H04L41/0876

Integrated hub systems control interfaces and connections

Systems, methods, and instrumentalities are disclosed for switching a control scheme to control a set of system modules and/or modular devices of a surgical hub. A surgical hub may determine a first control scheme that is configured to control a set of system modules and/or modular devices. The surgical hub may receive an input from one of the set of modules or a device located in an OR. The surgical hub may make a determination that at least one of a safety status level or an overload status level of the surgical hub is higher than its threshold value. Based on at least the received input and the determination, the surgical hub may determine a second control scheme to be used to control the set of system modules. The surgical hub may send a control program indicating the second control scheme to one or more system modules and/or modular devices.

INTENT-BASED NETWORKING USING DEVICE ADMINISTRATIVE SHELL
20210344561 · 2021-11-04 ·

A network controller automatically adjusts a computer network based on the operational information of an industrial device. The network controller receives a notification from a network element in the computer network that the industrial device attached to the network element has an administrative shell. The administrative shell includes operational information describing the operation of the industrial device. The network controller retrieves the administrative shell from the industrial device. The network controller parses the operational information in the administrative shell to determine an intent for the industrial device, and adjusts the computer network based on the intent of the industrial device.

Automatic system provisioning for NVME-over-fabric storage

A network switch is provided. The network switch may incorporate resources for use as network attached resources for remote devices. Resources may include SSD storage for use as network attached storage for remote devices. The network switch may also include one or more client applications configured to detect an intended access path between a remote device and a non-volatile memory express (NVMe) storage device. The intended access path may be based on one of many different NVMe over fabric (NVMe-oF) protocols. The network switch (via the one or more client applications) automatically configures parameters to provide a network connectivity path between the remote device and the NVMe storage device. Communication includes at least one of a virtual local area network (VLAN) and a communication tunnel and/or other form of dedicated communication path to facilitate remotely accessible storage capacity provided from the network switch to the remote device.

Automated device provisioning and activation
11757943 · 2023-09-12 · ·

There is provided a wireless end-user device including a wireless wide area network (WWAN) modem, a memory storing a WWAN network access policy including one or more first policy instructions associated with a first software application, and one or more processors to provide, using the WWAN modem, one or more network data traffic flows between the wireless end-user device and the WWAN, associate the first software application with a first one of the one or more network data traffic flows, and when (i) the wireless end-user device communicates or attempts to communicate data over the WWAN, and (ii) the first software application is associated with the first one of the one or more network data traffic flows, apply the one or more first policy instructions associated with the first software application to the first one of the one or more network data traffic flows.

Cloud based WiFi network setup for multiple access points

Methods, systems, and devices for facilitating the automated configuration of one or more new 802.11 access points (APs) are disclosed herein. A cloud server may receive a message associated with a customer account for one or more new APs. The cloud server may associate a first AP of the one or more new APs based on the message. The cloud server may then retrieve a public key associated with the first AP which has a reciprocal private key. The cloud server may send the public key to a gateway (GW) associated with the customer account. The GW may encrypt the GW credentials, such as a password and SSID, into a ciphertext using the public key and then broadcast this information. When the first AP has been powered on it may decrypt the ciphertext using the private key and use the credentials to act as a node in the GW's network.

Intelligent learning and management of a networked architecture
11658873 · 2023-05-23 · ·

Intelligent learning and management of networked architectures is disclosed. A network architecture can be mapped to identify a set of interconnected hardware and software elements that comprise the network architecture. Data sources associated with the set of interconnected hardware and software elements can be identified and employed to compile data associated with the elements. The data can be utilized to determine an action to address potential negative effects of a change to the network architecture such as an update or patch. In one instance, the action corresponds to a reconfiguration of at least one of the set of interconnected hardware and software elements. Further, machine learning can be employed to determine a particular configuration. Once determined the action can be implemented on the network architecture.

SYSTEM AND METHOD FOR MANAGING COMPUTING DEVICES

A method for managing a plurality of computing devices comprises: periodically collecting status information from the plurality of computing devices; providing a user interface including: a first control to select one or more of the plurality of computing devices; and a second control to select one of a plurality of operating modes, the plurality of operating modes including: a manual mode in which the one or more selected computing devices are operated according to user selected settings; and an intelligent mode in which the one or more selected computing devices are operated according to dynamic settings; and in response to one or more of the plurality of computing devices being selected with the first control and one of the plurality of operating modes being selected with the second control, applying the selected operating mode to the one or more selected computing devices.

Systems and methods for network analytics service automation

A method may include identifying service requirements associated with a network service, identifying at least one analytics component to monitor the network service and identifying network functions to implement the network service. The method may also include deploying the network functions to monitor the network service, deploying the at least one analytics component and obtaining data associated with monitoring the network service. The method may further include forwarding, by the network functions, the data to the at least one analytics component and determining, by the least one analytics component, whether to take a control action with respect to the network service.

Automatic configuring of virtual networking based on information from a switch
11824720 · 2023-11-21 · ·

Examples described herein include systems and methods for automatically configuring a VM on a server using information from a switch located remotely from the server. The switch can provide the configuration information in a Link Layer Discovery Protocol (“LLDP”) type-length-value (“TLV”) data structure. The configuration information can include various information related to configuring a VM, such as a VM identifier, an indication of a physical port of the server, a VM interface that corresponds to the identified physical port, and a virtual local area network (“VLAN”) identifier indicating that a particular VLAN corresponds to the VM, VM interface, or the physical port. The hypervisor can use this configuration information to automatically configure a newly instantiated VM, or reconfigure a VM for a new task, without manual user input.

Automated device provisioning and activation
11757942 · 2023-09-12 · ·

An end-user device including a service control device link agent, a memory configured to store a first encryption key, a modem configured to enable communications with a network system over a service control link, and a plurality of device agents communicatively coupled to the service control device link agent, each of the plurality of device agents identifiable by an associated one of a plurality of device agent identifiers. The service control device link agent configured to receive an encrypted agent message from a network element of the network system, decrypt the encrypted agent message, using the first encryption key, to obtain an agent message having a device agent identifier and message content for delivery to a device agent identified by the device agent identifier, the message content being from a server communicatively coupled to the network element, and deliver the message content to the device agent.