Patent classifications
H04L41/0806
DEPLOYMENT OF NETWORK-RELATED FEATURES OVER CLOUD NETWORKS
Briefly, methods and/or apparatuses of virtual deployment of network-related features are disclosed.
DEPLOYMENT OF NETWORK-RELATED FEATURES OVER CLOUD NETWORKS
Briefly, methods and/or apparatuses of virtual deployment of network-related features are disclosed.
A METHOD OF DETERMINING LOCATION ADDRESSES OF NODE DEVICES IN A NETWORK OF NODE DEVICES AND SUCH A NODE DEVICE
A method of and a node device for determining location addresses of node devices (21, 22 . . . 26) of a network (10). The node devices (21, 22 . . . 26) are arranged along an elongated track (12) and geographically distanced from each other by an inter-node distance “d”. Each node device (21, 22 . . . 26) comprises a short range communication interface (20). A node device (22) receives a message (27) from an immediate neighbouring node device (21) having a known location address comprised in the message (27). The receiving node device (21) determines its own location address based on the location address received in the message (27). The receiving node device (22) then may transmit a further message (28) comprising its determined location address to a further node device (23), allowing the further node device (23) to determine its location address as well.
METHOD, SYSTEM AND NETWORK NODES FOR ENHANCING SERVICE PROVISION IN A NETWORK COMPRISING A PLURALITY OF COMPUTING DEVICE NODES
A method obtains service request information identifying computing device nodes invoked by users. Based on the service request information, sets of computing device nodes are identified, each set of computing device nodes includes computing device nodes invoked simultaneously or sequentially by one of the users. Communities are further identified based on a probability measure that is a measure of a probability of co-occurrence of two sets of computing device nodes. Each community has sets of computing device nodes each having the probability measure over a probability threshold in relation to at least one other set of computing device nodes in the community. Solutions are predicted for provision of services of the sets of computing device nodes of the communities. Each predicted solution for provision of services relates to a community and is determined based on shared knowledge of predicted solutions for provision of services relating to other communities.
METHOD, SYSTEM AND NETWORK NODES FOR ENHANCING SERVICE PROVISION IN A NETWORK COMPRISING A PLURALITY OF COMPUTING DEVICE NODES
A method obtains service request information identifying computing device nodes invoked by users. Based on the service request information, sets of computing device nodes are identified, each set of computing device nodes includes computing device nodes invoked simultaneously or sequentially by one of the users. Communities are further identified based on a probability measure that is a measure of a probability of co-occurrence of two sets of computing device nodes. Each community has sets of computing device nodes each having the probability measure over a probability threshold in relation to at least one other set of computing device nodes in the community. Solutions are predicted for provision of services of the sets of computing device nodes of the communities. Each predicted solution for provision of services relates to a community and is determined based on shared knowledge of predicted solutions for provision of services relating to other communities.
SLICE AUTHENTICATION METHOD AND APPARATUS
This application provides a slice authentication method and an apparatus. One example method includes: initiating, by a first network function (NF), slice authentication between a terminal device and an authentication server for a slice; sending, by the first NF, identification information of a first network, identification information of the slice, and identification information of the terminal device to the authentication server, wherein the first NF is an NF in the first network; and receiving, by the first NF, a slice authentication result for the slice, the identification information of the slice, and the identification information of the terminal device from the authentication server.
INTERNET OF THINGS CONFIGURATION USING EYE-BASED CONTROLS
In an approach to an Internet of Things configuration using eye-based controls, one or more computer processors receive an initiation of eye control of one or more computing devices from a user. One or more computer processors identify an eye gaze direction of the user. Based on the identified eye gaze direction, one or more computer processors determine one or more target devices of the one or more computing devices. One or more computer processors determine one or more activities associated with the one or more target devices. One or more computer processors determine one or more eye control commands associated with the one or more activities. One or more computer processors display the one or more eye control commands associated with the one or more activities in the field of view of the user.
DEVICES AND METHODS FOR PARALLEL PROVISIONING OF NODE NETWORKS
A method to provision a node network including provisioning a first generation of nodes by a root node; and provisioning a second generation of nodes by the first generation of nodes. Wherein at least one node from the first generation of nodes or the second generation of nodes is provisioned simultaneously with at least one other node from the first generation of nodes or the second generation of nodes.
SIDECAR PROXY AS A SERVICE
Disclosed are embodiments for injecting sidecar proxy capabilities into non-sidecar applications, allowing such non-sidecar applications to communicate with a service mesh architecture. In an embodiment, a method comprises receiving a request to instantiate a proxy for a non-sidecar application at a service mesh gateway (SMG). The SMG then instantiates the proxy in response to the request and broadcasts network information of the non-sidecar application to a mesh controller deployed in a containerized environment. Finally, the SMG (via the proxy) transmits data over a control plane that is communicatively coupled to the mesh controller.
Hybrid clouds
Systems and methods may create and manage hybrid clouds including both standard compute nodes and edge devices. Edge devices can be enrolled in a hybrid cloud by deploying a lightweight container to the edge device.