H04L47/746

Management of alternative resources

A journal service maintains a journal that holds a number of journal entries. Access to the journal entries is controlled by providing a lead resource with access to a named role associated with the journal. A pool of alternate resources containing potential replacements for the lead resource is maintained. A succession order may be established for the pool of alternate resources, and individual resources in the pool of alternate resources may be managed based at least in part on their position within the succession order. The succession order may be established using various criteria that are indicative of a likelihood that a particular alternate resource will be available if the lead resource fails, such as the presence of shared points of failure between the current lead resource and an alternate resource. The lead resource may be replaced with an alternate resource as a result of various impeachment events.

LOYALTY SWITCH

A loyalty switch for examining loyalty messages and routing the loyalty messages to one or more loyalty hosts and examining responses and routing the responses back to stores. Such a switch has configurable number of selector handlers pool, and the switch accepts a connection from stores and reads loyalty host information from master data to establish the connection with a loyalty host and to route messages. Each selector handler in the switch has multiple store objects that contain a routing map and connection information from companies' sites and the loyalty host.

PREDICTIVE ROUTING USING MACHINE LEARNING IN SD-WANs

In one embodiment, a supervisory service for a software-defined wide area network (SD-WAN) obtains telemetry data from one or more edge devices in the SD-WAN. The service trains, using the telemetry data as training data, a machine learning- based model to predict tunnel failures in the SD-WAN. The service receives feedback from the one or more edge devices regarding failure predictions made by the trained machine learning-based model. The service retrains the machine learning-based model, based on the received feedback.

Reducing traffic loss during link failure in an ethernet virtual private network multihoming topology

A first network device permits a bidirectional forwarding detection (BFD) session with a second network device. The first network device is a designated forwarder for a third network device, a first link is provided between the first network device and the third network device, the second network device is a backup designated forwarder for the third network device, a second link is provided between the second network device and the third network device. The first network device detects a link failure associated with the first link between the first network device and the third network device, and provides, via the BFD session, a BFD message to the second network device. The BFD message includes an indication of the link failure, and the BFD message is to cause the second network device to be a new designated forwarder for the third network device.

EMS handling of faults in virtual network function components
10764115 · 2020-09-01 · ·

An example operation may include a system, comprising one or more of receiving, at a VNFCI, a status failure notification message, retrieving one or more of: a peer VNFCI administration state, and the peer VNFCI operational state, requesting current issues reported on resources associated with the peer VNFCI from a VNFM when the peer VNFCI administration state is online, and the peer VNFCI is reachable, and the peer VNFCI operational state is not active, taking no action, at the VNFCI, when one or more of: the peer VNFCI administration state is not online, and the peer VNFCI is not reachable, and the peer VNFCI operational state is active, and sending a state change request with active state to the peer VNFCI when a response to the current issues reported on resources is received, and there are no critical issues at the VNFCI.

EMS resolution of split-brain virtual network function components
10764118 · 2020-09-01 · ·

An example operation may include a system, comprising one or more of receiving a virtual network function component instance (VNFCI) status notification resumption message with an active state when a peer VNFCI operational state is active, retrieving a timestamp of a VNFCI state change to an active state from an element VNFCI state database, retrieving a timestamp of a peer VNFCI state change to active from an element VNFCI state database, sending one or more of: a request to a virtual network function manager (VNFM) to determine if the VNFCI network is isolating while an operating state was active, and a request to the VNFM to determine if the peer VNFCI network is isolating while an operating state was active, sending a state change request with standby state to the peer VNFCI when the VNFCI is not network isolated and the peer VNFCI is network isolated, and a VNFM response is received regarding the VNFCI, a timeout response from the VNFM, and a VNFM response is received regarding the peer VNFCI, and sending a state change request with standby to the VNFCI with one or more of: the VNFCI network isolate and peer VNFCI is not network isolated, and the VNFCI is network isolated or the peer VNFCI is not network isolated, and the VNFCI is not network isolated and the peer VNFCI is network isolated and the VNFCI is in preferred standby.

Systems and methods for response calibration
10749775 · 2020-08-18 · ·

The disclosure provides methods, systems, and computer readable media for calibrating user responses to questions. The method may comprise presenting, with the aid of a computer system and an interactive display operatively coupled to the computer system, a query to a user. The query may relate to the user's dietary consumption, exercise, health condition or mental condition. The system may receive from the user a response to the query. The system may interpret a user's response to a query based on a set of reference information. The set of reference information may comprise a pictorial depiction of portion size of the dietary consumption, exertion level of the exercise, existing state of the health condition or existing state of the mental condition.

System and methods to signal auto facility bypass tunnel generation indication and backup reselection request for fast reroute capable downstream routers in MPLS

Systems and methods for auto creation of bypass tunnels in Fast Reroute (FRR) downstream routers include configuring one or more Label Switched Path (LSP) tunnels between an ingress Label Edge Router (LER) and an egress LER via one or more Label Switch Routers (LSRs); signaling at least one LSP tunnel of the one or more LSP tunnels with a Resource Reservation Protocol (RSVP) PATH message containing a FAST_REROUTE object with a first flag indicating Facility Backup protection is desired and a second flag indicating auto generation of an associated FB bypass tunnel; and configuring the associated FB bypass tunnel between a Point of Local Repair (PLR) and a Merge Point (MP) based on the first flag and the second flag. The systems and methods can further include bypass tunnel reselection requests to a bypass tunnel with better protection.

Loyalty switch

A loyalty switch for examining loyalty messages and routing the loyalty messages to one or more loyalty hosts and examining responses and routing the responses back to stores. Such a switch has configurable number of selector handlers pool, and the switch accepts a connection from stores and reads loyalty host information from master data to establish the connection with a loyalty host and to route messages. Each selector handler in the switch has multiple store objects that contain a routing map and connection information from companies' sites and the loyalty host.

AUTOMATICALLY MODIFYING CELL DEFINITION TABLES WITHIN NETWORKS
20200213918 · 2020-07-02 ·

Systems and methods are described herein for modifying cell definition tables with telecommunications networks. In response to a handover failure between cells of the network, the systems and methods determine changes have been made to a network, such as changes to various identification information for cells associated with a controlling (or serving) node of the network. For example, the systems and methods utilize ANR functions to detect the changes to the network.