H04L41/0886

Internet of things device hierarchies

In embodiments, Internet of Things (IoT) devices may be organized according to an IoT device hierarchy, which may include parent and/or child associations between resources associated with IoT devices and/or with groupings of IoT devices. IoT devices wishing to support an IoT device hierarchy may utilize an extended IoT device resource model which provides for IoT device hierarchy information and interfaces to be provided by supporting IoT devices. A supporting resource may have one or more parent properties and/or child properties which may identify, respectively, parent or child resources which are associated with the resource. In various embodiments, these parent properties and/or child properties may include uniform resource identifiers (URI). A supporting resource may also identify an interface type for a hierarchical access interface, through which one or more descendant resources may be accessed through a single command. Other embodiments may be descried and/or claimed.

Configuring system resources for different reference architectures

A specification of an intent that identifies a desired service and a reference architecture is received. The desired service is rendered to provide instructions for dispatch to a plurality of devices having roles. Rendering the desired service includes invoking a service rendering program function based on the reference architecture and a role of a specific device. A new reference architecture may be implemented by specifying a new service rendering program function for the new reference architecture.

Creating a highly-available private cloud gateway based on a two-node hyperconverged infrastructure cluster with a self-hosted hypervisor management system

Embodiments described herein are generally directed to a creation of an HA private cloud gateway based on a two-node HCI cluster with a self-hosted HMS. According to an example, a request to register a private cloud to be supported by on-premises infrastructure is received by a SaaS portal, which causes a base station to discover servers within the on-premises infrastructure. The base station is then instructed to prepare a server as a deployment node for use in connection with creation of a cluster of two HCI nodes of the servers to represent the HA private cloud gateway, including installing a seed HMS on the deployment node. The base station is further instructed to cause the seed HMS to create the cluster, install a self-hosted HMS within the cluster to manage the cluster, register the cluster to the self-hosted HMS, and finally delete the seed HMS from the deployment node.

System and Method of Data Communication

Particular embodiments may detect, by a core network, a change in network traffic types from a first network traffic type to a second network traffic type. The core network includes one or more network functionality components. Each of the one or more network functionality components is decomposed into multiple service types. The core network may determine several service instances for deployment in response to the change in the network traffic types. Each of the service instances may belong to one of the multiple decomposed service types. The core network may deploy several service instances to one or more server machines of the core network according to a decomposed service type of a respective service instance.

MIGRATING NETWORKING CONFIGURATIONS
20230198843 · 2023-06-22 ·

A method includes generating a container networking configuration in view of the network information associated with the virtual machine, the container networking configuration to provide network access to processes of a virtual machine migrated to a container, wherein the container comprises an isolated execution environment managed by a container orchestration system, and wherein the container networking configuration defines networking rules between containers and processes within the container orchestration system. The method further includes updating the container networking configuration in view of the updated network information after migration of the virtual machine to the container to maintain network access to the virtual machine through the container as the virtual machine continues to execute within the container.

System and method for customized port configuration

The disclosed system may include (1) a modular port concentrator that connects as a modular line card within a router to forward network packets, (2) a profile module, stored in memory, that stores an allowed port configuration profile that defines supported port configurations for the modular port concentrator, (3) a configuration module, stored in memory, that receives an attempted port configuration for the modular line card, (4) an enforcement module, stored in memory, that enforces the allowed port configuration profile by taking remedial action in response to determining that the allowed port configuration profile does not allow the attempted port configuration, and (5) at least one physical processor configured to execute the modular port concentrator, the profile module, the configuration module, and the enforcement module. Various other systems and methods are also disclosed.

System and method for automatic wireless network authentication
11683307 · 2023-06-20 · ·

A system and method are described for connecting an IoT device to a wireless router and/or access point. For example, one embodiment of a system comprises: an Internet of things (IoT) hub to collect network credentials required to connect with a wireless access point or router; the IoT hub to securely store the network credentials in a local or remote credentials database along with identification data identifying a user account and/or the wireless access point or router; a new IoT device to establish a connection with the IoT hub, another IoT device, and/or a user data processing device; the new IoT device to transmit a request for network credentials to establish a connection with the wireless access point or router; the IoT hub, IoT device and/or user data processing device to provide connectivity to the credentials database on behalf of the new IoT device, to receive the network credentials from the credentials database and to provide the network credentials to the new IoT device; and the new IoT device to automatically use the network credentials to establish a connection with the wireless access point or router.

Automatic network assembly

Some examples provide a method for automatic network assembly. The following instructions may be used to implement automatic network assembly in a modular infrastructure. Instructions to automatically connect a management port to a management network. Instructions to automatically connect link ports to form a scalable ring. Instructions to automatically connect each modular infrastructure management device to a bay management network port.

Building management system with space and place utilization

A system that serves a space includes one or more data sources that provide utilization data describing an actual utilization of the space and circuitry configured to calculate a utilization attribute of the space based on the utilization data and retrieve, from a space profile for the space, a utilization target corresponding to the utilization attribute. The space profile is selected from a plurality of selectable space profiles defining a plurality of target utilizations. The circuitry is also configured to generate a normalized utilization metric for the space by normalizing the utilization attribute relative to the utilization target and generate a recommendation for the space based on the normalized utilization metric.

System and method of coupling a home area network with the cloud creating a highly secure and scalable private topology

A device, system, and method, according to various embodiments, can include, for example, a hybrid cloud network, one or more personal cloud virtual LANs, and a home area network. The hybrid cloud network can be configured to provide public access and private access. The one or more personal cloud virtual LANs are provided at an overlapping segment of the hybrid cloud network to provide privacy within the hybrid cloud network. The home area network can include a single purpose computer configured as a gateway for the hybrid cloud network and configured to establish a site-to-site secure connection with the one or more personal cloud virtual LANs.