H04L41/5012

Cable TV network broadband access system with distributed deployment and centralized control

The present invention provides a cable TV broadband access system with distributed deployment and centralized control, which comprises: a system terminal end, configured to receive and transmit uplink and downlink service data, and receive and respond to access control data and management control data; a system access end, configured to implement data format transformation and data forwarding or processing for said uplink and downlink service data, said access control data and said management control data of said system terminal end, and transmit, receive and respond to management control data of said system access end; a system head end, configured to implement management control and access control for said system access end and said system terminal end, and process, converge and forward said uplink and downlink service data. Said system uses a system architecture with three-stage distributed deployment and centralized control comprising a system terminal end, a system access end and a system head end, and it can not only realize the end-to-end control management and QoS priority assurance of the broadband data service, but can also realize easy network deployment, low comprehensive cost and high management efficiency.

LOCK-LEASE MANAGEMENT OF HARDWARE AND SOFTWARE MAINTENANCE, DEPLOYMENT, AND OPTIMIZATION OPERATIONS USING EFFECTIVE APPLICATION AVAILABILITY

In an example embodiment, the concept of effective application availability is introduced. In a data center, there may be a minimum amount of a particular resource that is needed to continue proper functioning of an application. This may be termed a safe application availability limit. The safe application availability limit may be obtained or determined using a safe application availability limit rule. An effective application availability may be calculated by taking a current application availability and subtracting it by an availability loss from a requested operation. The effective application availability may then be compared to the safe application availability limit in order to determine whether to permit the operation to be performed at the requested time, or whether to request that the operation be attempted again at some later time.

Method and system for cloud desktop fabric

A system and method for a virtual desktop system is disclosed. The system includes a master fabric region including resources for provisioning a desktop. The system includes an expansion fabric region including replicated resources for provisioning the desktop from the master fabric region. The system includes a control plane having a global pool. A client device application operated by a user associated with the global pool accesses a desktop from either the master fabric region or the expansion fabric region.

Enhanced conversation interface for network management

Disclosed is a network management system that provides an interface to enable diagnostics and troubleshoot of a remotely managed multi-site network. Some embodiments provide a natural language interface, while other embodiments provide a chatbot type interface that communicates with a technician via traditional text information on a display screen. The diagnostic and troubleshooting capabilities search a central data store that receives device property information from each site of the multi-site network. Based on devices or users that match portions of the entity, queries to the data store are initiated to obtain additional data on the devices. A response to the query is then provided based on the properties of the devices.

Network element federation controller and forwarding box

A controller network device, in a network control layer of a service provider network, receives command input for providing services over a service provider network and provides, to a forwarding network device, a first control communication. The first control communication includes an initial output to implement the command input. The controller network device provides, to peer controller network devices, a verification request to verify the initial output of the first control communication; receives, from the peer controller network devices, responses to the verification request that each include a calculated output based on the command input; and applies a verification schema to determine a majority output from the responses. The controller network device compares the initial output to the majority output and sends a second control communication, with a verified output indication, to implement the command input when the initial output matches the majority output.

SYSTEM AND METHOD FOR PRODUCTION READINESS VERIFICATION AND MONITORING
20220350583 · 2022-11-03 ·

Systems and methods for production readiness verification and monitoring are disclosed. A set of compliance requirements including one or more cloud-specific requirements and status information regarding a status of each of a plurality of clouds within a cloud environment is received. The status information includes availability of one or more servers within each of the plurality of clouds. The status information for each of the plurality of clouds is compared to the one or more cloud-specific requirements and the cloud environment as identified as one of compliant or non-compliant. The cloud environment is identified as compliant when each of the one or more cloud-specific requirements are satisfied and non-compliant when at least one of the one or more cloud-specific requirements are not satisfied.

METHOD AND APPARATUS FOR COMMUNICATION NETWORK QUALITY OF SERVICE CAPABILITY EXPOSURE
20170317894 · 2017-11-02 · ·

A method and system for providing access to Quality of Service levels from within a network to entities outside of the network.

TASK EXTENSION FOR SERVICE LEVEL AGREEMENT STATE MANAGEMENT
20170310563 · 2017-10-26 ·

Breaches of service level agreements (SLAs) of a computer network can be identified based on changes to statuses of components of the computer network. A status of a component of the computer network can be determined to have changed responsive to an event affecting the computer network. The component can be determined to be included in a list of components used to meet conditions of the SLAs. A record of a task table can be updated according to the changed status of the component responsive to determining that the component is included in the list of components. Records of the task table are associated with ones of the SLAs. It can then be determined that the changed status of the component prevents a condition of an SLA associated with the updated record from being met. The SLA can be identified as breached responsive to that determination.

Systems, methods, and computer program products for service processing
09794353 · 2017-10-17 · ·

A system for managing process requests includes at least one memory operable to store request and response queues and a processor coupled to the memory. A request to execute a process is received and stored in a request queue among a set of request queues, the request queue corresponding to the process. It is determined if one or more nodes on a network are available to perform the process. An expiration value for the request is set based on a type of the process. The request is dispatched to the one or more nodes on the network to perform the process at a predetermined timing. A response is received from the one or more nodes. The response is stored in a response queue among a set of response queues, the response queue corresponding to the process. The response is dispatched from the response queue.

SYSTEMS AND METHODS FOR MANAGING DATA PROXIES

Systems and methods are provided for managing data proxies. The systems and methods enable a proxy management system to store and manage data proxies that digitally represent real-world objects equipped with sensors. The data proxy of an object is made up of data sampled by the object's sensors and data estimated using the sampled data. The sampling rate at which the data is sampled can be optimized such that it conforms with target quality of data (QoD) requirements and/or target data acquisition costs. The QoD requirements can be based on requirements set by each of the applications associated with an object. The proxy management system can use the sampled data and estimated data to (1) ensure that incoming messages, if executed, would not have negative consequences; and (2) monitor objects to determine if and when they are expected to approach undesirable states, or if they have already reached such undesirable states.