H04L41/5048

Communication system, provider node, communication node, and method for providing a virtual network function to a customer node

The disclosure is directed to providing virtual network functions to a customer node by a communication system with a provider node in an automatic, traceable, and auditable way. The provider node includes a retrieving module, a validation module, and a deployment module. The retrieving module is configured to retrieve a notification signal, wherein the notification signal is indicative of a selected one of a plurality of virtual network functions and the customer node. The validation module is configured to establish service level agreement data and to validate the agreement service level data, based on the notification signal. The deployment module is configured to selectively transmit a deployment signal to a communication node depending on the validation of the service level agreement data for providing the selected virtual network function to the customer node.

METHOD FOR SERVICE STATUS ANALYSIS, SERVER, AND STORAGE MEDIUM
20230010057 · 2023-01-12 ·

Provided are a method for service status analysis, a server, and a storage medium. The method includes: for each vertex of multiple vertices in a graph database: reading out attribute data of the vertex, where the graph database is generated in advance according to a service description table, the vertex represents a service, and the attribute data of the vertex includes at least one service attribute of the service represented by the vertex; and according to the attribute data of the vertex and attribute data of each of multiple related vertices, determining a service status level of the service represented by the vertex, where each of the multiple related vertices has a propagation relationship with the vertex; and according to the service status level of each of the services represented by the vertices, analyzing a service propagation network.

Customized cloud service
11700188 · 2023-07-11 · ·

Some examples described herein relate to providing a customized cloud service. In an example, Key Service Indicators (KSI) may be received for a cloud service. The Key Service Indicators may be associated with a cloud service template for providing the cloud service. The resources required for providing the cloud service may be identified based on the Key Service Indicators.

Techniques for preventing concurrent execution of declarative infrastructure provisioners

Techniques for preventing concurrent execution of an infrastructure orchestration service are described. Worker nodes can receive instructions, or tasks, for deploying infrastructure resources and can provide heartbeat notifications to scheduler nodes, also considered a lease. A signing proxy can track the heartbeat notifications sent from the worker nodes to the scheduler node. The signing proxy can receive requests corresponding to a performance of the tasks assigned to the worker nodes. The signing proxy can determine whether the lease between each worker node and the scheduler is valid. If the lease is valid, the signing proxy may make a call to services on behalf of the worker node, and if the lease is not valid, the signing proxy may not make a call to services on behalf of the worker node. Instead, the signing proxy may cut off all outgoing network traffic, blocking access of the worker node to services.

Quality of service manager for network slices of a network

A device determines, from a network slice template associated with a network slice, a quality of service (QoS) profile for the network slice that includes performance metrics for corresponding QoS parameters associated with providing a service. The device monitors performance of the network slice in association with the QoS profile, and determines, based on the performance, that a performance indicator for a QoS parameter of the network slice is outside a threshold range of a performance metric. The device determines, based on the performance information and the QoS profile, a slice modification to the network slice template for the network slice, where the slice modification is configured to cause the performance indicator to be within the threshold range of the performance metric. The device causes a network slice orchestrator to update an instantiation of the network slice according to the slice modification and the network slice template.

Application integration mapping management based upon configurable confidence level threshold

Techniques are described with regard to application integration management. An associated computer-implemented method includes receiving from at least one user a request to map a plurality of data fields associated with a workflow during an application integration session and automatically mapping all data fields among the plurality of data fields for which a mapping confidence value is greater than or equal to a confidence level threshold set at a default value. The method further includes receiving mapping evaluations from each of the at least one user for each automatic data field mapping based upon the confidence level threshold set at the default value, processing at least one confidence level threshold adjustment input selection from one or more of the at least one user, and deriving at least one candidate default confidence level threshold value based upon the at least one confidence level threshold adjustment input selection.

REMEDIATING DRIFT IN THE CLOUD
20230004431 · 2023-01-05 ·

Techniques for remediating drift in real cloud infrastructure from desired cloud infrastructure. In one technique, a configuration graph is generated based on first infrastructure configuration code. A deployed state of a cloud infrastructure is generated based on a data schema and a current state of the cloud infrastructure. Resources indicated in the deployed state are matched to nodes in the configuration graph. Based on differences between the resources and the nodes, the configuration graph is updated to generate an updated configuration graph. Based on the updated configuration graph, second infrastructure configuration code is generated that is different than the first infrastructure configuration code.

MAPPING AND STITCHING NETWORK SLICES ACROSS VARIOUS DOMAINS BASED ON A BORDER GATEWAY PROTOCOL ATTRIBUTE

The present technology is directed to generating a common Border Gateway Protocol (BGP) attribute, for example, BGP-Slice Identifier (ID) for a specific network slice and stitching the network slice across one or more domains to realize end-to-end slicing. The present technology can generate BGP ID for a specific network slice spanning a plurality of domains and map domain-specific attributes associated with sub-slices of the specific network slice in different domains of the plurality of domains to the BGP ID. The present technology can further facilitate distribution of the mapping of the domain-specific attributes to the BGP ID across the plurality of domains for stitching the sub-slices together from the domain-specific attributes based on the BGP ID to stitch the specific network slice across the plurality of domains. Furthermore, the present technology can identify a configuration error in the mapping of the domain-specific attributes and the BGP ID and transmit a feedback informing the existence of the error for performing remedial measures.

User-defined virtual regions in a cloud provider network

Techniques are described for enabling users of a cloud provider network to define and use custom “virtual regions” comprised of selected sets of cloud provider network infrastructure locations. A cloud provider network enables users to obtain information about available infrastructure locations and to identify locations that satisfy a set of performance characteristics and other parameters. Once a set of desirable infrastructure locations have been identified, users can request the creation of a virtual region to be associated with their user account, where the request specifies a set of infrastructure locations to comprise the virtual region. Once a virtual region is created, users can cause computing resources to be launched into or otherwise associated with the virtual region in a manner similar to the use of existing regions and availability zones.

GENERATING AND UTILIZING PROVISIONING TEMPLATES TO PROVISION VOICE, VIDEO, AND DATA COMMUNICATION SERVICES

The technologies described herein are generally directed to provisioning services from a network. For example, a method described herein can include facilitating receiving a provisioning request for a network provisioning task. Further, the method can include, based on the network provisioning task, selecting a logical provisioning template to facilitate a performance of the network provisioning task. Further, based on the logical provisioning template, the method can include identifying a programming object comprising logical commands for the performance of the network provisioning task. The method can include, executing the logical commands of the programming object to control service implementation equipment to perform the network provisioning task.