Patent classifications
H04L41/5051
Intent-based orchestration using network parsimony trees
Novel tools and techniques are provided for implementing intent-based orchestration using network parsimony trees. In various embodiments, in response to receiving a request for network services that comprises desired characteristics and performance parameters for the requested network services without information regarding specific hardware, hardware type, location, or network, a computing system might generate a request-based parsimony tree based on the desired characteristics and performance parameters. The computing system might access, from a datastore, a plurality of network-based parsimony trees that are each generated based on measured network metrics, might compare the request-based parsimony tree with each of one or more network-based parsimony trees to determine a fitness score for each network-based parsimony tree, and might identify a best-fit network-based parsimony tree based on the fitness scores. The computing system might identify and might allocate network resources based on the identified best-fit network-based parsimony tree, for providing the requested network services.
Network service activation system
Aspects of the present disclosure involve systems and methods for a service activation system in a telecommunications network that utilizes one or more generic container files for building the configuration file to instantiate the service on the network. A request for service from a network may be received from an order entry system that includes specific information about the requested service. A collection of generic configuration files may be selected based on the information included in the service order and arranged to build a configuration file to be executed on the network. The service activation system may also include a component or group of components to verify a received service order and alter the service order with default information or data where applicable. The configuration file may also be executed on the network through one or more drivers communicating with the affected devices to configure the one or more network devices.
NETWORK SLICE MANAGEMENT METHOD, TERMINAL, AND COMPUTER READABLE STORAGE MEDIUM
Disclosed are a network slice management method, a terminal device, and a non-transitory computer-readable storage medium. The network slice management method comprises: acquiring terminal operation information (S100); determining, according to the terminal operation information, a network slice to be released from network slices accessed by applications of the terminal (S200); and releasing the network slice to be released (S300).
COMMUNICATION METHOD, APPARATUS, AND SYSTEM
This application discloses a communication method, apparatus, and system. In this application, a first network element obtains first knowledge of a first intent, where the first knowledge of the first intent includes one or more chosen from the following: a first reliability of fulfilling a first intent target and first information. The first reliability indicates the reliability of fulfilling the first intent target, and the first information indicates the impact of a first intent operation on a second intent. The first network element selects a first operation based on the first knowledge of the first intent for executing the first intent. The first network element may select the first operation based on the reliability of fulfilling the first intent target and/or the first information, to improve accuracy of selection of the first operation.
DYNAMIC CLOUDLET FOG NODE DEPLOYMENT ARCHITECTURE
An architecture for providing an on-demand dynamic cloudlet instantiation by leveraging a grouping of software defined network devices and their respective associated analytics modules. A method can comprise receiving quality of service data representing a 5G small cell device of a group of 5G small cell devices; generating a policy rule representing a predictive policy to facilitate an instantiation of a dynamic on-demand cloudlet node into a fog of dynamic on-demand cloudlet node instantiations; and facilitating the instantiation of the dynamic on-demand cloudlet node into the fog, by a hybrid fiber coaxial device, based on the policy rule and an indication received from the hybrid fiber coaxial that a traffic surge in communications with the 5G small cell device has occurred.
DYNAMIC CLOUDLET FOG NODE DEPLOYMENT ARCHITECTURE
An architecture for providing an on-demand dynamic cloudlet instantiation by leveraging a grouping of software defined network devices and their respective associated analytics modules. A method can comprise receiving quality of service data representing a 5G small cell device of a group of 5G small cell devices; generating a policy rule representing a predictive policy to facilitate an instantiation of a dynamic on-demand cloudlet node into a fog of dynamic on-demand cloudlet node instantiations; and facilitating the instantiation of the dynamic on-demand cloudlet node into the fog, by a hybrid fiber coaxial device, based on the policy rule and an indication received from the hybrid fiber coaxial that a traffic surge in communications with the 5G small cell device has occurred.
MODEL-BASED SERVICE PLACEMENT
An example computing device is configured to receive an instance of a customer service model representative of a plurality of customer services. Each of the plurality of customer services associated with a corresponding at least one requirement and a corresponding at least one constraint. The computing device is configured to receive an instance of a resource model representative of a plurality of resources and map the instance of the customer service model and the instance of the resource model to an internal placement model. The computing device is configured to allocate the plurality of resources to the plurality of customer services such that the at least one requirement and the at least one constraint for each of the plurality of customer services are satisfied and inverse map data indicating how the plurality of resources are allocated to a format consumable by the customer device and output the inverse mapped data.
COMBINING NETWORKING TECHNOLOGIES TO OPTIMIZE WIDE AREA NETWORK TRAFFIC
Techniques for using application network requirements and/or telemetry information from a first networking technology to enhance operation of a second networking technology and optimize wide area network traffic are described herein. The techniques may include establishing a communication network for use by applications of a scalable application service platform, the communication network including a first networking technology and a second networking technology. In this way, a request to establish a connection for use by an application may be received by the first networking technology. The request may include an indication of a threshold service level of the connection. In response to the request, the first networking technology may determine whether the second networking technology is capable of hosting the connection. If the second networking technology is capable of hosting the connection, the connection may be established such that application traffic is sent or received using the second networking technology.
TENANT FAIRNESS IN A MULTI-TENANT ENVIRONMENT
A method for allocating resources of a virtual controller is disclosed. The method comprises: allocating resources of a virtual controller to a first tenant, wherein the first tenant is allocated a first tenant quantity of guaranteed resources of the virtual controller and a second tenant is allocated a second tenant quantity of guaranteed resources of the virtual controller; determining that resources requested by the first tenant are greater than the first tenant quantity of guaranteed resources; determining that the virtual controller has unutilized resources sufficient to at least partially provide additional resources beyond the first tenant quantity of guaranteed resources to the first tenant; and temporarily provisioning the additional resources to the first tenant, wherein the additional resources are greater than the first tenant quantity of guaranteed resources.
Network capability exposure method and device thereof
Disclosed is a network capability exposure method, which includes receiving a service request sent by a third-party device; determining a type of a network capability required according to the service request; determining a computing task matching the type of the network capability required; determining computing resources exposed by at least one physical device; obtaining a computing resource exposure result based on the computing task and the computing resources exposed by the at least one physical device; acquiring a network capability corresponding to the type of the network capability and the computing resource exposure result; and providing the network capability to the third-party device. Further, a network capability exposure device, a network capability exposure system and a non-transitory computer-readable storage medium are also disclosed.