H04L41/085

Concurrent transactions on NETCONF devices across network services

Techniques are disclosed for managing a network. In one example, a device configuration manager is configured to generate, in accordance with a device management protocol, a configuration change request representing a transaction having a first sub-transaction specifying a first configuration change for a network device of the network and a second sub-transaction specifying a second configuration change for the same network device. The device configuration manager is further configured to output the configuration change request to the network device and receive a reply message from the network device. The reply message includes a first response element specifying whether the first configuration change is successfully committed at the network device and a second response element specifying whether the second configuration change is successfully committed at the network device.

Concurrent transactions on NETCONF devices across network services

Techniques are disclosed for managing a network. In one example, a device configuration manager is configured to generate, in accordance with a device management protocol, a configuration change request representing a transaction having a first sub-transaction specifying a first configuration change for a network device of the network and a second sub-transaction specifying a second configuration change for the same network device. The device configuration manager is further configured to output the configuration change request to the network device and receive a reply message from the network device. The reply message includes a first response element specifying whether the first configuration change is successfully committed at the network device and a second response element specifying whether the second configuration change is successfully committed at the network device.

QUARANTINE FOR CLOUD-BASED SERVICES
20230254279 · 2023-08-10 ·

A quarantine system could be disposed between an outer firewall and an inner firewall. The quarantine system may include persistent storage containing mappings between computing devices disposed within the inner firewall and data sources disposed outside the outer firewall. The quarantine system may include one or more processors configured to perform operations that include requesting and receiving, based on the mappings, a software-related update from a data source, the software-related update being targeted for deployment on the computing devices. The operations may also include assigning the software-related update for review by a group of one or more agents authorized to approve or reject the software-related update. The operations may also receiving an indication that the software-related update has been approved by the one or more agents and, responsive to receiving the indication, transmitting, based on the mappings, the software-related update to a recipient device within the inner firewall.

Tracking or storing of equipment configuration data using immutable ledger functionality of blockchains

Novel tools and techniques are provided for implementing tracking or storing of equipment configuration data using immutable ledger functionality of blockchains. In various embodiments, in response to receiving a first request for first configuration data that is output by first equipment, a computing system might determine whether a communicatively coupled data repository contains the first configuration data. If so, the computing system might retrieve and send (to the requesting device) the first configuration data. If not, the computing system might send, to a blockchain system, a second request for identifying a blockchain containing a block containing the first configuration data. In response to such a blockchain being identified, the computing system might receive the identified blockchain; might abstract the block containing the first configuration data from the identified blockchain; might abstract the first configuration data from the block; and might send the first configuration data to the requesting device.

MAC address dynamic assignment for a network element
11722374 · 2023-08-08 · ·

Approaches for dynamic assignment of a MAC address. An article of manufacture may comprise a non-volatile memory and a network element that comprises a CPU. The network element may be a remote PHY device, an Ethernet switch, a Remote MACPHY Device (RMD), a Passive Optical Network (PON) Optical Line Terminal (OLT), a Passive Optical Network (PON) Optical Network Unit (ONU), a Wi-Fi hot spot router, a Long-Term Evolution (LTE) device, an O-Ran device, or a Light Detection and Ranging (LIDAR) routing device. A communication link exists between the CPU of the network element and the non-volatile memory of the article of manufacture. A module on the network element causes the network element to retrieve, across the communication link, at least one MAC address from the non-volatile memory of the remote PHY node and adopt a MAC address to identify itself any time that the article of manufacture reboots.

MAC address dynamic assignment for a network element
11722374 · 2023-08-08 · ·

Approaches for dynamic assignment of a MAC address. An article of manufacture may comprise a non-volatile memory and a network element that comprises a CPU. The network element may be a remote PHY device, an Ethernet switch, a Remote MACPHY Device (RMD), a Passive Optical Network (PON) Optical Line Terminal (OLT), a Passive Optical Network (PON) Optical Network Unit (ONU), a Wi-Fi hot spot router, a Long-Term Evolution (LTE) device, an O-Ran device, or a Light Detection and Ranging (LIDAR) routing device. A communication link exists between the CPU of the network element and the non-volatile memory of the article of manufacture. A module on the network element causes the network element to retrieve, across the communication link, at least one MAC address from the non-volatile memory of the remote PHY node and adopt a MAC address to identify itself any time that the article of manufacture reboots.

Systems and methods for providing a topology of a wireless network
11770303 · 2023-09-26 · ·

A distribution of a content selection being distributed throughout a wireless mesh network may be tracked. A wireless device in the wireless mesh network enables the content selection to be exchanged. Wireless devices then exchange the content, and a network topology is recorded in response. Finally, the network topology is reported to a reporting agent.

Systems and methods for providing a topology of a wireless network
11770303 · 2023-09-26 · ·

A distribution of a content selection being distributed throughout a wireless mesh network may be tracked. A wireless device in the wireless mesh network enables the content selection to be exchanged. Wireless devices then exchange the content, and a network topology is recorded in response. Finally, the network topology is reported to a reporting agent.

DATA ANALYTICS ON INTERNAL STATE
20210367845 · 2021-11-25 ·

Various embodiments are described herein to track and/or update the state of components within a network element. One embodiment provides for a network management system comprising a collector node including an ingest gateway to receive configuration and status data of a set of network elements coupled to the collector node via the network, the collector node further to store the configuration and status data from the set of network elements in a distributed database; a search engine to locate and retrieve the configuration and status data of a specified subset of the network elements at a specified time period; and an interface server to receive a request for the configuration and status data from an external requester, the interface server to facilitate provision of the configuration and status data in response to the request.

Systems and methods for providing a topology of a wireless network
11184243 · 2021-11-23 · ·

A distribution of a content selection being distributed throughout a wireless mesh network may be tracked. A wireless device in the wireless mesh network enables the content selection to be exchanged. Wireless devices then exchange the content, and a network topology is recorded in response. Finally, the network topology is reported to a reporting agent.