H04L41/0816

MIGRATION OF VNFS TO VIMS
20230008683 · 2023-01-12 ·

Mechanisms for migration in a communication network of VNFs to VIMs. A method is performed by a migration controller. The method includes obtaining information of network complexity per VNF, information of VM usage per VNF, and information of processing capacity of compute nodes per VIM. The method further includes determining a mapping between the VNFs and the VIMs. The mapping defines at which of the VIMs each of the VNFs is instantiable. The method further includes ordering the VNFs in a list by matching the information of network complexity per VNF and the information of VM usage per VNF to the information of processing capacity of compute nodes per VIM and taking into account the mapping between the VNFs and the VIMs. The method further includes initiating migration of the VNFs to the VIMs in the order defined by the list.

MIGRATION OF VNFS TO VIMS
20230008683 · 2023-01-12 ·

Mechanisms for migration in a communication network of VNFs to VIMs. A method is performed by a migration controller. The method includes obtaining information of network complexity per VNF, information of VM usage per VNF, and information of processing capacity of compute nodes per VIM. The method further includes determining a mapping between the VNFs and the VIMs. The mapping defines at which of the VIMs each of the VNFs is instantiable. The method further includes ordering the VNFs in a list by matching the information of network complexity per VNF and the information of VM usage per VNF to the information of processing capacity of compute nodes per VIM and taking into account the mapping between the VNFs and the VIMs. The method further includes initiating migration of the VNFs to the VIMs in the order defined by the list.

MANAGING NETWORK LATENCY USING BUFFER FILL CONTROL
20230012394 · 2023-01-12 · ·

A method of managing a fill state of a buffer in an external device includes monitoring the latency of a network connection to an external device having a network buffer via a managing device. A state of fill of the network buffer is determined based on at least the monitored latency of the network connection, and the effective network speed is estimated based on the state of fill of the network buffer. One or more network traffic scheduling parameters are adjusted in response to the estimated effective network speed, such as a maximum currently usable network speed that is lower than a maximum possible speed of the network. The maximum currently usable network speed of the network connection is periodically increased if the monitored latency is in a normal state and the maximum currently usable network speed is lower than the maximum possible speed of the network.

Automatic derivation of repository access data based on symbolic configuration
11552847 · 2023-01-10 · ·

In an embodiment, a data processing method comprises detecting an approval of a change to an electronic configuration document that symbolically identifies one or more configurations of users, groups, and/or permissions relating to access to computer program artifacts that are stored in a first repository of a geographically distributed, replicated artifact repository system; the artifact repository system comprising one or more second repositories that are geographically remote with respect to the first repository and which replicate the first repository; in response to the detecting: obtaining the electronic configuration document and deriving, based on the electronic configuration document, a plurality of regional repository settings values for users, groups, and/or permissions relating to access to the computer program artifacts and for the one or more second repositories; transmitting the one or more settings values to the one or more second repositories and causing injection of the one or more settings values into one or more repository configuration settings of the second repositories.

Automatic derivation of repository access data based on symbolic configuration
11552847 · 2023-01-10 · ·

In an embodiment, a data processing method comprises detecting an approval of a change to an electronic configuration document that symbolically identifies one or more configurations of users, groups, and/or permissions relating to access to computer program artifacts that are stored in a first repository of a geographically distributed, replicated artifact repository system; the artifact repository system comprising one or more second repositories that are geographically remote with respect to the first repository and which replicate the first repository; in response to the detecting: obtaining the electronic configuration document and deriving, based on the electronic configuration document, a plurality of regional repository settings values for users, groups, and/or permissions relating to access to the computer program artifacts and for the one or more second repositories; transmitting the one or more settings values to the one or more second repositories and causing injection of the one or more settings values into one or more repository configuration settings of the second repositories.

Automated incident triage and diagnosis

Techniques for automated incident triage and diagnosis are described. A method of automated incident triage and diagnosis may include receiving incident data associated with an incident, identifying one or more mitigation actions to resolve the incident using at least one machine learning model based at least on the incident data, and automatically executing the one or more mitigation actions to mitigate the incident.

Automated incident triage and diagnosis

Techniques for automated incident triage and diagnosis are described. A method of automated incident triage and diagnosis may include receiving incident data associated with an incident, identifying one or more mitigation actions to resolve the incident using at least one machine learning model based at least on the incident data, and automatically executing the one or more mitigation actions to mitigate the incident.

Data latency evaluation

The described technology is generally directed towards methods for data latency evaluation. The techniques disclosed herein can provide useful information about when a data consumer can expect to receive data. Methods can create and compare data latency cumulative probability distributions comprising probabilities associated with different latency values, at various different levels of completeness.

Data latency evaluation

The described technology is generally directed towards methods for data latency evaluation. The techniques disclosed herein can provide useful information about when a data consumer can expect to receive data. Methods can create and compare data latency cumulative probability distributions comprising probabilities associated with different latency values, at various different levels of completeness.

METHODS AND SYSTEMS FOR MANAGING INTERCONNECTION OF VIRTUAL NETWORK FUNCTIONS

A method and apparatus is disclosed herein for use of a connectivity manager and a network infrastructure including the same. In one embodiment, the network infrastructure comprises one or more physical devices communicably coupled into a physical network infrastructure or via the overlay provided by the physical servers; and a virtual network domain containing a virtual network infrastructure executing on the physical network infrastructure. In one embodiment, the virtual network domain comprises one or more virtual network functions connected together through one or more links and executing on the one or more physical devices, and one or more interfaces coupled to one or more network functions via one or more links to communicate data between the virtual network domain and at least one of the one or more physical devices of the physical network infrastructure while the virtual network domain is isolated from other virtual infrastructures executing on the physical network infrastructure.