Patent classifications
H04L41/0873
Interworking of legacy appliances in virtualized networks
A computing apparatus, including: a hardware platform; and an interworking broker function (IBF) hosted on the hardware platform, the IBF including a translation driver (TD) associated with a legacy network appliance lacking native interoperability with an orchestrator, the IBF configured to: receive from the orchestrator a network function provisioning or configuration command for the legacy network appliance; operate the TD to translate the command to a format consumable by the legacy network appliance; and forward the command to the legacy network appliance.
Interworking of legacy appliances in virtualized networks
A computing apparatus, including: a hardware platform; and an interworking broker function (IBF) hosted on the hardware platform, the IBF including a translation driver (TD) associated with a legacy network appliance lacking native interoperability with an orchestrator, the IBF configured to: receive from the orchestrator a network function provisioning or configuration command for the legacy network appliance; operate the TD to translate the command to a format consumable by the legacy network appliance; and forward the command to the legacy network appliance.
Validating endpoints in a service mesh of a distributed computing system
Some examples of the present disclosure relate to validating endpoints in a service mesh of a distributed computing environment. In one example, a processor can receive configuration settings applied to an endpoint in a data plane of a service mesh in a distributed computing environment. The processor can receive configuration data associated with a configuration of hardware components and software components in the distributed computing environment. The processor can determine a discrepancy between the configuration settings and the configuration data. The processor can then output the discrepancy for use in resolving an operational error relating to the service mesh.
Framework free integration
Examples describe data security and routines structured to avoid conflicts. One example includes accessing data for a merchant website including a framework with a first routine for a function, and accessing an account security element for the merchant website with a second routine associated with an account security system for the function. The second routine is optimized to avoid conflicts with the first routine. The framework is automatically updated while the second routine is maintained with no changes. The merchant website data is then transmitted with the updated first routine and the account security element with the second routine, where the updated first routine and the second routine facilitate data security on the client device without framework conflicts when the updated first routine for the function and the second routine for the function operate concurrently on the client device.
Framework free integration
Examples describe data security and routines structured to avoid conflicts. One example includes accessing data for a merchant website including a framework with a first routine for a function, and accessing an account security element for the merchant website with a second routine associated with an account security system for the function. The second routine is optimized to avoid conflicts with the first routine. The framework is automatically updated while the second routine is maintained with no changes. The merchant website data is then transmitted with the updated first routine and the account security element with the second routine, where the updated first routine and the second routine facilitate data security on the client device without framework conflicts when the updated first routine for the function and the second routine for the function operate concurrently on the client device.
Designated intermediate system (DIS) priority changing
A communication pathway between a plurality of network nodes within a network is established. A DIS election operation is executed to determine a first network node among the plurality of network nodes as the DIS for the network and creating a first pseudo node for the first network node, and with each network node of the plurality of network nodes, determining whether the connectivity between the first network node and the other network nodes of the plurality of network nodes within the network is in a synchronous state with the adjacencies with the other network nodes of the plurality of network nodes within the network.
Detecting and resolving conflicts in a collaborative network planning system
Systems and methods for enabling collaboration for planning changes to a communications network are provided. A method, according to one implementation, includes receiving a first branch of a provisional plan, where the first branch includes information regarding a change to at least one of a network element and services to be provided by the network element. The method also includes receiving a second branch of the provisional plan, where the second branch includes information regarding a change to at least one of the network element and the services to be provided by the network element. The method also includes determining if the first branch and the second branch are compatible with each other. In response to determining that merging the second branch with the first branch would create a conflict, the method further includes providing a resolution to the conflict.
METHODS, SYSTEMS, AND MEDIA FOR SCALABLE VERIFICATION OF COMPUTE CLUSTER CONFIGURATIONS
Methods, systems, and computer-readable media for verification of configurations of compute clusters. An automatic computational process is used to statically and/or dynamically verify configurations of software components installed on one or more interconnected computing entities constituting a compute cluster. Cluster configuration data is obtained, including data representative of a configuration of the software components. The cluster configuration data is processed to identify errors relating to interactions between the software components. Errors may be reported to users and/or corrected by modifying the compute cluster configuration.
METHODS, SYSTEMS, AND MEDIA FOR SCALABLE VERIFICATION OF COMPUTE CLUSTER CONFIGURATIONS
Methods, systems, and computer-readable media for verification of configurations of compute clusters. An automatic computational process is used to statically and/or dynamically verify configurations of software components installed on one or more interconnected computing entities constituting a compute cluster. Cluster configuration data is obtained, including data representative of a configuration of the software components. The cluster configuration data is processed to identify errors relating to interactions between the software components. Errors may be reported to users and/or corrected by modifying the compute cluster configuration.
Service link grooming in data communication networks
Techniques for migrating a plurality of communications services in a data communication network are disclosed. Aspects include accessing a migration map for the plurality of communications services in the data communication network; identifying a communications dependency between a first service and a second service in the plurality of communications services, wherein according to the migration map the first service is configured to migrate from a first route to a second route, the second service is configured to migrate from a third route to a fourth route, and the third route overlaps with the second route; determining, based on the identified communications dependency, a migration sequence for migrating the plurality of communications services in the data communication network; and migrating the plurality of communications services from a first plurality of configurations to a second plurality of configurations according to the migration sequence.