H04L41/5003

Identifying root causes of network service degradation
20230011452 · 2023-01-12 ·

Systems and methods are provided for analyzing one or more root causes of service degradation events in a network or other environment. A method, according to one implementation, includes a step of monitoring a plurality of overlying services offered in an underlying infrastructure having a plurality of resources arranged with a specific topology. In response to detecting a negative impact on the overlying services during a predetermined time window and based on an understanding of the specific topology, the method further includes the step of identifying suspect components from the plurality of resources in the underlying infrastructure. The method also includes the step of obtaining status information with respect to the suspect components to determine a root cause of the negative impact on the overlying services.

Apparatus, system and method for operating a software-defined network

Various embodiments include an apparatus for operating a software-defined network having a number of network elements comprising: a memory unit storing an image of the software-defined network; a control unit programmed to use the stored image as a basis for controlling forwarding of data streams by the number of network elements; and a comparison unit programmed to compare the stored image against a network image published in a ledger of a blockchain.

Apparatus, system and method for operating a software-defined network

Various embodiments include an apparatus for operating a software-defined network having a number of network elements comprising: a memory unit storing an image of the software-defined network; a control unit programmed to use the stored image as a basis for controlling forwarding of data streams by the number of network elements; and a comparison unit programmed to compare the stored image against a network image published in a ledger of a blockchain.

Methods and systems for the reservation and registration of internet of things device licenses from authorized licenses associated with vendor software

Novel tools and techniques for an IoT shell are provided. A system includes an internet of things (IoT) device, a database, and a license manager. The database may include one or more sets of authorized licenses, each set of authorized licenses associated with a respective vendor software. The license manager may be in communication with the IoT device and the database, and further include a processor and a non-transitory computer readable medium comprising instructions executable by the processor. The license manager may be configured to receive a request to reserve a license for a first vendor software, determine an availability of the license associated with the first vendor software, register a unique identifier of the IoT device in association with the license, and grant the license to the IoT device.

Secure aggregation of IoT messages

A system includes processing circuitry; and a memory device including instructions embodied thereon, wherein the instructions, which when executed by the processing circuitry, configure the processing circuitry to perform operations comprising: accessing input data, at an aggregator node, the input data including sensor data from a plurality of sensor nodes, each sensor data having a respective signature; validating the sensor data by using respective cryptographic hash functions on the sensor data and evaluating the respective result using the respective signature; performing an aggregation function on the sensor data to produce aggregate data; executing a hash function on the aggregate data to produce a hash value for the aggregate data; bundling the sensor data, respective signatures of the sensor data, aggregate data, and hash value for the aggregate data in a data structure; and exposing the data structure to subscriber nodes on the IoT network.

Secure aggregation of IoT messages

A system includes processing circuitry; and a memory device including instructions embodied thereon, wherein the instructions, which when executed by the processing circuitry, configure the processing circuitry to perform operations comprising: accessing input data, at an aggregator node, the input data including sensor data from a plurality of sensor nodes, each sensor data having a respective signature; validating the sensor data by using respective cryptographic hash functions on the sensor data and evaluating the respective result using the respective signature; performing an aggregation function on the sensor data to produce aggregate data; executing a hash function on the aggregate data to produce a hash value for the aggregate data; bundling the sensor data, respective signatures of the sensor data, aggregate data, and hash value for the aggregate data in a data structure; and exposing the data structure to subscriber nodes on the IoT network.

Method and apparatus for searching for maintenance end point (MEP), and storage medium

Provided is a method and apparatus for searching for a Maintenance End Point (MEP), and a storage medium. The method includes that: a chip of the MEP parses an obtained packet; the chip of the MEP determines whether a field of the parsed packet matches a field in a combination of a port and a Virtual Local Area Network (VLAN); and in a case where the field of the parsed packet matches the field in the combination of the port and the VLAN, the chip of the MEP determines that the MEP is found successfully.

Method and apparatus for searching for maintenance end point (MEP), and storage medium

Provided is a method and apparatus for searching for a Maintenance End Point (MEP), and a storage medium. The method includes that: a chip of the MEP parses an obtained packet; the chip of the MEP determines whether a field of the parsed packet matches a field in a combination of a port and a Virtual Local Area Network (VLAN); and in a case where the field of the parsed packet matches the field in the combination of the port and the VLAN, the chip of the MEP determines that the MEP is found successfully.

Technologies for autonomous edge compute instance optimization and auto-healing using local hardware platform QoS services

Technologies for analyzing and optimizing workloads (e.g., virtual network functions) executing on edge resources are disclosed. According to one embodiment disclosed herein, a compute device launches a virtualized system including a virtual network function and a performance manager, the performance manager to monitor a current resource usage of the virtual network function as a function of a performance profile. The compute device determines, in response to a determination that one or more quality-of-service (QoS) requirements is not satisfied, whether one or more resources from the platform are available for satisfying the QoS requirements. The compute device receives, in response to a determination that the one or more resources are available for satisfying the QoS requirements, the one or more resources and updates the performance profile as a function of the received resources.

Method and apparatus for real-time dynamic application programming interface (API) traffic shaping and infrastructure resource protection in a multiclient network environment

A real-time dynamic API traffic shaping and infrastructure resource protection in a multiclient network environment is provided. A traffic rules engine (TRE) applies traffic shaping only to customers that are utilizing “more than their fair share” of the currently available bandwidth without allowing them to negatively impact the user experience of other users. The present invention takes current API traffic into consideration, allowing one or a few high volume users to utilize most of all available bandwidth as long as other users do not need that bandwidth. This includes dynamically measuring and adjusting which users had traffic shaping applied to them based on the overall traffic during any given second. The solution of the present invention avoids any slowdown of customer API requests unless the maximum allowable TPS limit is near to being reached.