Patent classifications
H04L41/0836
Method for configuring a network node
A method for configuring a first network node using a first autonomous system (AS) number in at least one session established with another node according to a dynamic routing protocol is described. The method is implemented by the first node and includes receiving a configuration message comprising at least one piece of information that is representative of a second AS number intended to be used by the first node as a replacement for the first number, configuring the first node with the second AS number, identifying at least one second node having at least one session according to the dynamic routing protocol, active with the first node, in which the first node is associated with the first AS number, and sending a control message to the at least one second node requesting the replacement of the first AS number with the second AS number by the at least one second node, such that, after the replacement, the first node is associated with the second AS number in the at least one active session.
Cloud native discovery and protection
A system and method for cloud native discovery and protection. The method includes discovering instances of a plurality of cloud assets in a cloud native environment based on a plurality of application programming interface (API) endpoints in the cloud native environment, wherein the plurality of API endpoints is identified based on cloud credentials for each of the plurality of cloud assets; determining at least one cloud asset instance that lacks active security protection based on a configuration of at least one entity deployed in the cloud native environment; and reconfiguring at least a portion of the cloud native environment with respect to the at least one cloud asset instance that lacks active security protection.
EVENT SIGNALLING IN A WIRELESS BACKHAUL NETWORK
There is provided a method for signaling an event associated with a wireless terminal in a communications network. The method is performed by an information providing node. The method comprises detecting an event associated with a wireless terminal, the event causing a change of operation in at least a client node or a hub node in a wireless backhaul network. The method comprises transmitting a message indicative of the event towards an information receiving node.
Link Protection Method In SDN, Switching Device, and Network Controller
A link protection method in a software-defined networking (SDN), a corresponding switching device and network controller, where the method includes receiving, by a first switching device in the SDN, first information from a network controller in the SDN and link protection information, where the first information establishes a communication link between the first switching device and a destination device, and the link protection information instructs the first switching device to proactively perform primary-to-secondary link switching when a link is faulty, establishing, by the first switching device, the communication link with the destination device according to the first information, and determining, by the first switching device according to the link protection information, that the first switching device proactively performs the primary-to-secondary link switching.
PROTECTING INTEGRATION BETWEEN RESOURCES OF DIFFERENT SERVICES USING SERVICE-GENERATED DEPENDENCY TAGS
A resource tag service of a provider network may be used to protect integration between resources of different services by generating dependency tags. When a service receives, from a client, a request for a resource of the service to use another resource of another service, a dependency tag is generated by the resource tag service. The dependency tag indicates that the resource depends on the other resource (e.g., the resources are integrated). When the other service receives, from the client, a request to delete or modify the other resource, the deletion or modification of the other resource is prevented based on the existence of the dependency tag for the other resource (e.g., the dependency tag is attached to the other resource, indicating that the other resource of the other service is integrated with the resource of the service).
MACHINE LEARNING MODEL-BASED, OVERHEAD LINE BREAKAGE PREDICTION SYSTEM
Data analysis-based line breakage prediction is provided, which includes providing a machine learning model trained to, at least in part, facilitate minimizing downtime within a network that includes an overhead line. Tensile-related data for the overhead line is obtained, and the machine learning model analyzes relevant data for the overhead line, including the tensile-related data for the overhead line, and generates a probability of breakage score for the overhead line based on the relevant data, including the tensile-related data. An action is initiated, using the machine learning model, to minimize downtime within the network based, at least in part, on the generated probability of breakage score for the overhead line.
Techniques and system for optimization driven by dynamic resilience
Disclosed are hardware and techniques for testing computer processes in a network system by simulating computer process faults and identifying risk associated with correcting the simulated fault and identifying computer processes that may depend on the corrected computer process. The interdependent computer processes in a network may be determined by evaluating a risk matrix having a risk score and non-functional requirement score. An analysis of the risk score and non-functional requirement score accounts for interdependencies between computer processes and identified corrective actions that may be used to determine an optimal network environment. The optimal network environment may be updated dynamically based on changing computer process interdependencies and the determined risk and robustness scores.
Efficient message transmission and loop avoidance in an RPL network
In some implementations, formation of loops between nodes in an RPL network may be avoided. A node that receives a neighbor-discovery message may determine, based on a parent-child status, whether the neighbor-discovery message was received from a parent of the node. If the neighbor-discovery message was received from the parent, the node may transmit an error code to the parent. In addition, the node may determine, based on a comparison of reliability rankings, whether the neighbor-discovery message was received from a node with relatively high reliability, such as a potential grandparent node. If the neighbor-discovery message was received from a high-reliability node, the node may transmit an error code to the high-reliability node. Furthermore, the node may reduce network traffic by withholding a neighbor-detection message from a child node. The node may transmit a response to neighbor-detection messages received from the child node.
REDUNDANT STORAGE OF CONFIGURATION OF NETWORK DEVICES
The present invention relates to a method for distributing configurations of network devices (1, 2, 3, 4, 5, 6, 7, 8). Said network devices are connected to at least one network (11). At least two network devices (1, 2, 3, 4, 5, 6, 7, 8) are connected to the network (11) via ports (9). All of the network devices (1, 2, 3, 4, 5, 6, 7, 8) are moreover provided with a determinable unique identification, and at least one memory (10) assigned to at least one network device (1, 2, 3, 4, 5, 6, 7, 8) is used. This memory is embodied in addition to the local memory of each network device. According to the invention, at least one network device (1, 2, 3, 4, 5, 6, 7, 8) now has means for location determination that determine the location of the at least one network device (1, 2, 3, 4, 5, 6, 7, 8). The configuration of the at least one network device (1, 2, 3, 4, 5, 6, 7, 8) is then stored, according to the invention, in thememory (10) of another network subscriber (1, 2, 3, 4, 5, 6, 7, 8) by including the location. This configuration file can then be used to configure interchanged network devices.
Systems and methods for improved fault tolerance in solicited information handling systems
An information handling system is provided that uses an overlay network controller to improve fault tolerance and minimize downtime in a solicited system. The network controller may determine standby paths for the solicited communications path and reroute communications to one of the standby paths when a fault is detected in the communications path.