H04L12/24

INDUSTRIAL SETUP COMPOSITION

Technical solutions are described for selecting components from multiple vendors for a system. An example computer-implemented method includes receiving, by a processor, an environment map that identifies a first component placeholder of the system. The computer-implemented method further includes identifying, by the processor, that the first component placeholder interfaces with a second component placeholder of the system. The computer-implemented method further includes determining, by the processor, a role assigned to the first component placeholder, where the role indicates a type of data that a first component at the first component placeholder communicates with a second component at the second component placeholder. The computer-implemented method further includes determining, by the processor, a list of components for selecting the first component, where each component from the list of components matches the role assigned to the first component placeholder.

DNSSEC Lightweight Database Access Protocol Gateway
20180013726 · 2018-01-11 ·

A system that converts standardized lightweight database access protocol (LDAP) requests into a series of domain name system (DNS) requests to look up requested information. DNS responses are validated using DNS security extensions (DNSSEC) to ensure their validity, then converted into standardized LDAP responses. The system is either operated as a service for public use on the Internet or private use in an enterprise; or as an application running on end user machines, e.g., laptops, mobile phones, to guarantee end-to-end security by validating responses on the end user machine. The standardized, widespread nature of the LDAP allows existing applications to immediately reap the benefits of global, ubiquitous, cross-organizational, trans-national data distribution via DNS secured by DNSSEC.

AUTOMATIC LINK SECURITY
20180013798 · 2018-01-11 ·

Systems, methods, and computer-readable storage media for automatic link security. A cloud controller can receive a signal indicating that an unauthenticated device is requesting private network resources, establish a connection between the unauthenticated device and the cloud controller, and determine that the unauthenticated device is associated with a private network. The cloud controller can facilitate the negotiation of security material between the device and the network and automatically establish a secure link between the device and the private network. The cloud controller can cause the security material to be sent to the device and can transmit a policy instruction that is effective to cause a switch port to automatically bypass a default access policy and automatically adopt a trusted policy for device to access the private network.

COMMUNICATION METHOD, COMMUNICATION SYSTEM, AND COMMUNICATION APPARATUS
20180013663 · 2018-01-11 · ·

A communication method executed by a communication system, the communication method includes determining, by a first node that requests to execute an application, a policy for selecting a node to execute the application from the plurality of relay nodes based on an amount of an output data which is an execution result of the application and an amount of an input data for executing the application; transmitting a request message including identification information indicating the policy and requesting to execute the application via the path; receiving, by a third node, the request message; acquiring data for executing the application from a second node, when it is determined that the third node is able to execute the application based on the identification information; executing the application using at least the acquired data; and transmitting a response message including the execution result of the application to the first node.

Compliance mechanisms in blockchain networks

A node in a blockchain network may agree, on an authority accept a compliance module from the authority, accept the compliance module. The node may also receive an operation, verify a compliance of the operation based on the compliance module, add the verified operation to a ledger on the blockchain network.

Predictive routing using machine learning in SD-WANs

In one embodiment, a supervisory service for a software-defined wide area network (SD-WAN) obtains telemetry data from one or more edge devices in the SD-WAN. The service trains, using the telemetry data as training data, a machine learning-based model to predict tunnel failures in the SD-WAN. The service receives feedback from the one or more edge devices regarding failure predictions made by the trained machine learning-based model. The service retrains the machine learning-based model, based on the received feedback.

MAINTAINING COMPUTING ENVIRONMENTS USING OPERATOR WITH DYNAMICALLY UPDATABLE STATE
20230147631 · 2023-05-11 · ·

Techniques and solutions are provided to facilitate monitoring and maintaining a computing environment. A current state of one or more parameters, resources, or services of a computing environment is determined. The current state is compared with predefined state information. It is determined that the current state is inconsistent with the predefined state information. It is determined whether an update condition is present. If the update condition is not present, the computing environment is automatically updated such that the current state matches the predefined state information. If the update condition is present, the predefined state information is updated.

METHODS AND SYSTEMS FOR GENERATING A VIRTUAL GRAPH OF MULTI CHANNEL COMMUNICATIONS
20230147451 · 2023-05-11 ·

A technique is directed to methods and systems for generating a virtual graph of multi-channel communications. In some implementations, a virtual graph system provides a virtual graph relationship that manages the representation and captures the information associated with multi-channel communications, such as communications of a user with a corporate contact center. The information can include session and “customer journey” characteristics of the interaction flow beyond the details of the telecommunication infrastructure. Additionally, the virtual graph system can provide a visualization that communicates both historical details and actionable information found in the interaction graph(s).

DYNAMIC QUALITY OF SERVICE TRAFFIC STEERING IN A MULTI-ACCESS EDGE COMPUTING ENVIRONMENT

A quality of service traffic steering approach for multi-access edge computing (MEC) environments is disclosed. In an embodiment, a network exposure function (NEF) or similar device (e.g., MEC controller or orchestrator) monitors a quality of service (QoS) of a data session between a user equipment (UE) and an application. The NEF then can determine when the QoS of the data session does not meet a requested service level agreement (SLA). When the SLA is not met, the NEF identifies a MEC host that meets the SLA using a database of MEC applications. Based on the identified MEC host, the NEF re-routes the data session to the MEC host.

FACILITATING MULTIPLE STEP NETWORK CONFIGURATION ACTIVATION AUTOMATION BASED ON PARALLEL PROCESSING
20230145797 · 2023-05-11 ·

Facilitating multiple step network configuration activation automation based on parallel processing is provided herein. Operations of a system include based on a determination that a network activation is to be implemented on target equipment, parsing the network activation into a first group of initialization portion actions and a second group of active target actions. The operations also can include implementing, via first parallel processing, the first group of initialization portion actions on the target equipment. Further, the operations can include, based on a second determination of a completion of the implementing of the first group of initialization portion actions, implementing, via second parallel processing, the second group of active target actions on the target equipment during an implementation period. The target equipment are equipment of a virtual local area network.