H04L41/0816

Network scale emulator

Systems, methods, and computer-readable media for scaling a source network. A system may be configured to receive a network configuration for a source network, wherein the source network comprising a plurality of nodes, receive and a scale target for a scaled network, and identify, based on the scale target, one or more selected nodes in the plurality of nodes in the source network for implementing in the scaled network. The system may further be configured to reconfigure data plane parameters and control plane parameters for each node in the one or more selected nodes.

Security mechanisms for data plane extensions of provider network services
11569997 · 2023-01-31 · ·

A connectivity enablement device includes one or more processors, one or more memories and a hardware input port. The memories store program instructions that when executed examine a token obtained from a token transfer device inserted into the port, and cause one or more messages to be transmitted to a virtualized computing service. The messages indicate (a) the connectivity enablement device, (b) the token transfer device, (c) the token's source and (d) a server. An indication that the server has been configured within an isolated virtual network is obtained at the connectivity enablement device.

WIRELESS DEVICE, NETWORK NODE, AND METHODS PERFORMED THEREBY FOR HANDLING CONFIGURATION OF THE WIRELESS DEVICE

A method performed by a wireless device (130) for handling configuration of the wireless device (130). The wireless device (130) operates in a communications network (10). The wireless device (130) sends (203) an indication to a network node (110) operating in the communications network (10). The indication comprises a configuration object in Constrained Application Protocol (CoAP). The configuration object comprises one or more configuration parameters of the wireless device (130) in the communications network (10). The wireless device (130) then receives (204) another indication from the network node (110). The another indication comprises a first instruction to configure the wireless device (130) to use at least one changed configuration parameter of the one or more configuration parameters. The at least one changed configuration parameter id adapted to one or more policies of the communications network (10) for the wireless device (130).

WIRELESS DEVICE, NETWORK NODE, AND METHODS PERFORMED THEREBY FOR HANDLING CONFIGURATION OF THE WIRELESS DEVICE

A method performed by a wireless device (130) for handling configuration of the wireless device (130). The wireless device (130) operates in a communications network (10). The wireless device (130) sends (203) an indication to a network node (110) operating in the communications network (10). The indication comprises a configuration object in Constrained Application Protocol (CoAP). The configuration object comprises one or more configuration parameters of the wireless device (130) in the communications network (10). The wireless device (130) then receives (204) another indication from the network node (110). The another indication comprises a first instruction to configure the wireless device (130) to use at least one changed configuration parameter of the one or more configuration parameters. The at least one changed configuration parameter id adapted to one or more policies of the communications network (10) for the wireless device (130).

DOCUMENT DRIVEN NETWORK CONFIGURATION UPDATER

Systems and methods are disclosed for updating network configuration documentation. In an example, a user can upload network configuration documentation with updates to a network to a server. The server can create an update topology corresponding to the documentation by identifying symbols that represent network components. The server can identify changes by comparing the update topology to a configuration data of an existing network. For example, the address of a gateway or the connections to the gateway can change. The server can cause the changes to be presented to a user, such as by highlighting the changes in a diagram. The user can confirm the changes, such as with a conversational workflow, and the server can save the changes to a database. The system can also send commands to the applicable network components to effectuate the confirmed changes.

DOCUMENT DRIVEN NETWORK CONFIGURATION UPDATER

Systems and methods are disclosed for updating network configuration documentation. In an example, a user can upload network configuration documentation with updates to a network to a server. The server can create an update topology corresponding to the documentation by identifying symbols that represent network components. The server can identify changes by comparing the update topology to a configuration data of an existing network. For example, the address of a gateway or the connections to the gateway can change. The server can cause the changes to be presented to a user, such as by highlighting the changes in a diagram. The user can confirm the changes, such as with a conversational workflow, and the server can save the changes to a database. The system can also send commands to the applicable network components to effectuate the confirmed changes.

Topology Alarm Correlation
20230239206 · 2023-07-27 ·

A faulty node is identified in a cloud native environment by retrieving a topology that describes a relationship between a plurality of nodes in a network, retrieving a list of alarms in the network, determining a child node in the network located at the bottom of the topology that has a first alarm based on the alarm list, determining a parent node of the child node located above the child node and below or on an apex node of the network that has a second alarm based on the topology, determining whether the parent node is an apex node in the network based on the topology, and based on a determination that the parent node is the apex node in the network, identify the parent node as the faulty node.

Topology Alarm Correlation
20230239206 · 2023-07-27 ·

A faulty node is identified in a cloud native environment by retrieving a topology that describes a relationship between a plurality of nodes in a network, retrieving a list of alarms in the network, determining a child node in the network located at the bottom of the topology that has a first alarm based on the alarm list, determining a parent node of the child node located above the child node and below or on an apex node of the network that has a second alarm based on the topology, determining whether the parent node is an apex node in the network based on the topology, and based on a determination that the parent node is the apex node in the network, identify the parent node as the faulty node.

System for Adaptive Data Center Asset Configuration

A system, method, and computer-readable medium are disclosed for performing a data center monitoring and management operation. The data center monitoring and management operation includes: generating a series of data center asset configuration questions; performing an adaptive configuration session using the series of data center asset configuration questions; and, dynamically adapting a data center asset configuration recommendation based upon the adaptive configuration session.

SCALING FOR SPLIT-NETWORKING DATAPATH
20230028837 · 2023-01-26 ·

Some embodiments of the invention provide a method for implementing an edge device that handles data traffic between a logical network and an external network. The method monitors resource usage of a node pool that includes multiple nodes that each executes a respective set of pods. Each of the pods is for performing a respective set of data message processing operations for at least one of multiple logical routers. The method determines that a particular node in the node pool has insufficient resources for the particular node's respective set of pods to adequately perform their respective sets of data message processing operations. Based on the determination, the method automatically provides additional resources to the node pool by instantiating at least one additional node in the node pool.