H04L41/0886

Lifecycle management of VNFC software modules

An example operation may include a method comprising one or more of receiving a VNFC module LCM request where the LCM request specifies a VNFC instance (VNFCI), a target VNFC module, and an LCM operation to be performed, comprising retrieving a VNFCI data entry, determining a target OS installation of the VNFCI, establishing a secure connection to a target OS on a VNFCI hosting VM/container, determining a default command for the LCM operation, adapting the default command to the target OS, executing the adapted command, normalizing a response code, and sending a response to the VNFC module LCM request.

System and method for agentless infrastructure agnostic application drift detection and management

A system and a method for monitoring and detecting drifts and configuration changes in an infrastructure that facilitates the availability of software applications to a large organization are provided. The method includes: obtaining metric information that indicates values of various parameters that relate to the infrastructure; comparing the obtained metric information with expected values thereof; determining whether a drift has occurred based on a result of the comparison; and providing a notification of a detected drift. When a drift is detected, a potential remedy may be diagnosed and automatically applied.

Architecture features for a media-centric firewall

The embodiments herein describe a firewall for a media production system to provide flexible security between an on-premises production environment and remote media production applications and devices (e.g., cloud-based virtual production environments). As new media devices and applications (referred to generally as media nodes) are added at remote locations, the firewall is updated to permit the media nodes to communicate with the on-premises production environment. The embodiments herein described an automatic (e.g., software driven) process where a network orchestrator can detect a change in the media nodes and update the rule set in the firewall accordingly.

Filtering strategies for subgraph matching on noisy multiplex networks
11695788 · 2023-07-04 · ·

Described is a system for detecting adversarial activities based on detection of activity patterns in a multiplex network. The system detects one or more subnetworks that are matches to a template network of template nodes. The subnetworks are detected by filtering multiplex network nodes according to a filtering criteria that utilizes monotone function properties in the multiplex network. Nodes that do not meet the filtering criteria are eliminated, resulting in a list of candidate nodes in the multiplex network. The one or more subnetworks are formed from the list of candidate nodes. An activity pattern corresponding to a pattern of adversarial activity is identified in the one or more subnetworks. Based on the identified activity pattern, an alert of adversarial activity is generated and transmitted.

FLOW-SPECIFIC NETWORK SLICING

The present disclosure is generally related to edge computing technologies (ECTs), communications networking, network slicing, and in particular, to techniques and technologies for providing flow-specific network slices. In particular, the present disclosure describes mechanisms that expand existing end-to-end architectures in order to include quality of service and monitoring mechanisms that connect network slicing technologies with infrastructure and/or network data center quality of service provider domains. The described mechanisms provide data center bridging to enable network, edge computing, and cloud computing domains.

Network management system and method for access network

A premises networking device includes hardware components including speakers, microphone, infrared sensor, spectrum analyzer and wireless interfaces. A touch screen display presents a user interface that provides information about network conditions and configuration settings and a menu for setting and changing configuration settings. Different versions of the user interface are displayed based on whether a user is in proximity to the device. The user interface includes shapes representing user devices, the visual characteristics of which change based on the current network conditions. A health score, which is an evaluation of network performance based on measurements of aspects of the conditions of the network, is displayed in real time. A network management system includes a network management platform for storing network conditions and configuration information and pushing the information to premises networking devices. An application programming interface allows third-party applications to send instructions to and access data from various system processes.

Access point registration in a network
11546207 · 2023-01-03 · ·

Implementations generally relate methods, systems, and computer readable media for providing automatic access point registration. In some implementations, a method includes receiving an indication of automatic device on-boarding activation. The method further includes receiving a selection of one or includes identification more reference devices. The method further includes determining one or more detectable devices of the one or more candidate devices to be onboarded that are detectable by at least one of the one or more reference devices. The method further includes obtaining one or more automatic configuration parameters from one or more of the reference devices. The method further includes configuring one or more of the detectable devices to be onboarded with the one or more automatic configuration parameters.

Method and apparatus for autonomous firewall rule management
11546301 · 2023-01-03 · ·

In accordance with an embodiment, described herein is a system and method for autonomous firewall rule management, for use with cloud computing environments or other types of network environments. A firewall rule management automation framework provides rule management for firewalls deployed across availability domains. The system is adapted to automatically determine firewalls that can receive network traffic from a given source subnet or destination subnet; configure the firewalls with required firewall rules; monitor the firewall rules through collection of metrics snapshots and rule hit counts; and purge underused or potentially obsolete firewall rules, for example those having zero hits over a particular period of time or number of snapshots. The system provide generic support for different types of firewall devices, and autonomous management of firewall rules within large heterogeneous computer networks that may include several types of firewalls.

NETWORK CONFIGURATION TERMINAL, NETWORK CONFIGURATION METHOD FOR HOME APPLIANCE, AND COMPUTER-READABLE STORAGE MEDIUM
20220417052 · 2022-12-29 ·

Disclosed is a network configuration method for a home appliance, which is applied in a network configuration terminal. The network configuration method for the home appliance includes: sending, by the network configuration terminal, a generation instruction of generating an initial code to a target home appliance; and acquiring, based on the generation instruction, the initial code generated by the target home appliance, for a control terminal to communicate with a WIFI module of the target home appliance based on the initial code. A network configuration terminal and a computer-readable storage medium are also disclosed.

METHOD FOR IDENTIFYING NETWORK DEVICES IN COMPUTER NETWORK AND AN APPARATUS CONFIGURED TO IDENTIFY NETWORK DEVICES IN COMPUTER NETWORK
20220417099 · 2022-12-29 ·

A method for identifying devices in a computer network includes collecting data points including device related parameters/information from a device accessing network resources, determining a string distance between the set of collected data points with the data sets collected from previously known network devices and selecting the smallest string distance value and/or highest similarity score. If the determined string distance to the data set of the closest device exceeds a threshold value, the device accessing the network resources is new and its entry can be created. If the determined string distance is under a predetermined threshold value, it is determined that the device accessing the network resources is the device having the closest string distance value to the collected set of data points, and the values in a database and/or the network element of the previously known device can be updated based on the collected set of data points.