H04L41/5016

MAINTENANCE TASK MANAGEMENT DEVICE AND MAINTENANCE TASK MANAGEMENT METHOD
20210281494 · 2021-09-09 ·

[Problem] It is determined whether quick repair handling is required for a failure in a communication apparatus or in a communication service that occurs in a nighttime period in compliance with an SLA while curbing operating expenses.

[Solution] A maintenance task management apparatus 11 determines handling of failures when both an apparatus failure that is a failure in communication apparatuses 46a and 46b in a nighttime period and a service failure that is a trouble in a communication service provided by the communication apparatuses 46a and 46b to users in the nighttime period occur or only the apparatus failure occurs. The maintenance task management apparatus 11 includes a handling determination unit 23 and a handling control unit 31. The handling determination unit 23 determines whether service interruption of communication due to double failures, which are both the apparatus failure and the service failure, violates an SLA that is service level agreement with users when the double failures are detected. The handling control unit 31 performs control for transmitting a quick handling notification for requesting quick failure repair to a worker terminal 42 when it is determined that the service interruption violates the SLA.

METHOD AND SYSTEM FOR PERFORMING CHARGING ON NETWORK RESOURCE, AND RELATED DEVICE
20210281997 · 2021-09-09 ·

A method for performing charging on a network resource is provided. The method mainly includes: determining a network slice performance indicator that is used for performing charging on a network slice instance; subscribing to data corresponding to the network slice performance indicator from a network slice management device; and performing charging on the network slice instance based on the data corresponding to the network slice performance indicator. According to the method, a charging result for a customer matches an input of an operator for the network slice instance, to help improve network resource utilization rate and meet diversified network service requirements of an industry customer.

HEALTH STATUS MONITORING FOR SERVICES PROVIDED BY COMPUTING DEVICES

This application sets forth various techniques for monitoring a status of a service. According to some embodiments, a DNS server can implement a health check engine that monitors the status of the service in order to implement round-robin DNS among a plurality of availability zones. Each service instance for the service can include a monitoring agent configured to (1) monitor the status of the service instance, and (2) respond to health check messages received from the health check engine. The monitoring agent can also be configured to (1) collect statistics associated with one or more service dependencies of the service instance during a tracking window, (2) calculate at least one ratio based on the statistics collected during the tracking window, and (3) generate the status of the service instance by comparing the at least one ratio to a threshold value.

SYSTEMS AND METHODS FOR PATTERN-BASED QUALITY OF SERVICE (QOS) VIOLATION PREDICTION

Disclosed herein are systems and methods for pattern-based QoS violation prediction. In one exemplary aspect, a method may comprise identifying a service on a computing device that is connected to a plurality of client devices and determining a plurality of micro-services comprised in the identified service. The method may comprise parsing access information to detect that a first client device is accessing a micro-service. The method may comprise determining, for a first period of time, QoS evaluation parameters for the access between the micro-service and the first client device. The method may comprise identifying changes in the QoS evaluation parameters within the first period of time, detecting a predetermined QoS violation pattern, and executing a QoS action based on the predetermined QoS violation pattern.

Real-time scalable virtual session and network analytics

Provided herein are systems and methods for providing insights or metrics in connection with provisioning applications and/or desktop sessions to end-users. Network devices (e.g., appliances, intermediary devices, gateways, proxy devices or middle-boxes) can gather insights such as network-level statistics. Additional insights (e.g., metadata and metrics) associated with virtual applications and virtual desktops can be gathered to provide administrators with comprehensive end-to-end real-time and/or historical reports of performance and end-user experience (UX) insights. Insights relating to an application or desktop session can be used to determine and/or improve the overall health of the infrastructure of the session, Citrix Virtual Apps and Desktops, the applications (e.g., remote desktop application) being delivered using the infrastructure, and/or the corresponding user experience.

INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND INFORMATION PROCESSING SYSTEM
20210303225 · 2021-09-30 ·

The present invention provides an information processing apparatus capable of performing appropriate processing under a predetermined usage agreement. To this end, the information processing apparatus repeatedly communicates with a server saving agreement information and obtains the agreement information in a case where the information processing apparatus is in a second state in which a predetermined service is available. In this case, the information processing apparatus switches from the second state to a first state in which the predetermined service is unavailable based on a time and date at which the communication with the server fails.

SECURE COUNT IN CLOUD COMPUTING NETWORKS
20210176141 · 2021-06-10 ·

Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.

Guided configuration item class creation in a remote network management platform

A system may include a database disposed within a remote network management platform, a server device disposed in the platform, and a client device. The database may contain representations of configuration items, such as computing devices and software applications associated with the managed network. The server device may provide a graphical user interface including a sequence of panes to the client device. The sequence of panes may include an identifier pane, an identification rules pane, and a reconciliation pane. Each pane may include data entry fields that are operable to define a new class of configuration item. The server device may receive, by way of the graphical user interface, a definition of the new class that uniquely identifies configuration items of a particular type using at least the attributes. The server may store, in the database, the definition of the new class.

EFFICIENT CONTAINER BASED APPLICATION RECOVERY
20210182149 · 2021-06-17 ·

Stabilizing a container-based application includes determining a health of a container. Based on the container health, a most recent stable version of an image for the container is identified. A container image is considered stable if containers spawned from the image have a relatively high MTTF and relatively low MTTR compared to other versions of same image. The container is then deployed using the most recent stable version of the image for the container.

System and method for predicting key performance indicator (KPI) in a telecommunication network
11115287 · 2021-09-07 ·

The present disclosure relates to system(s) and method(s) for predicting a Key Performance Indicator (KPI) in a telecommunication network is illustrated. The system is configured to monitor a set of counters and a Key Performance Indicator corresponding to a telecommunication network. The set of counters and the Key Performance Indicator (KPI) are monitored for a predefined time interval to gather sample data. The system is configured to analyze the sample data using a data analysis technique in order to identify a subset of counters, from the set of counters, influencing the KPI and a correlation coefficient associated with each counter from the subset of counters, wherein the correlation coefficient associated with each counter is identified after normalizing the subset of counters. The system is configured to apply regression on the subset of counters and the KPI in order to build a correlation equation between the subset of counters and the KPI.