H04L41/0883

ELECTRONIC DEVICE AND METHOD FOR REGISTERING SMART HOME DEVICE IN SMART HOME SYSTEM
20170244574 · 2017-08-24 ·

An electronic device and method for registering a smart home device in a smart home system are provided. In various example embodiments, the electronic device receives a registration signal from the smart home device and collects information about the smart home device by analyzing the received registration signal. Then the electronic device requests a registration confirmation by providing the information about the smart home device through a display and also requests home network connection information when the registration confirmation is received. When the home network connection information is received, the electronic device connects the smart home device to a home network by transmitting the home network connection information to the smart home device.

User-controlled network configuration for handling multiple classes of service

A network configuration method includes receiving end user input indicative of a network configuration. The end user input may include: a plurality of service classes, a particular packet header field for each of the plurality of service classes, and a particular service class mixture for the plurality of service classes. The particular service class may be indicated by a particular value of the particular packet header field. The method may further include configuring an ingress router to prioritize packets sent to the end user in accordance with the network configuration and configuring an egress router to queue network packets sent from the end user in accordance with the network configuration.

NETWORK SERVICE PROVISIONING TOOL AND METHOD

A network service provisioning system may generate a data structure for configuring hardware and implementing an information system based on user responses to dynamically branching prompts. The provisioning system may generate an initial process map for the information system based on the user's responses and a determined information processing task. As described further herein, the provisioning system may break the initial process map into one or more sub-processes and proceed to individually optimize the sub-processes utilizing parallel process on a plurality of worker nodes. The provisioning system may apply a master template based to the intermediate process map to generate one or more optimization recommendations for the intermediate process map. Once a final optimized process map is generated by the provisioning system, the provisioning system may provide the optimized process map to an automatic orchestrator system for configuring and implementing the information system represented by the optimized process map.

COMPUTER SYSTEM MONITORING BASED ON ENTITY RELATIONSHIPS

Monitoring the health of a computer system based on the relationships of entities, and the intelligent presentation of alerts based thereon. A rule-based engine may perform the monitoring and alerting. Problem(s) and problem entity(s) within a computing system are identified during the monitoring. Relationship(s) of the problem entity(s) with other entities in the computer system are then identified. A relationship type for each of the identified relationship(s) is determined. A combination of the identified problem(s), the identified problem entity(s), and the determined relationship type(s) are analyzed to determine root cause(s) of the problem(s). Based on the root cause(s), an alert is presented to a user comprising one or more actions the user can take regarding one or more user-visible entities of the computer system to fix the identified problem(s). The alerts may be fewer in number and more intuitive due to the analysis.

SCOPE ASSIGNMENTS OF NETWORK AUTOMATION FUNCTIONS
20220311664 · 2022-09-29 ·

To configure network automation functions, a scope administration function assigns, per a region in an operator-defined scope space, the region to one or more network automation function amongst a plurality of coexisting network automation functions. Then, per a network automation function assigned at least to one region, the network automation function is configured to control the at least one region assigned to the network automation function.

Deploying a network management controller in an existing data center fabric

Some organizations have a deployed and functional “controllerless” EVPN VxLAN Fabric in their data centers. Eventually, however, the organization may deploy a controller within the network. In one example, this disclosure describes a method that includes configuring a controller to communicate with each of a plurality of elements in a network; determining, by the controller, an initial operational state of the network; translating, by the controller, the initial operational state of the network to an intent-based configuration; pushing, by the controller, the intent-based configuration to the network to reconfigure each of the plurality of elements in the network in a manner consistent with the intent-based configuration; determining, by the controller and after pushing the intent-based configuration, an updated operational state of the network; and comparing, by the controller, the initial operational state of the network with the updated operational state of the network.

EDGE COMPUTE ENVIRONMENT CONFIGURATION TOOL FOR A COMMUNICATIONS NETWORK
20220038340 · 2022-02-03 ·

A tool is provided to configure an edge compute environment of a network. The edge compute configuration tool may generate a configuration process for instantiating an edge compute environment at an edge site of a network including configuring one or more of the components of the edge compute environment. The configuration process may be based on seeding data and/or information provided to the edge compute configuration tool via a user interface and/or from one or more databases associated with the network. The configuration process may further include generating automatically executed configuration instructions that communicate with the devices of the edge compute environment to configure operational processes of the devices, provision communication ports, establish one or more network addresses with the devices, etc. In some instances, the edge compute configuration tool may execute one or more micro-services to communicate with and control configuration of the devices of the edge compute environment.

AI Based AutoComplete for Network Node Configuration
20220309243 · 2022-09-29 ·

Systems, computer readable media and methods are disclosed for providing Artificial Intelligence (AI) based AutoComplete for network node configuration. In one embodiment a method includes predicting a configuration to use based on a model, wherein predicting a configuration comprises: accepting user inputs; converting, by a tokenizer, the user inputs into word tokens; taking, by the model, the word tokens as input sequences and using transfer learning methods calculating parameters of occurrences of next words; and ranking the word tokens according to values of their parameters wherein word tokens with a highest value are suggested to a user for auto completion of the network node configuration.

Rapid and precise methodology for massive small cell deployment
09730081 · 2017-08-08 · ·

Small cell deployment may be provided. First, access point data may be captured by a technician device from an access point. Next, the access point data may be transmitted from the technician device to a backend server. The technician device may then receive post-check results corresponding to the access point from the backend server. The post-check results may be based on the transmitted access point data.

AUTOMATICALLY REPLICATING CONFIGURATION PARAMETERS FROM SECURELY IDENTIFIED CONNECTED SYSTEMS
20220311668 · 2022-09-29 ·

Methods, apparatus, and processor-readable storage media for automatically replicating configuration parameters from securely identified connected systems are provided herein. An example computer-implemented method includes discovering a set of one or more systems connected via at least one network; identifying at least one of the one or more systems of the discovered set by processing cryptographic data associated with at least a portion of the one or more systems; establishing a communication session with the at least one identified system by securing at least one application programming interface; replicating one or more configuration parameters from at least a portion of the at least one identified system in connection with the established communication session; and performing one or more automated actions based at least in part on the one or more replicated configuration parameters.