Patent classifications
H04L67/1001
Using credentials stored in different directories to access a common endpoint
A global endpoint may be associated with an organization name and a plurality of directories located in different geographic regions. The global endpoint may be a computing system that hosts a page used by users to access an application or service. A user may be able to access the application or service using already existing credentials. For example, the user may access the application or service using credentials stored and maintained by an entity with which the user is affiliated. Users having credentials stored in different geographic regions may be able to access the application or service via the same global endpoint.
Using credentials stored in different directories to access a common endpoint
A global endpoint may be associated with an organization name and a plurality of directories located in different geographic regions. The global endpoint may be a computing system that hosts a page used by users to access an application or service. A user may be able to access the application or service using already existing credentials. For example, the user may access the application or service using credentials stored and maintained by an entity with which the user is affiliated. Users having credentials stored in different geographic regions may be able to access the application or service via the same global endpoint.
Unique ID generation for sensors
Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
Unique ID generation for sensors
Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
Optimizing device-to-device communication protocol selection in an edge computing environment
A method for optimizing device-to-device communication protocol selection in an edge computing environment is provided. The method includes: receiving a request for a service from a user device, wherein the computing system is one of plural edge computing devices in an edge computing environment; determining computational tasks performed in providing the service; selecting, using a machine learning model, a set of the edge computing devices to perform the computational tasks and communication protocols for the set of the edge computing devices to use while performing the computational tasks, wherein the machine learning model is configured to select the set of the edge computing devices and the communication protocols based on minimizing a time to perform the computational tasks; and sending instructions to perform the computational tasks, thereby causing the set of the edge computing devices to perform the service in response to the request from the user device.
Optimizing device-to-device communication protocol selection in an edge computing environment
A method for optimizing device-to-device communication protocol selection in an edge computing environment is provided. The method includes: receiving a request for a service from a user device, wherein the computing system is one of plural edge computing devices in an edge computing environment; determining computational tasks performed in providing the service; selecting, using a machine learning model, a set of the edge computing devices to perform the computational tasks and communication protocols for the set of the edge computing devices to use while performing the computational tasks, wherein the machine learning model is configured to select the set of the edge computing devices and the communication protocols based on minimizing a time to perform the computational tasks; and sending instructions to perform the computational tasks, thereby causing the set of the edge computing devices to perform the service in response to the request from the user device.
In-band management interface with user space datapath
A method of utilizing the same hardware network interface card (NIC) in a gateway of a datacenter to communicate datacenter tenant packet traffic and packet traffic for a set of applications that execute in the user space of the gateway and utilize a network stack in the kernel space of the gateway. The method sends and receives packets for the datacenter tenant packet traffic through a packet datapath in the user space. The method sends incoming packets from the NIC to the set of applications through the datapath in the user space, a user-kernel transport driver connecting the kernel network stack to the datapath in the user space, and the kernel network stack. The method receives outgoing packets at the NIC from the set of applications through the kernel network stack, the user-kernel transport driver, and the data path in the user space.
In-band management interface with user space datapath
A method of utilizing the same hardware network interface card (NIC) in a gateway of a datacenter to communicate datacenter tenant packet traffic and packet traffic for a set of applications that execute in the user space of the gateway and utilize a network stack in the kernel space of the gateway. The method sends and receives packets for the datacenter tenant packet traffic through a packet datapath in the user space. The method sends incoming packets from the NIC to the set of applications through the datapath in the user space, a user-kernel transport driver connecting the kernel network stack to the datapath in the user space, and the kernel network stack. The method receives outgoing packets at the NIC from the set of applications through the kernel network stack, the user-kernel transport driver, and the data path in the user space.
System, method, and computer program for determining a network situation in a communication network
A system, method, and computer program product are provided for a determining a network situation in a communication network. In use, at least one threshold value of at least one operational parameter of a communication network is obtained, the at least one operational parameter representing at least one operational status of at least one of a computational device or a communication device. Additionally, log data of the communication network is obtained, the log data containing at least one value of the at least one operational parameter reported by at least one network entity of the communication network. The at least one value of the at least one operational parameter of the log data is compared with a corresponding threshold value of the at least one threshold value to form a detection of a network situation. Further, the detection of the network situation is reported if the at least one value of the at least one operational parameter of the log data traverses the corresponding threshold value of the at least one threshold value.
Systems and methods for disaggregated software defined networking control
A software defined networking (SDN) controller for a communication network is provided. The SDN controller includes a northbound interface, a southbound interface, and a database as a service (DBaaS) layer. The northbound interface includes an application layer having one or more independent SDN applications. The southbound interface includes an adapter layer having one or more independent device adapters. The DBaaS layer includes a persistent DBaaS unit and a state DBaaS unit.