H04L41/0695

MONITORING AND SELF-HEALING OF DEPLOYED ENVIRONMENTS

In various examples, a system identify a first issue object associated with the alert by making a first set of determinations, based on an alert of an active issue of a system resource. Additionally, the system can determine whether the active issue associated with the first issue object can be automatically corrected by one or more self-healing processes, based on the first issue object. Moreover, the system can implement the one or more self-healing processes, based on determining that the active issue associated with the first issue object can be automatically corrected by one or more self-healing processes.

Hybrid mesh network monitoring signaling environment
11349747 · 2022-05-31 · ·

Techniques are described to improve the robustness of communication of critical life safety data when broadband networks are used as uphaul networks. Monitoring systems are examples of critical monitoring appliances, but the techniques described throughout this disclosure may be applied to any type of critical monitoring appliances, such as life-support devices, fire detectors, smoke detectors, and the like.

Hybrid mesh network monitoring signaling environment
11349747 · 2022-05-31 · ·

Techniques are described to improve the robustness of communication of critical life safety data when broadband networks are used as uphaul networks. Monitoring systems are examples of critical monitoring appliances, but the techniques described throughout this disclosure may be applied to any type of critical monitoring appliances, such as life-support devices, fire detectors, smoke detectors, and the like.

Slave BMS Inspection System and Method

A master battery management system (BMS) used for a battery system in which a plurality of slave BMSs and the master BMS communicate wirelessly includes: a receiving unit configured to receive, from each slave BMS, data of the corresponding slave BMS and data transmission information of at least one other slave BMS except for the corresponding slave BMS among the plurality of slave BMS during one period in which each of the plurality of slave BMSs transmits data at least once; and a determination unit configured to determine a communication error or an abnormal slave BMS by using the data of the corresponding slave BMS and the at least one other slave BMS data received from each slave BMS during one period. The data transmission information of the at least one other slave BMS is information on a history that the other slave BMS transmits data.

Automated root cause analysis of underperforming video streams by using language transformers on support ticket systems
11743150 · 2023-08-29 · ·

A method and system corrects a content delivery infrastructure. The method of the system includes receiving a request to resolve reported issues for the content delivery infrastructure, collecting content delivery metrics for the content delivery infrastructure, executes a language transformer model on the request and the content delivery metrics to generate a set of possible resolutions with confidence ratings, and implementing an automated solution based on a resolution from the set of possible resolutions, in response to the resolution having a confidence rating above a threshold.

Automated root cause analysis of underperforming video streams by using language transformers on support ticket systems
11743150 · 2023-08-29 · ·

A method and system corrects a content delivery infrastructure. The method of the system includes receiving a request to resolve reported issues for the content delivery infrastructure, collecting content delivery metrics for the content delivery infrastructure, executes a language transformer model on the request and the content delivery metrics to generate a set of possible resolutions with confidence ratings, and implementing an automated solution based on a resolution from the set of possible resolutions, in response to the resolution having a confidence rating above a threshold.

Dynamic customization of network controller data path based on controller internal state awareness

Techniques for a network controller to manage its data path dynamically in a data network. The techniques include causing the network controller to enter a first state, wherein the first state is associated with first processing rules for processing usage data. The network controller receives first usage data from one or more network devices associated with the data network, processes the first usage data according to the first processing rules. Further, the network controller may detect an event associated with transitioning the network controller to a second state, which cause the network controller to transition from the first state into a second state, wherein the second state is associated with second processing rules for processing the usage data. Moreover, the network controller receives second usage data from the one or more network devices, and processes the second usage data according to the second processing rules.

TESTING FRAMEWORK FOR ADAPTIVE VIRTUAL SERVICES
20220158895 · 2022-05-19 · ·

Examples of the present disclosure describe a testing framework for adaptive virtual services. In an example, a function vendor provides a network function having stated specifications to a service provider. A derived signature is generated for the network function (e.g., based on associated metadata, an image associated with the network function, and/or a network signature for the network function), which is used to classify the network function. The testing framework is used to test the network function according to its classification, thereby determining a set of capabilities. In examples, a network function having the same or similar signature as a previously tested network function may be categorized according to the previously tested network function. The network function is categorized according to its determined capabilities and added to an inventory of network functions for the service provider. Network functions in the inventory can then be selected to form a computer network.

TESTING FRAMEWORK FOR ADAPTIVE VIRTUAL SERVICES
20220158895 · 2022-05-19 · ·

Examples of the present disclosure describe a testing framework for adaptive virtual services. In an example, a function vendor provides a network function having stated specifications to a service provider. A derived signature is generated for the network function (e.g., based on associated metadata, an image associated with the network function, and/or a network signature for the network function), which is used to classify the network function. The testing framework is used to test the network function according to its classification, thereby determining a set of capabilities. In examples, a network function having the same or similar signature as a previously tested network function may be categorized according to the previously tested network function. The network function is categorized according to its determined capabilities and added to an inventory of network functions for the service provider. Network functions in the inventory can then be selected to form a computer network.

Containing a faulty stimulus in a content delivery network
11736344 · 2023-08-22 · ·

Examples described herein relate to systems and methods for containing a faulty stimulus. A computer-implemented method may include listing in a suspect list every received stimulus including the faulty stimulus, and implicitly testing the stimuli by respectively acting upon those stimuli by a software application. Responsive to successfully acting upon each of the stimuli besides the faulty stimulus, each non-faulty stimulus is deleted from the suspect list and, responsive to such deletion, made available to a downstream node. Responsive to acting upon the faulty stimulus, the software application crashes which leaves the faulty stimulus listed in the suspect list. The software application then restarts and deems the faulty stimulus as being faulty based upon the faulty stimulus still being listed in the suspect list after the restart.