Patent classifications
H04L41/0843
Configuring a remote electronic device by a peer electronic device in a networked environment
A method for configuring multiple electronic devices in a batch, is described. The method can include initializing, by a first computing device a communication network based on a pre-defined configuration parameter. The pre-defined configuration parameter is associated with a first instance of an application on the first computing device. Further, the method includes identifying, by the first computing device, an initialization of a second instance of an application at a second computing device. In response to identifying the initialization of the second instance of the application at the second computing device, the method includes, sending, by the first computing device configuration settings for the second computing device over a secured communication network. In this regard, the configuration settings can comprise at least the pre-defined configuration parameter for configuring the second computing device.
Service providing apparatus and method
A service provision method according to one aspect of the present invention includes providing, to a user terminal (107), a catalog including: a first node type for defining a node relating to a VNW (102); a first relationship type for defining a relationship between nodes relating to the VNW (102); a second node type for defining a node relating to an LNW (104); and a second relationship type for defining a relationship between nodes relating to the LNW (104); receiving, from the user terminal (107), a service request generated in accordance with the catalog for requesting a service that uses the HNW (110); and controlling a VNW OpS (103) and an LNW OpS (105) in response to the received service request.
Network service activation system
Aspects of the present disclosure involve systems and methods for a service activation system in a telecommunications network that utilizes one or more generic container files for building the configuration file to instantiate the service on the network. A request for service from a network may be received from an order entry system that includes specific information about the requested service. A collection of generic configuration files may be selected based on the information included in the service order and arranged to build a configuration file to be executed on the network. The service activation system may also include a component or group of components to verify a received service order and alter the service order with default information or data where applicable. The configuration file may also be executed on the network through one or more drivers communicating with the affected devices to configure the one or more network devices.
Providing configuration data to a connected network switch
A computer program product and a network switch are provided. The network switch may include network ports, memory and a processor for processing program instructions to perform various operations. The computer program product may provide the program instructions for a network switch. The operations may include detecting a first neighbor network switch connection to a first port of the first network switch, accessing first neighbor network switch configuration data that is stored by the first network switch in association with the first port, and providing the configuration data that is stored in association with the first port of the first network switch to the first neighbor network switch over the first neighbor network switch connection to the first port. In one example, the configuration data is obtained from a second neighbor network switch that was previously connected to the first port prior to the first neighbor network switch.
DEPLOYABLE NETWORK SENSOR FOR MULTIPLE PLATFORMS
Disclosed herein are methods, systems, and processes for centralized containerized deployment of network traffic sensors to network sensor hosts for deep packet inspection (DPI) that supports various other cybersecurity operations. A network sensor package containing a preconfigured network sensor container is received by a network sensor host from a network sensor deployment server. Installation of the network sensor package on the network sensor host causes execution of the network sensor container that further causes deployment of an on-premise network sensor along with a network sensor management system, a DPI system, and an intrusion detection/prevention (IDS/IPS) system. The configurable on-premise network sensor is deployed on multiple operating system distributions of the network sensor host and generates actionable network metadata using DPI techniques for optimized log search and management and improved intrusion detection and response (IDR) operations.
SYSTEMS AND METHODS FOR MODIFYING DEVICE OPERATION BASED ON DATASETS GENERATED USING MACHINE LEARNING TECHNIQUES
A configuration system may generate synthetic datasets based on machine learning, and may provide the synthetic datasets in order to configure, train, test, and/or otherwise modify operation of network equipment and/or other devices. The configuration system may receive a sampling of data used by the particular network equipment, and may determine parameters that define values for the variables represented in the sampling. The configuration system may generate different datasets based on the parameters, and may determine an accuracy of each dataset to the sampling based on the values of each dataset conforming by different amounts to the parameters that define the values for the variables represented in the sampling by different amounts. The configuration system may modify the network equipment operation using the values from a particular dataset in response to determining that the accuracy of the particular dataset is greatest to the sampling.
Software defined network controller
Concepts and technologies are disclosed herein for providing and using a software defined network controller. A software defined network controller can be provided by a computing system that includes a processor. A service model that represents a service can be obtained. A network model that represents network resources that support the service can be obtained. Resources that support the service can be determined. Templates can be accessed to identify templates that relate to the resources. The templates identified can be assembled to obtain a template-based representation of the service. The template-based representation can be executed to determine if the service is ready for deployment.
AUTONOMOUS NETWORK OPTIMIZATION USING NETWORK TEMPLATES
This disclosure is directed to network optimization in a complex joint network for increasing the network utility of the complex joint network. A computing device in the complex joint network may receive a data flow via a complex joint network. The computing device may determine, based on a network template, a mission utility associated with the data flow and a traffic class associated with the data flow. The computing device may control one or more quality of service decisions based at least in part on the mission utility associated with the data flow and the traffic class associated with the data flow.
Configuration techniques for managed host operating systems and containerized applications instantiated thereby
Embodiments described herein are directed to configuring managed computing devices utilizing containerized applications. For instance, a mobile device manager may provide configuration settings to a computing device via, for example, an enterprise network. A host operating system (OS) executing on the computing device determines and applies the settings that are applicable to the host OS. The configuration settings are stored for configuring containerized applications executing on the computing device. For instance, as new containerized applications are launched by the host OS, the containerized applications retrieve the configuration settings and determine and apply the settings that are applicable to the containerized applications. Results of applying the configuration settings to the host OS and the containerized applications are merged and sent to the mobile device manager. The host OS and the containerized application may, for example, implement the settings in order to be compliant with an enterprise's policy.
MANAGING CONFIGURATIONS OF MOBILE DEVICES ACROSS MOBILITY CONFIGURATION ENVIRONMENTS
Embodiments described herein provide for systems and methods for managing configurations of mobile devices. A server may receive an instruction inputted via a graphical control to translate configurations from a first device environment to a second device environment. The server may identify, via an interface, a resource accessible by a first plurality of mobile devices in the first device environment based on the instruction. The server may determine, from the first device environment, a first profile identifying a first plurality of attributes defining a first configuration for the first plurality of mobile devices. The server may generate, using the first profile, a second profile identifying a second plurality of attributes defining a second configuration for a second plurality of mobile devices in the second device environment. The server may transmit, via the interface, the second profile to the second plurality of mobile devices.