H04L41/0618

Multi-tenant event sourcing and audit logging in a cloud-based computing infrastructure
11063811 · 2021-07-13 · ·

Examples described herein include systems and methods for multi-tenant event sourcing and audit logging in a cloud-based computing infrastructure. In an example method, an event package can be received from a first microservice of an application. The event can describe any action performed within the computing infrastructure and can include various types of information. For example, it can include an event type, event ID, object type, object ID, and parent event ID. The event package can be associated with a tenant and only provided to tenant-approved recipients. The recipient can use the event package to automatically carry out steps to recreate and configure an object, or to determine the source of an event or failure within the system.

WIRELESS DEVICE AND METHODS FOR USE IN A PAGING NETWORK

A wireless device includes a user interface that generates a pairing signal in response to an indication from a user to pair the wireless device to at least one remote device and generates a first location request signal in response to a second indication from a user to locate the at least one remote device. A short-range wireless transceiver communicates RF signals to pair the wireless device to the at least one remote device and that transmits a first RF paging signal to the at least one remote device in response to the location request signal.

ROUTE CALCULATION METHOD, ROUTE CALCULATION DEVICE, AND PROGRAM
20210006486 · 2021-01-07 ·

A computer executes a first determination procedure determining a first link which at least partially overlaps a disaster area representing a range reached by an influence of a predetermined disaster, among links constituting a network, a second determination procedure determining a second link which at least partially overlaps a road area representing a range of a road width of a predetermined road used to recover from the disaster, among the links constituting the network, a route search procedure searching for a plurality of routes from a start point node to an end point node constituting the network, a grouping procedure grouping the plurality of routes searched for by the route search procedure into groups depending on a first parameter value that is based on the first link included in the routes, a computing procedure computing, for each of the plurality of routes searched for by the route search procedure, a second parameter value that is based on the first link and the second link included in the routes, and a selecting procedure selecting a predetermined number of routes among one or more routes grouped into the same group on the basis of the second parameter value computed by the computing procedure for each of the groups grouped by the grouping procedure.

Self-healing Telco network function virtualization cloud

Examples herein describe systems and methods for self-healing in a Telco network function virtualization cloud. KPI attributes for virtual network functions can be mapped to physical fault notifications to create synthesized alerts. The synthesized alerts can include information from both a virtual and physical layer, allowing a self-healing action framework to determine root causes of problems in the Telco cloud. Remedial actions can then be performed in either the virtual or physical layer of the Telco cloud. Remedial actions in one layer can be based on root causes identified in the other, which can allow for remediation before network downtime occurs.

NETWORK PERFORMANCE MONITORING AND ANOMALY DETECTION

During operation, a computer may compare values of at least one performance metric for access points in appropriate contexts to determine one or more temporal anomalies and/or one or more spatial anomalies for one or more of the access points. Then, the computer may generate one or more temporal anomaly events based at least in part on the one or more temporal anomalies and one or more spatial anomaly events based at least in part on the one or more spatial anomalies. Next, the computer may calculate one or more complex events based at least in part on two or more of the different anomalies. Moreover, the computer may evaluate the different anomalies, anomaly event and/or complex events to determine one or more insights about a problem in the network. Furthermore, the computer may perform a remedial action.

Identifying network issues using an agentless probe and end-point network locations

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for improving the connectivity and response speed throughout a network. In one aspect, a method includes receiving network traffic data from an aggregation point on a network, the network traffic data having been sent to or received from one of a plurality of end-point devices on the network, calculating performance metrics for each of the end-point devices based the received network traffic data, for each of the end-point devices, comparing the performance metrics to respective threshold values to determine performance issues for the network, wherein the threshold values are determined based on historical network data, correlating the determined performance issues for the network to an aspect of the end-point devices, and implementing an action to correct the determined performance issues for the network based on the aspect of the at least one end-point devices.

Wireless device and methods for use in a paging network

A wireless device includes a user interface that generates a pairing signal in response to an indication from a user to pair the wireless device to at least one remote device and generates a first location request signal in response to a second indication from a user to locate the at least one remote device. A short-range wireless transceiver communicates RF signals to pair the wireless device to the at least one remote device and that transmits a first RF paging signal to the at least one remote device in response to the location request signal.

Method and system for detecting errors in local area network

Novel tools and techniques are provided for implementing error detection in a network, and, more particularly, to methods, systems, and apparatuses for implementing error and/or fault detection in a network and/or media stream and providing options to address the error and/or fault in the network and/or media stream. In various embodiments, a computer might detect an error in a first network and send a notification indicating that the error has occurred. The notification might contain one or more options to address the error in the first network. The computer, a user device, a service provider device, or a content provider device might receive and display the notification containing the one or more options. The computer, the user device, the service provider device, or the content provider device might then select at least one of the one or more options to address the error in the first network.

MULTI-TENANT EVENT SOURCING AND AUDIT LOGGING IN A CLOUD-BASED COMPUTING INFRASTRUCTURE
20200344109 · 2020-10-29 ·

Examples described herein include systems and methods for multi-tenant event sourcing and audit logging in a cloud-based computing infrastructure. In an example method, an event package can be received from a first microservice of an application. The event can describe any action performed within the computing infrastructure and can include various types of information. For example, it can include an event type, event ID, object type, object ID, and parent event ID. The event package can be associated with a tenant and only provided to tenant-approved recipients. The recipient can use the event package to automatically carry out steps to recreate and configure an object, or to determine the source of an event or failure within the system.

Data center agent for data center infrastructure monitoring data access and translation

In some examples, a method includes obtaining, by a data center infrastructure monitoring (DCIM) agent executing on a computing device deployed by a data center provider within a first data center of a plurality of geographically-distributed data centers, an infrastructure asset data object comprising infrastructure asset data for a physical infrastructure asset of a second data center of the plurality of geographically-distributed data centers; translating, by the DCIM agent using an asset mapping table, the infrastructure asset data object to formatted infrastructure asset data, wherein the asset mapping table maps one or more properties of infrastructure asset data objects to management protocol objects or control protocol objects for one of a management protocol or control protocol; and sending, by the DCIM agent to customer equipment co-located within the first data center, the formatted infrastructure asset data in a communication that conforms to one of the management protocol or control protocol.