H04L41/085

Virtual gateway control and management

In accordance with one or more embodiments, aspects of the disclosure may provide efficient, effective, and convenient ways of managing network devices. In particular, a client router may connect to an upstream virtual gateway. The virtual gateway may manage a large number of client devices. Each client router may be represented virtually within the gateway as a virtual router. The virtual gateways may be distributed regionally, in order to manage large numbers of client routers and/or to reduce transmission delays. The virtual gateways may be managed by a gateway controller. The gateway controller may be centralized, and perform various configuration functions, such as configurations for hardware, logical networking, or content access policies. In some instances, messages sent between the gateway controller using a first protocol and the client router using a second protocol may be translated by a protocol agent.

SYSTEMS AND METHODS FOR ENABLING COMMUNICATIONS OVER SHARED SPECTRUM USING O-RAN FRONTHAUL INTERFACE IN RADIO ACCESS NETWORKS

A method of operating an Open Radio Access Network (O-RAN) fronthaul interface between O-RAN radio unit (O-RU) and an O-RU controller for controlling the O-RU includes: sending, from the O-RU to the O-RU controller, a message informing whether the O-RU supports Citizens Broadband Radio Service (CBRS) operation; and if so, sending from the O-RU to the O-RU controller a report of capabilities of the O-RU including whether spectrum measurement is supported; if the O-RU supports spectrum measurement, providing an indication the O-RU supports either measurement without grant or measurement with gram from a Spectrum Access System (SAS); and sending from the O-RU to the O-RU controller a Federal Communications Commission certification identification (FCC ID) for the O-RU, Citizens Broadband Radio Service Device (CBSD) category for the O-RU, user registration identification (userId) for CBRS, installation parameters, grouping parameters, and/or a call sign device identifier provided by the FCC.

SYSTEMS AND METHODS FOR REAL-TIME REPOSITORY MANAGEMENT FOR UNIVERSAL SERVICE DEPLOYMENT

Systems and methods described herein related to real-time management of service deployment systems are disclosed. A management system may monitor an infrastructure environment repository in real-time. Differences in configurations stored within the repository may be identified and used to generate configuration data. The configuration data may be used to update service operating parameters and service deployment configurations. The configuration data may be used to generate deployment data. The deployment data may be utilized to deploy one or more services on an updated infrastructure using the updated services.

NETWORK DEVICE TYPE CLASSIFICATION
20220337488 · 2022-10-20 · ·

A method of identifying network devices includes transforming a first data set of feature-rich device characteristics of devices with known device identities to a second data set comprising feature-poor device characteristics with the known device identities. A third data set of feature-poor device characteristics of devices with known identities is collected. A statistical model is derived comprising one or more adjustments to the transformed data set, the statistical model reflecting a difference in statistical distribution between one or more characteristics of the second data set of transformed device characteristics and one or more corresponding and/or related characteristics of the third data set of feature-poor device characteristics. A device identification module is trained based on the second data set of feature-poor characteristics and the statistical model adjustments, the trained device identification module operable to use feature-poor device characteristics to identify network devices.

Customizing program logic for booting a system

A technique for generating a customized program logic for booting a target system includes determining the hardware devices operatively connected with the target system. A list of identifiers of the determined hardware devices is sent to a server system. The server system selects from a set of drivers for each of the device identifiers in the list at least one driver operable to control the identified device to generate a sub-set of said set of drivers. The server system retrieves a core program logic being free of any drivers of the target system and sends the core program logic and the driver sub-set to the target system. The target system creates the customized program logic using the combination of the core program logic and the driver sub-set.

Customizing program logic for booting a system

A technique for generating a customized program logic for booting a target system includes determining the hardware devices operatively connected with the target system. A list of identifiers of the determined hardware devices is sent to a server system. The server system selects from a set of drivers for each of the device identifiers in the list at least one driver operable to control the identified device to generate a sub-set of said set of drivers. The server system retrieves a core program logic being free of any drivers of the target system and sends the core program logic and the driver sub-set to the target system. The target system creates the customized program logic using the combination of the core program logic and the driver sub-set.

Integration application creator design
11474842 · 2022-10-18 · ·

Application generation and integration application generation methods are disclosed. An application generation function includes automatically providing a set of software artifacts to an application developer that may be used as an aid to providing an application with augmented capabilities for an end-user. The augmented capabilities configured to adhere to certain rules regarding certification criteria and requirements of a multi-tenant cloud infrastructure. Generated applications and plug-in capabilities may further be required to meet certification criteria applicable to an application store hosted within a cloud infrastructure.

Change management system with monitoring, alerting, and trending for information technology environment

An information technology (IT) network includes configuration items (CIs) that may constantly change, where the CIs describe hardware components or software components that are configured to operate on the IT network. A system comprising a server can determine a change associated with a CI, send, to a configuration management database (CMDB), a message that updates the CMDB based on the determined change associated with the CI, determine, for the CI, a monitor configuration that describes one or more variables and corresponding one or more parameters with which the CI is to be monitored, and send the CI with the monitor configuration to a plurality of monitoring software tools operating on a plurality of servers, where each monitoring software tool is configured to monitor the CI based on the monitor configuration.

Change management system with monitoring, alerting, and trending for information technology environment

An information technology (IT) network includes configuration items (CIs) that may constantly change, where the CIs describe hardware components or software components that are configured to operate on the IT network. A system comprising a server can determine a change associated with a CI, send, to a configuration management database (CMDB), a message that updates the CMDB based on the determined change associated with the CI, determine, for the CI, a monitor configuration that describes one or more variables and corresponding one or more parameters with which the CI is to be monitored, and send the CI with the monitor configuration to a plurality of monitoring software tools operating on a plurality of servers, where each monitoring software tool is configured to monitor the CI based on the monitor configuration.

TIME-BASED SYNCHRONIZED ACTIVATION OF CONFIGURATION UPDATES IN NETWORK DEVICES

A network device may receive configuration information with a first command and a second command and may generate a data structure based on the first command. The network device may store files of the configuration information in the data structure based on the first command and may activate the files stored in the data structure, to configure the network device, based on a timestamp or a time period specified in the second command.