H04L47/808

Active subscriber count based charging and policy control

A method by a count database node monitors content of subscriber accounts processed by an online charging system in a communication network for user equipment nodes. The method includes receiving by the count database node a plurality of data records. Each data record contains a subscriber identifier and an attribute to be provisioned for the subscriber. For each of the data records, the data record is sorted for storage in database structures maintained by the count database node based on the attribute of the data record. The method further includes determining a count value based on a number of the data records stored in the database structures maintained by the count database node containing an attribute defined by a query received by the count database node, and providing the count value from the count database node to another node.

METHODS AND APPARATUS FOR ROUTINE BASED FOG NETWORKING
20210274581 · 2021-09-02 ·

Methods and apparatus for organizing a distributed network based on routine usage data. In one exemplary embodiment, devices analyze routine usage data via e.g., machine learning and/or other heuristics to determine a set of routine rules and/or routine trigger conditions. Multiple devices may be assigned routine rules and/or routine trigger conditions that establish a fog network. Various described embodiments may incorporate time-shifted control plane operation and/or ledger-based control plane operation; these variants do not require central network management. Other optimizations may include dynamic selection of network topologies and/or routing technologies.

Systems and methods for providing self-referencing utilization calculation and dynamic resource allocation based thereon for digital transmissions

Systems and methods for self-referencing utilization calculation and dynamic resource allocation for digital transmissions are provided. Systems may include a target resource module configured to derive and store a target resource allocation for each sender from a plurality of senders. Systems may include a cost-calculation engine configured to generate a resource cost estimate for a transmission based on metadata associated with the transmission, and embed the resource cost estimate in the metadata. Systems may also include a resource allocation module configured to allocate digital resources for the transmission based on the metadata. Allocating digital resources for the transmission may reserve the digital resources for the transmission and prevent overloading of the digital resources.

PROVIDING CUSTOMIZED INTEGRATION FLOW TEMPLATES

A method and system are provided for customizing integration flow templates. The method can include can include monitoring user interaction with a plurality of systems external to an integration system to read data changes at the external systems and identifying at least one event pair, wherein each event pair is between two external systems having a same data change event in the two external systems. The identified event pairs are filtered for inclusion in an events chain and the external systems of the filtered event pairs are ordered in the events chain based on timestamps of the data change events. The method outputs integration flow templates based on the ordered external systems of the event pairs that define a flow trigger and at least one flow node.

Over The Top Access Framework and Distributed NFVI Architecture
20210266234 · 2021-08-26 ·

Novel tools and techniques for an OTT access framework and distributed NFVI architecture are provided. A system includes a first user device associated with a first customer, a distribution point unit, a layer 3 switch defining a network edge, a captive portal host located at a central office, a network enhanced gateway located in the central office, the network enhanced gateway coupled to the layer 3 switch, and the captive portal host. The network enhanced gateway is configured to determine, via the captive portal host, one or more services to be provided to the user device, wherein the one or more services includes internet service at a contracted speed, authenticate, via an authentication, authorization, and accounting service, the user device, and establish, via a policy manager, quality of service for ingress traffic to the user device at the distribution point unit according to the contracted service speed.

SYSTEM AND METHOD FOR DYNAMIC BANDWIDTH ASSIGNMENT (DBA) VIRTUALIZATION IN A MULTI-TENANT PASSIVE OPTICAL NETWORK

The invention provides a method and system for Dynamic Bandwidth Assignment (DBA) Virtualization in a Passive Optical Network, comprising an Optical Line Termination (OLT) point and a plurality of Optical Network Units (ONU) and a plurality of Virtual Network Units (VNO), wherein each VNO is configured with a virtual Dynamic Bandwidth Assignment module to schedule a bandwidth assignment independently of the other VNOs and using a merging engine to implement a detailed bandwidth scheduling allocation over the Passive Optical Network.

TECHNOLOGIES FOR CONTEXT-AWARE DYNAMIC BANDWIDTH ALLOCATION

Technologies for context-aware dynamic bandwidth allocation include a network compute device configured to collect context inputs from a plurality of compute devices communicatively coupled to the network compute device. The network compute device is further configured to identify a context of each compute device based on the collected context inputs and determine a bandwidth priority for each compute device based on the identified context. Additionally, the network compute device is configure to determine an amount of bandwidth from a total available bandwidth to allocate to the compute device based on the determined bandwidth priority and update a moderated bandwidth allocation policy to reflect the determined amount of bandwidth allocated to the compute device. Other embodiments are described herein.

SERVICE TRAFFIC DISTRIBUTION BASED ON TIME WINDOW
20210119927 · 2021-04-22 ·

A service traffic distribution method based on a time window is provided. The method includes: generating a time window based on a reference rule; determining, according to an operation behavior performed by a user on a client in the generated time window, service traffic to be distributed; and distributing the determined service traffic.

SUPPORTING NEAR REAL TIME SERVICE LEVEL AGREEMENTS
20210144072 · 2021-05-13 ·

A controller device manages a plurality of network devices. The controller device includes one or more processing units implemented in circuitry and configured to determine that one or more stateful intents used to manage the plurality of network devices and represented by a graph model are degraded due to assigned resources for the stateful intents having become degraded; in response to determining that the one or more stateful intents are degraded, determine resources for the stateful intents, the resources corresponding to vertices of the graph model; provision the stateful intents using the determined resources; determine whether the provisioning of the stateful intents was successful; compile at least one of the stateful intents that was successful into low-level configuration data for at least one network device of the plurality of network devices; and configure the at least one network device using the low-level configuration data.

Rate limiter

Systems and methods of rate limiting are disclosed herein. In some example embodiments, a rate limiter service receives a request from an online application to access an online resource, and the rate limiter service transmits an indication of the request to a back end system, and an enforcement decision corresponding to the online resource is received from the back end system, with the enforcement decision comprising an instruction to either permit or deny access to the online resource, and the receiving of the enforcement decision from the back end system being performed asynchronously with the receiving of the request and the transmitting of the indication. In some example embodiments, the enforcement decision received from the back end system is stored, the stored enforcement decision is accessed in response to the receiving of the request, and the request is responded to using the accessed enforcement decision.