapsulate the point-to-point control message in a transport packet for transport over the packet based computer network. A packet transmitter is configured to transmit the transport packet including the encapsulated point-to-point control message via a port coupled to the packet based computer network, the packet based computer network configured to route the transport packet including the encapsulated point-to-point control message based on a header included in the transport packet so that the point-to-point control message is received at the unmanaged device via the packet based computer network.
DEVICE-DRIVEN MANAGEMENT WORKFLOW STATUS AND IMPACT
Examples of device-driven management are described. A management service can transmit a device-driven management workflow to a number of client devices. The device-driven management workflow can include workflow objects that define a branching sequence of instructions. The client devices can provide a corresponding plurality of completion statuses for a step of the device-driven management workflow. The management service can identify a failure of the step according to a set of failure rules, and visually emphasize the failure within a representation of the device-driven management workflow.
Systems and methods for configuring routers and for facilitating communication between routers
Aspects of the subject disclosure may include, for example, storing, in a database, subscriber information associated with a plurality of subscribers of a wireless carrier, the subscriber information comprising first subscriber information associated with a first subscriber of the wireless carrier, the first subscriber information comprising first configuration data for a first router of the first subscriber, the first router being located at a first physical location; wirelessly receiving from a second router of the first subscriber, via a wireless service of the wireless carrier, a first registration request made by the second router, the second router being located at a second physical location; responsive to receiving the first registration request, generating first provisioning information, the first provisioning information being based at least in part upon the first configuration data for the first router that is stored in the database; and wirelessly sending to the second router, via the wireless service of the wireless carrier, the first provisioning information, the first provisioning information enabling the first router and the second router to communicate with one another via the wireless service through a first tunnel mechanism. Other embodiments are disclosed.
Descriptor architecture for a remote network management platform
Systems and methods for mapping and managing interrelationships between data resources, application programs, and infrastructure components of a managed network are disclosed. A configuration management data database may contain configuration item (CI) records associated with CIs of the network. Each CI may correspond to configurable entities of the network, such as infrastructure components, application programs, and the data resources. A request relating to data resources of a data domain hierarchy of information object (IO) CIs may be received, where each IO CI is associated with a data resource of the network. A first look-up may identify one or more application programs that use the respective data resource associated with the given IO CI, and a second look-up may identify a resource database that stores the data resource associated with the given IO CI. A mapping list including the identities from the look-ups may be returned in response to the request.
Descriptor architecture for a remote network management platform
Systems and methods for mapping and managing interrelationships between data resources, application programs, and infrastructure components of a managed network are disclosed. A configuration management data database may contain configuration item (CI) records associated with CIs of the network. Each CI may correspond to configurable entities of the network, such as infrastructure components, application programs, and the data resources. A request relating to data resources of a data domain hierarchy of information object (IO) CIs may be received, where each IO CI is associated with a data resource of the network. A first look-up may identify one or more application programs that use the respective data resource associated with the given IO CI, and a second look-up may identify a resource database that stores the data resource associated with the given IO CI. A mapping list including the identities from the look-ups may be returned in response to the request.