Patent classifications
H04L41/042
Systems and methods for operations, administration and maintenance (OAM) in the physical coding sublayer (PCS)
Systems and methods described herein provide a method for operation, administration and maintenance (OAM) of data message transmission. The method comprises reading a transmit register of a transmitter associate with a first management entity to determine a transmit status of the transmit register. The method further comprises loading a data message into the transmit register when the transmit status of the transmit register indicates availability. The method further comprises embedding the data message as an out-of-band message with physical code sublayer modulation, and transmitting the out-of-band message on the physical code sublayer to a receiver associated with a second management entity. A transmit state machine of the transmitter and a receive state machine of the receiver establish a handshake to allow the out-of-band message to be passed asynchronously.
Systems and methods for operations, administration and maintenance (OAM) in the physical coding sublayer (PCS)
Systems and methods described herein provide a method for operation, administration and maintenance (OAM) of data message transmission. The method comprises reading a transmit register of a transmitter associate with a first management entity to determine a transmit status of the transmit register. The method further comprises loading a data message into the transmit register when the transmit status of the transmit register indicates availability. The method further comprises embedding the data message as an out-of-band message with physical code sublayer modulation, and transmitting the out-of-band message on the physical code sublayer to a receiver associated with a second management entity. A transmit state machine of the transmitter and a receive state machine of the receiver establish a handshake to allow the out-of-band message to be passed asynchronously.
MANAGEMENT AND ORCHESTRATION OF HETEROGENEOUS NETWORK ENVIRONMENT USING DYNAMIC, ROBUST AND NETWORK AWARE MICROSERVICES
State of the art networking solutions are tightly coupled and proprietary in nature due to multiple vendors in the networking domain. Embodiments of the present disclosure provide a method and system for management and orchestration of heterogeneous network environment using dynamic, robust and network aware microservices. The method enables a platform for automatically and dynamically identifying appropriate group of microservices in accordance with network type and service type specified by the user, thus providing a solution that generates network aware microservices for each network in the heterogeneous network landscape. Furthermore, the system manages the identified microservices for each of the network by managing the life cycle of these microservices. The right life cycle management and coordination of the microservices for the network is in-line with desired goals/business logic, in a reliable and scalable manner, in heterogeneous network environments.
MANAGEMENT AND ORCHESTRATION OF HETEROGENEOUS NETWORK ENVIRONMENT USING DYNAMIC, ROBUST AND NETWORK AWARE MICROSERVICES
State of the art networking solutions are tightly coupled and proprietary in nature due to multiple vendors in the networking domain. Embodiments of the present disclosure provide a method and system for management and orchestration of heterogeneous network environment using dynamic, robust and network aware microservices. The method enables a platform for automatically and dynamically identifying appropriate group of microservices in accordance with network type and service type specified by the user, thus providing a solution that generates network aware microservices for each network in the heterogeneous network landscape. Furthermore, the system manages the identified microservices for each of the network by managing the life cycle of these microservices. The right life cycle management and coordination of the microservices for the network is in-line with desired goals/business logic, in a reliable and scalable manner, in heterogeneous network environments.
SYSTEM AND APPARATUS OF A SOFTWARE-SERVICE-DEFINED-NETWORK (SSDN)
A network apparatus for a network software service layer (NSSL) service bus. The network apparatus includes a memory storing executable instructions and a processor coupled to the memory, the processor executing the executable instructions, where the processor is configured to receive a service description comprising a named service and a network identifier identifying a network node associated with the named service, select a service description according to the named service, and transmit a named service request to the network node according to the service description selected.
IDENTIFYING MOBILE DEVICE LOCATION AND CORRESPONDING SUPPORT CENTER LOCATIONS TO PROVIDE SUPPORT SERVICES OVER A NETWORK
A mobile device may receive updates, support and other data from a current data center agent platform. When the mobile device travels to another location the nearest data center agent may be different from the previous agent. A changeover determination must be performed prior to determining whether the new agent should be assigned to the mobile device. One example method of operation may include receiving current location information of the mobile device and identifying a present location of the mobile device and a current service center assigned to the mobile device. The method may also provide determining whether a new service center location at a remote location from the current service center location should be assigned to the mobile device based on predefined assignment criteria.
Distributed digital security system
A distributed security system can include instances of a compute engine that can execute either locally in security agents on client devices or as cloud instances in a security network. Event data can be processed by elements of the distributed security system according to centrally-defined ontological definitions and/or configurations. Bounding managers of local security agents can control how much event data is sent to the security network. A storage engine in the security network can store event data received from client devices, can route event data to other elements of the security network, including cloud instances of the compute engine. An experimentation engine of the security network can also at least temporarily adjust other elements of the distributed security system during experiments or tests.
Distributed digital security system
A distributed security system can include instances of a compute engine that can execute either locally in security agents on client devices or as cloud instances in a security network. Event data can be processed by elements of the distributed security system according to centrally-defined ontological definitions and/or configurations. Bounding managers of local security agents can control how much event data is sent to the security network. A storage engine in the security network can store event data received from client devices, can route event data to other elements of the security network, including cloud instances of the compute engine. An experimentation engine of the security network can also at least temporarily adjust other elements of the distributed security system during experiments or tests.
Providing Interface Between Network Management and Slice Management
Next generation network architectures enable instantiation of network slices in which traffic may be transported via one or more virtual networks overlaying the physical network infrastructure. To enable a slice management system to be able to obtain information on virtual networks of instantiated network slices, such as utilization data indicative of at least one of: a bandwidth capacity, computing capacity and storage capacity of one or more physical links via which traffic of the virtual networks is routed, an interfacing system is provided. The interfacing system may establish an interface between the slice management system operating in the domain of network slices and the network management system operating in the domain of physical network equipment, and thereby enable the slice management system to take into account such utilization data in its slice management operation.
Distributed digital security system
A distributed security system can include instances of a compute engine that can execute either locally in security agents on client devices or as cloud instances in a security network. Event data can be processed by elements of the distributed security system according to centrally-defined ontological definitions and/or configurations. Bounding managers of local security agents can control how much event data is sent to the security network. A storage engine in the security network can store event data received from client devices, can route event data to other elements of the security network, including cloud instances of the compute engine. An experimentation engine of the security network can also at least temporarily adjust other elements of the distributed security system during experiments or tests.