Patent classifications
H04L41/0893
Systems and methods of managing communication endpoints
In one embodiment, a method includes receiving a trigger to dynamically modify a serving site of a communication endpoint, wherein the communication endpoint is registered to receive digital communication service from a first serving site. The method further includes determining a stored serving-site selection policy applicable to the communication endpoint. The method also includes selecting a second serving site for the communication endpoint based, at least part, on a stored serving-site selection policy. Also, the method includes determining endpoint-configuration requirements of the second serving site. Furthermore, the method includes dynamically generating endpoint configurations that satisfy the endpoint-configuration requirements of the second serving site. Moreover, the method includes writing the generated endpoint configurations to the communication endpoint. Additionally, the method includes causing the communication endpoint to register to receive digital communication service from the second serving site in place of the first serving site.
METHOD FOR ACCESSING NETWORK SLICE, ELECTRONIC DEVICE AND STORAGE MEDIUM
The present application discloses a method for accessing a network slice, an electronic device, and a storage medium. The method includes: acquiring access information of a target network slice according to an access request of an application for requesting to access the target network slice; generating a routing policy between the application and the target network slice according to the access information; and accessing the application to the target network slice according to the routing policy, so that the application performs network communication through the target network slice.
METHOD FOR ACCESSING NETWORK SLICE, ELECTRONIC DEVICE AND STORAGE MEDIUM
The present application discloses a method for accessing a network slice, an electronic device, and a storage medium. The method includes: acquiring access information of a target network slice according to an access request of an application for requesting to access the target network slice; generating a routing policy between the application and the target network slice according to the access information; and accessing the application to the target network slice according to the routing policy, so that the application performs network communication through the target network slice.
Apparatus, system and method for operating a software-defined network
Various embodiments include an apparatus for operating a software-defined network having a number of network elements comprising: a memory unit storing an image of the software-defined network; a control unit programmed to use the stored image as a basis for controlling forwarding of data streams by the number of network elements; and a comparison unit programmed to compare the stored image against a network image published in a ledger of a blockchain.
Apparatus, system and method for operating a software-defined network
Various embodiments include an apparatus for operating a software-defined network having a number of network elements comprising: a memory unit storing an image of the software-defined network; a control unit programmed to use the stored image as a basis for controlling forwarding of data streams by the number of network elements; and a comparison unit programmed to compare the stored image against a network image published in a ledger of a blockchain.
Data analytics method and apparatus
Embodiments of this application provide example data analytics methods and example data analytics apparatuses. An example method carried out by a user plane data processing network element includes: obtaining information about at least one feature set from a data analytics network element, where information about each feature set in the information about the at least one feature set corresponds to at least one service type or at least one execution rule; obtaining a feature parameter of user plane data based on the information about the at least one feature set; sending the feature parameter to the data analytics network element; obtaining a response result of the feature parameter from the data analytics network element; obtaining, based on the response result, a service type associated with the user plane data or an execution rule associated with the user plane data.
Data analytics method and apparatus
Embodiments of this application provide example data analytics methods and example data analytics apparatuses. An example method carried out by a user plane data processing network element includes: obtaining information about at least one feature set from a data analytics network element, where information about each feature set in the information about the at least one feature set corresponds to at least one service type or at least one execution rule; obtaining a feature parameter of user plane data based on the information about the at least one feature set; sending the feature parameter to the data analytics network element; obtaining a response result of the feature parameter from the data analytics network element; obtaining, based on the response result, a service type associated with the user plane data or an execution rule associated with the user plane data.
EXTENDING EXPIRATION OF USER SESSIONS WITH AUTHENTICATION REFRESH
A gateway performs silent authentication refreshes with an identity management platform in order to extend the expiration of a cookie provided to an endpoint that accesses network applications through the gateway.
Creating a global Reinforcement Learning (RL) model from subnetwork RL agents
Methods are provided for recommending actions to improve operability of a network. In one implementation, a method includes acknowledging a plurality of subnetworks in a whole network, each subnetwork including multiple nodes and being represented by a tunnel group having multiple end-to-end tunnels through the subnetwork. The method also includes selecting a first group of subnetworks from the plurality of subnetworks and generating a Reinforcement Learning (RL) agent for each subnetwork of the first group. Each RL agent is based on observations of end-to-end metrics of the end-to-end tunnels of the respective subnetwork. The observations are independent of specific topology information of the subnetwork. Also, the method includes training a global model based on the RL agents of the first group of subnetworks and applying the global model to an Action Recommendation Engine (ARE) configured for recommending actions that can be taken to improve a state of the whole network.
HYBRID EDGE COMPUTING
Hybrid edge computing that includes a nimble framework that identifies services for available in a marketplace. The nimble framework defines a location for computing the services selected from the group consisting of a center server, an edge provision server and an edge node. The hybrid edge computing further includes a third party provider making are request for a service to the nimble framework. The hybrid edge computing further includes a virtualized service being provided by the nimble framework to the third party provider including a matched service to the third party provider request for the service, and an optimal location for computing.