H04L41/0876

Security techniques for device assisted services
11405429 · 2022-08-02 · ·

Security techniques for device assisted services are provided. In some embodiments, secure service measurement and/or control execution partition is provided. In some embodiments, implementing a service profile executed at least in part in a secure execution environment of a processor of a communications device for assisting control of the communications device use of a service on a wireless network, in which the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network; monitoring use of the service based on the service profile; and verifying the use of the service based on the monitored use of the service.

Automatic network configuration in data protection operations

Automatic network configuration for the recovery of virtual machines. A network configuration can be automatically provisioned by discovering the network topology of a source site and then matching the virtual machines to their locations or subnets in the network topology. The network is then implemented on a target site such that the required connectivity is present in the recovered target site even when the infrastructure of the source site and the target site are different.

SYSTEMS AND METHODS FOR NETWORK ANALYTICS SERVICE AUTOMATION

A method may include identifying service requirements associated with a network service, identifying at least one analytics component to monitor the network service and identifying network functions to implement the network service. The method may also include deploying the network functions to monitor the network service, deploying the at least one analytics component and obtaining data associated with monitoring the network service. The method may further include forwarding, by the network functions, the data to the at least one analytics component and determining, by the least one analytics component, whether to take a control action with respect to the network service.

Egress truncation for tap aggregation devices
11418396 · 2022-08-16 · ·

Some embodiments provide a method, executable by a network device, that receives a packet from a network at a first port of the network device. The method further sends the packet to a second port of the network device. The second port includes an interface and a loopback function implemented at an egress of the interface. The loopback function is configured to transmit the packet back to the network device through the interface. The interface is configured to truncate the packet upon receiving the packet from the loopback function. Upon receiving the truncated packet from the interface of the second port, the method also forwards the truncated packet to a device through a third port of the network device that is coupled to the device.

Automated discovery and configuration techniques

A method may include receiving topology information associated with a linear motor system that includes multiple track modules. Each track module may include one or more motors. The topology information may include one or more media access control (MAC) addresses associated with the motors. The method may also include associating one or more IP addresses with the MAC addresses associated with the motors, generating a configuration file associated with the linear motor system based on the topology information and the IP addresses, and transmitting one or more commands to the motors to control or adjust one or more operations of the motors based on the configuration file.

Automated generation of standard network device configurations

Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration.

AUTOMATED GENERATION OF STANDARD NETWORK DEVICE CONFIGURATIONS

Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration.

Centralized platform management for computing environments

Methods, systems, and apparatus, including computer programs encoded on computer-readable storage media, for centralized platform management for multiple environments. In some implementations, a management system obtains configuration information for each of multiple computing environments. The management system stores the configuration information for the multiple computing environments in a repository and monitors actions that change configurations of the multiple computing environments. The management system provides an interface configured to provide information about the configurations of the multiple computing environments and to adjust the configurations of the multiple computing environments in response to input received through the interface.

AUTOMATIC CONFIGURING OF VIRTUAL NETWORKING BASED ON INFORMATION FROM A SWITCH
20220200862 · 2022-06-23 ·

Examples described herein include systems and methods for automatically configuring a VM on a server using information from a switch located remotely from the server. The switch can provide the configuration information in a Link Layer Discovery Protocol (“LLDP”) type-length-value (“TLV”) data structure. The configuration information can include various information related to configuring a VM, such as a VM identifier, an indication of a physical port of the server, a VM interface that corresponds to the identified physical port, and a virtual local area network (“VLAN”) identifier indicating that a particular VLAN corresponds to the VM, VM interface, or the physical port. The hypervisor can use this configuration information to automatically configure a newly instantiated VM, or reconfigure a VM for a new task, without manual user input.

Application programming interface (API) to provide network metrics and network resource control to users

Novel tools and techniques are provided for implementing network application programming interface (“API”), and, more particularly, API to provide network metrics and network resource control to users. In some embodiments, a computing system might receive customer network telemetry data from a first network via a gateway API, might receive service provider network telemetry data from a second network(s) via a network API, might compile the customer network telemetry data and the service provider network telemetry data, might receive a request from a user to access information regarding network services associated with the user, might filter the compiled customer network telemetry data and the compiled service provider network telemetry data to isolate first telemetry data and second telemetry data, respectively, might provide the user with access to at least one of the first telemetry data or the second telemetry data, and might provide the user with options to control network resources.