Patent classifications
H04L41/0659
Tamper-evidence processing by comparing updated objects or by comparing summaries thereof
In each node system, a request execution unit executes, for each state update request, state update processing of updating an object representing a state of a target specified in the request, and returns a response indicative of completion of the request without executing tamper-evidence processing. The tamper-evidence execution unit executes tamper-evidence processing of detecting whether one or more common completion requests of one or a plurality of update completion requests are tampered with by comparing updated objects of two or more node systems or summaries thereof. The update completion request is a state update request for which the execution of the state update processing has been completed. The common completion request is an update completion request that is common among two or more node systems of the plurality of node systems.
Automated network voice testing platform
A device initiates voice communication sessions with a media resource function processor (MRFP) of a network, where each voice communication session communicates audio data via one or more network devices of the network. For each voice communication session, the device sends first audio data to the MRFP and receives second audio data from the MRFP via the voice communication session, processes the first audio data and second audio data to determine one or more characteristics of the second audio data, and generates a record concerning the voice communication session based on the one or more characteristics of the second audio data. The device generates a report based on a respective record of each voice communication session, processes the report using an artificial intelligence technique to identify an issue concerning at least one network device, and performs, based on identifying the issue, an action concerning the at least one network device.
Automated network voice testing platform
A device initiates voice communication sessions with a media resource function processor (MRFP) of a network, where each voice communication session communicates audio data via one or more network devices of the network. For each voice communication session, the device sends first audio data to the MRFP and receives second audio data from the MRFP via the voice communication session, processes the first audio data and second audio data to determine one or more characteristics of the second audio data, and generates a record concerning the voice communication session based on the one or more characteristics of the second audio data. The device generates a report based on a respective record of each voice communication session, processes the report using an artificial intelligence technique to identify an issue concerning at least one network device, and performs, based on identifying the issue, an action concerning the at least one network device.
Failover port forwarding between peer storage nodes
Systems and methods for failover port forwarding between peer storage nodes are described. Storage nodes may include separate data ports for host network communication and peer network communication. In the event of host port failure, host nodes may be configured to send failover storage requests to a different storage node and that storage node may forward the failover storage request through the peer ports to reach the target storage node.
Failover port forwarding between peer storage nodes
Systems and methods for failover port forwarding between peer storage nodes are described. Storage nodes may include separate data ports for host network communication and peer network communication. In the event of host port failure, host nodes may be configured to send failover storage requests to a different storage node and that storage node may forward the failover storage request through the peer ports to reach the target storage node.
METHOD AND APPARATUS FOR CORE NETWORK RESPONSE TO PREDICTABLE SATELLITE BACKHAUL OUTAGES
For a communication network using a satellite-involved backhaul, the backhaul outage and restoration states are predicted based on satellite motion data. Based on such predictions, devices providing the core portion of the communication network, and nearby Internet or backhaul radio devices can schedule or take actions. Actions can include but are not necessarily limited to: powering equipment up or down, suspending communications, migrating software from servers being powered down, transmitting replies to packets to indicate an anticipated outage and optionally anticipated outage end time, marking packets with congestion indications, closing or reopening certain ports, withdrawing or reinstating routing table addresses, and transmitting outage notifications to users or devices.
METHOD AND APPARATUS FOR CORE NETWORK RESPONSE TO PREDICTABLE SATELLITE BACKHAUL OUTAGES
For a communication network using a satellite-involved backhaul, the backhaul outage and restoration states are predicted based on satellite motion data. Based on such predictions, devices providing the core portion of the communication network, and nearby Internet or backhaul radio devices can schedule or take actions. Actions can include but are not necessarily limited to: powering equipment up or down, suspending communications, migrating software from servers being powered down, transmitting replies to packets to indicate an anticipated outage and optionally anticipated outage end time, marking packets with congestion indications, closing or reopening certain ports, withdrawing or reinstating routing table addresses, and transmitting outage notifications to users or devices.
IGP topology information and use for BIER-TE
A first Bit Index Explicit Replication Traffic Engineering (BIER-TE) node of a network includes a first interface to a second BIER-TE node in the network. The first node includes a configuration topology and an operational topology. The configuration topology represents the configuration of the network and the operational topology represents usable and consistent links in the network topology. The first node receives first network topology information and updates the configuration topology with the first network topology information. The first node also verifies the first network topology information and updates the operational topology with the first network topology information responsive to the verification. The first node receives a packet including a routing bitstring having a set bit at a first bit index corresponding to the first interface and routes the packet to the second node responsive to the routing bitstring and the operational topology.
IGP topology information and use for BIER-TE
A first Bit Index Explicit Replication Traffic Engineering (BIER-TE) node of a network includes a first interface to a second BIER-TE node in the network. The first node includes a configuration topology and an operational topology. The configuration topology represents the configuration of the network and the operational topology represents usable and consistent links in the network topology. The first node receives first network topology information and updates the configuration topology with the first network topology information. The first node also verifies the first network topology information and updates the operational topology with the first network topology information responsive to the verification. The first node receives a packet including a routing bitstring having a set bit at a first bit index corresponding to the first interface and routes the packet to the second node responsive to the routing bitstring and the operational topology.
Dynamic reconfiguration of resilient logical modules in a software defined server
Dynamic adaptive reconfiguration of a computing system includes receiving a request to remove a first node in a plurality of physical nodes. An operating system is executing collectively across the plurality of physical nodes, and an application is running on the operating system. It further includes in response to the request, and while the application is running, evacuating virtualized resources associated with the first node to one or more other nodes in the plurality of physical nodes. It further includes subsequent to the evacuation of the virtualized resources, removing the first node from the plurality of physical nodes.