H04L41/0672

LEARNING BY INFERENCE FROM PREVIOUS DEPLOYMENTS

The present technology provides a system, method and computer-readable medium for configuration pattern recognition and inference, directed to a device with an existing configuration, through an extensible policy framework. The policy framework uses a mixture of python template logic and CLI micro-templates as a mask to infer the intent behind an existing device configuration in a bottom-up learning inference process. Unique values for device/network identifiers and addresses as well as other resources are extracted and accounted for. The consistency of devices within the fabric is checked based on the specific policies built into the extensible framework definition. Any inconsistencies found are flagged for user correction or automatically remedied by a network controller. This dynamic configuration pattern recognition ability allows a fabric to grow without being destroyed and re-created, thus new devices with existing configurations may be added and automatically configured to grow a Brownfield fabric.

EMS resolution of split-brain virtual network function components
11196616 · 2021-12-07 · ·

An example operation may include a system, comprising one or more of receiving a virtual network function component instance (VNFCI) status notification resumption message with an active state when a peer VNFCI operational state is active, retrieving a timestamp of a VNFCI state change to an active state from an element VNFCI state database, retrieving a timestamp of a peer VNFCI state change to active from an element VNFCI state database, sending one or more of: a request to a virtual network function manager (VNFM) to determine if the VNFCI network is isolating while an operating state was active, and a request to the VNFM to determine if the peer VNFCI network is isolating while an operating state was active, sending a state change request with standby state to the peer VNFCI when the VNFCI is not network isolated and the peer VNFCI is network isolated, and a VNFM response is received regarding the VNFCI, a timeout response from the VNFM, and a VNFM response is received regarding the peer VNFCI, and sending a state change request with standby to the VNFCI with one or more of: the VNFCI network isolate and peer VNFCI is not network isolated, and the VNFCI is network isolated or the peer VNFCI is not network isolated, and the VNFCI is not network isolated and the peer VNFCI is network isolated and the VNFCI is in preferred standby.

BROADBAND WATCHDOG
20210377101 · 2021-12-02 ·

A method includes determining that data out of a peripheral device has been interrupted. In response, control signals are transmitted that cause power to not be supplied to the peripheral device and then cause power to be supplied to the peripheral device. If the peripheral device is determined to not be outputting data, whether data into the peripheral device has been restored is determined. If it is not, control signals are transmitted that cause power to not be supplied to a router and then cause power to be supplied to the router. If the router is determined to be outputting data, control signals are transmitted that cause power to not be supplied to a wireless access point that is coupled to the modem and then cause power to be supplied to the wireless access point. Whether the wireless access point is outputting data is determined.

COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMPUTER PROGRAM PRODUCT

A communication system according an embodiment includes one or more hardware processors. The one or more hardware processors calculate indicators used to detect presence of abnormality caused by a situation in which a size of a message is larger than a maximum allowable size of a queue, the indicators being calculated based on gate control information including a plurality of entries each of which indicates gate states corresponding to a plurality of queues.

FAST FAILOVER SUPPORT FOR REMOTE CONNECTIVITY FAILURE FOR A VIRTUAL TUNNEL
20220210006 · 2022-06-30 ·

In general, embodiments relate to a method for managing traffic flow along a path between network devices. The method includes initiating, by an end-point network device, monitoring of the path, wherein the end-point network device transmits packets to a target network device over the path, detecting after the initiating, by the end-point network device, that at least a portion of the path has failed, wherein the portion of the path that has failed is external to the end-point network device, in response to the detecting, identifying which portions of network device hardware in the source network device need to be updated to redirect the packets from the end-point network device to the target network device to take a second path, and updating the identified portions of the network device hardware.

Distinguishing between network- and device-based sources of service failures
11362886 · 2022-06-14 · ·

In one example, the present disclosure describes a device, computer-readable medium, and method for distinguishing between network- and device-based sources of service failures in service networks. For instance, in one example, a method includes merging a first set of data with a second set of data to produce a merged data set. The first set of data relates to a customer device connected to a service network and the second set of data relates to the service network. A failure is predicted in the delivery of a service from the service network to the customer device, based on the merged set of data. It is determined whether a source of the failure is rooted in the customer device or in the service network.

Method, apparatus, device and readable medium for disaster recovery processing for infrastructure areas

A method, an apparatus, a device and a readable medium for disaster recovery processing for infrastructure areas which relate to the technical field of infrastructure area management are disclosed. The method includes: receiving a request for the service; under the condition that a monitoring system detects that there is an identifier of a faulty infrastructure area in identifiers of at least two infrastructure areas having a binding relationship with the request for the service, unbinding the binding relationship between the identifier of the faulty infrastructure area and the service; scheduling traffic for the request for the service to an unfaulty infrastructure area, according to a remaining unbound binding relationship between the service and the identifier of the unfaulty infrastructure area. According to the technical solutions, the damages may be stopped in time when the fault occurs in the infrastructure area.

Continuously calibrated network system

Data is transmitted in accordance with a parameter. For a metric associated with transmission of the data, a response to a stochastic error state of the metric includes making a first adjustment to the parameter in a first direction. A response to a deterministic error state of the metric includes making a second adjustment to the parameter in a second direction, where the second direction is in opposition to the first direction. A transition point between the two states is identified, and a response to the identification is made.

Self-healing telco network function virtualization cloud

Examples herein describe systems and methods for self-healing in a Telco network function virtualization cloud. KPI attributes for virtual network functions can be mapped to physical fault notifications to create synthesized alerts. The synthesized alerts can include information from both a virtual and physical layer, allowing a self-healing action framework to determine root causes of problems in the Telco cloud. Remedial actions can then be performed in either the virtual or physical layer of the Telco cloud. Remedial actions in one layer can be based on root causes identified in the other, which can allow for remediation before network downtime occurs.

Methods and systems for recovery of network elements in a communication network
11356321 · 2022-06-07 · ·

A method of recovering a plurality of network elements from a network outage, including receiving, at a network management system (NMS), a plurality of recovery requests from the plurality of network elements; determining, by the NMS, a sequence for processing the plurality of recovery requests based on a plurality of priority values associated with the plurality of network elements, wherein a priority value of the plurality of priority values is based on at least one key performance indicator (KPI) associated with a corresponding network element of the plurality of network elements; and recovering the plurality of network elements based on the determined sequence.