Patent classifications
H04L41/0886
Self-adapting autonomous transmission configuration
Methods, systems, and devices for wireless communications are described. Autonomous transmissions between a user equipment (UE) and a base station may be configured that include at least one of a modulation and coding scheme (MCS) or resources for the transmissions. In some cases, a trigger may be detected that changes the MCS or resources to be used for the autonomous transmissions. The trigger may include the presence or absence of retransmissions or the value of a channel measurement falling below or exceeding a threshold value. Accordingly, the base station and UE may adjust the MCS or resources to be used for the autonomous transmissions based on detecting the trigger and then communicate using the adjusted MCS or resources. In some cases, the configuration for the autonomous transmissions may be signaled via a medium access control (MAC) control element (CE).
Monitoring and managing services in legacy systems using cloud native monitoring and managing tools
The disclosure herein describes using a monitoring tool and a management tool from a cloud native system to monitor and manage an application executing on a legacy system. Network addresses of services running in the application on the legacy systems are discovered. Based on the discovered addresses, a probe is configured for execution on the legacy system by a monitoring tool deployed on the legacy system to obtain metrics data associated with the services running on the legacy system, the metrics data representing execution loads of the application. A management tool deployed on the cloud native system receives the obtained metrics data. The management tool compares the metrics data to one or more performance thresholds associated with the application. Based on the comparison, the management tool adjusts a quantity of instances of the application running on the cloud native system, enabling the cloud native system to share the execution loads.
METHODS AND SYSTEMS FOR PROVISIONING AND MANAGING INTERNET-OF-THING DEVICES OVER A NETWORK
Methods for provisioning and managing Internet-of-Things (IoT) devices over a network using device based tunneled nodes are provided. In one aspect, a method includes receiving, by a first network device in a network, data originated from an Internet-of-Things (IoT) device; identifying a device type of the IoT device by analyzing data packets of the received data; obtaining, by the first network device, a device profile for the IoT device, wherein the device profile is used for provisioning the IoT device to access the network; and provisioning the IoT device using the device profile, wherein the provisioning includes at least one of (1) identifying a tunneling attribute in the device profile; and (2) identifying a constrained application protocol (CoAP) parameter in the device profile, wherein the CoAP parameter is used to zero touch provision one or more device attributes of the IoT device. Systems and machine-readable media are also provided.
Determining formal models using weighting factors for computing elements in multi-domain environments
Techniques for deploying, monitoring, and modifying network topologies operating across multi-domain environments using formal models and weighting factors assigned to computing elements in the network topologies. The weighting factors restrict or allow the movement of various computing elements and/or element groupings to prevent undesirable disruptions or outages in the network topologies. Generally, the weighting factors may be determined based on an amount of disruption experienced in the network topologies if the corresponding computing element or grouping was migrated. As the amount of disruption caused by modifying a particular computing element increases, the weighting factor represents a greater measure of resistivity for migrating the computing element. In this way, topology deployment systems may allow, or disallow, the modification of particular computing elements based on weighting factors. Thus, the amount of disruption in the functioning of network topologies may be considered when optimizing the allocation of computing elements across multi-domain environments.
Management of a security system at a premises
A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.
Systems and methods for provisioning network devices
Network devices are securely provisioned through authenticated ZTP servers. In some approaches, a storage device local to the network device includes information for connecting with and authenticating a local or remote ZTP server. This information may include a root of trust to use when connecting with a designated ZTP server. The ZTP server may be identified using either a dynamic host configuration protocol (DHCP) server or a network address specified in the local memory storage. In an approach, the local memory storage is a removable USB flash memory device inserted into the network device when the device is booted up. In another approach, the ZTP authentication information is stored within memory integrated within the network device. Once a ZTP server is connected to the network device, a secure connection may be established such as a secure transport layer session (TLS) utilizing the root of trust.
Service action guidance engine (SAGE)
Novel tools and techniques are provided for implementing service diagnostics and provisioning via a service action guidance engine (“SAGE”). In various embodiments, SAGE may autonomously analyze data to identify any issues with provisioning one or more first services, among a plurality of services, to a first customer of a service provider. SAGE may autonomously identify one or more first automation actions from a plurality of automation actions to address at least one first issue identified based on the analysis, and may autonomously send one or more first instructions to one or more first automation bots, among a plurality of automation bots, to perform the identified one or more first automation actions. SAGE may also generate and present one or more guidance messages to call center users to guide interaction between customers and the call center users, based on analysis data associated with provisioning of services to the customers.
Processing unmodified configuration data with a network device application
A network device may receive a first configuration object associated with an application and may parse the first configuration object to identify first configuration data. The network device may calculate a first hash value based on the first configuration data and may generate a first operational object based on the first configuration data and the first hash value. The network device may receive a second configuration object associated with the application of the network device and may parse the second configuration object to identify second configuration data. The network device may calculate a second hash value based on the second configuration data and may determine whether the first hash value matches the second hash value. The network device may prevent, based on the first hash value matching the second hash value, generation of a second operational object based on the second configuration data and the second hash value.
SYSTEMS, METHODS AND APPARATUSES FOR AUTOMATING CONTEXT SPECIFIC NETWORK FUNCTION CONFIGURATION
Systems, methods, apparatuses, and computer program products for automating context-specific network function configuration are provided. One method may include receiving an objective model including rules defining key performance indicator (KPI) targets and relative prioritizations of the KPI targets for a communications system. The method may also include automatically determining, using the received objective model, a context model including at least a description of properties of one or more contexts, and generating or selecting at least one of function configuration parameter values (FCVs) or network configuration parameter values (NCPs) according to the context model.
CHANGE DEPLOYMENT SYSTEM
A framework referred to as COmposition fRamework for chaNge management (CORNET) may integrate re-usable abstraction, modular composition with plug-and-play capabilities, or automated translation of high-level change management intent into low-level implementations and mathematical models. CORNET may use real-world data collected from cellular networks (e.g., 4G or 5G) and virtualized services, such as virtual private networks (VPN) and software defined wide area networks (SDWAN) running in the cloud.