H04L41/048

Mobile network localization
11536797 · 2022-12-27 · ·

A method localizes a first agent in a network including a number of agents, the number of agents including a number of mobile agents and one or more beacons located at known locations. The method includes performing a procedure including, receiving transmissions from a number of neighboring agents, processing the transmissions to determine information related to a relative location of the first agent and each neighboring agent of the number of neighboring agents, determining, based on the information related to the relative location of the first agent and each neighboring agent, that the first agent is within one or more proximity regions, and updating an estimated location of the first agent based on the information related to a relative location of the first agent and each neighboring agent.

STATEFUL NETWORK SLICE SELECTION USING SLICE SELECTOR AS CONNECTION TERMINATION PROXY

Some embodiments provide a method for establishing multiple virtual service networks over multiple datacenters. The method configures, for each virtual service network of the plurality of virtual service networks, a set of machines distributed across the datacenters to implement an ordered set of network services for the virtual service network. The method configures multiple service network selectors executing within the datacenters to receive a data message, select one of the virtual service networks for the data message based on analysis of contents of the data message, determine a location within the datacenters for a machine implementing a first network service of the ordered set of network services for the selected virtual service network, and transmit the data message to the machine implementing the first network service.

ROBOTIC PROCESS AUTOMATION BOT OPERATIONAL MANAGEMENT SYSTEM

A device includes a processor and a memory. The processor effectuates operations including monitoring enterprise network traffic associated with one or more user device (UE). The processor further effectuates operations including comparing the enterprise network traffic to a UE profile associated with each of the one or more UE. The processor further effectuates operations including determining whether the comparison indicates that a predetermined threshold has been exceeded. The processor further effectuates operations including in response to the indication that the predetermined threshold has been exceeded, generating an alert, wherein exceeding the predetermined threshold is indicative of a denial of service attack on an enterprise network or an attempt to remove enterprise data via the one or more UE.

Virtual service networks

Some embodiments provide a method for establishing multiple virtual service networks over multiple datacenters. The method configures, for each virtual service network of the plurality of virtual service networks, a set of machines distributed across the datacenters to implement an ordered set of network services for the virtual service network. The method configures multiple service network selectors executing within the datacenters to receive a data message, select one of the virtual service networks for the data message based on analysis of contents of the data message, determine a location within the datacenters for a machine implementing a first network service of the ordered set of network services for the selected virtual service network, and transmit the data message to the machine implementing the first network service.

ENHANCED SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) CONNECTOR

Techniques are described for automating the configuration of a simple network management protocol (SNMP) manager device for enabling collection of SNMP data from one or more SNMP-enabled devices. Based upon SNMP object identifiers (OIDs) received from an SNMP-enabled device, processing is performed to map the OIDs to one or more SNMP management information bases (MIBs) corresponding to the OIDs. The identification of the OIDs and mapping the OIDs to one or more MIBs is performed in an automated manner and substantially free of any human or manual intervention. The identified one or more MIBs are then used to configure the SNMP manager to enable SNMP communications between the SNMP-enabled device and the SNMP manager. In certain implementations, the identified one or more MIBs are loaded into system memory by the SNMP manager.

Method and system for managing computer vision alerts using mobile agents in a computer vision environment

Techniques described herein relate to a method for managing a computer vision environment. The method includes obtaining, by a video management system (VMS), a computer vision (CV) alert; in response to obtaining the CV alert: receiving confirmation of the CV alert; in response to the confirmation: identifying a nearest mobile agent of mobile agents associated with the CV alert; providing the CV alert and at least a portion of the CV data associated with the CV alert to the mobile agent; generating a CV alert case associated with the CV alert; obtaining additional CV data associated with the CV alert from CV nodes and the nearest mobile agent; and updating the CV alert case using the additional CV data.

METHOD AND SUBSYSTEM THAT COLLECTS, STORES, AND MONITORS POPULATION METRIC DATA WITHIN A COMPUTER SYSTEM

The current document is directed to methods and subsystems within computing systems, including distributed computing systems, that collect, store, process, and analyze population metrics for types and classes of system components, including components of distributed applications executing within containers, virtual machines, and other execution environments. In a described implementation, a graph-like representation of the configuration and state of a computer system included aggregation nodes that collect metric data for a set of multiple object nodes and that collect metric data that represents the members of the set over a monitoring time interval. Population metrics are monitored, in certain implementations, to detect outlier members of an aggregation.

METHODS AND APPARATUS TO AUTHENTICATE AND DIFFERENTIATE VIRTUALLY IDENTICAL RESOURCES USING SESSION CHAINING
20170373854 · 2017-12-28 ·

Methods and apparatus to authenticate and differentiate virtually identical resources using session chaining are disclosed. In response to a session request from at least one of a management device or a resource, example methods and apparatus locate a session chain stack associated with an identifier of the at least one of the management device or the resource, and determine whether a first nonce at a top of the session chain stack associated with the identifier of the at least one of the management device or the resource is equal to a second nonce associated with the session request from the at least one of the management device or the resource. Upon determining that the nonce at the top of the session chain stack associated with the identifier of the at least one of the management device or the resource is equal to the second nonce, example methods and apparatus initiate a session between the management device and the resource, and re-negotiate the second nonce between the management device and the resource to generate a third nonce.

SYSTEMS AND METHODS FOR USER PLANE PATH SELECTION, RESELECTION, AND NOTIFICATION OF USER PLANE CHANGES
20170367026 · 2017-12-21 · ·

Systems and methods for performing User Plane (UP) path selection or reselection over a communications network with a 3.sup.rd party entity, and for notifying network entities of UP changes in a communications network, are disclosed. The method includes: receiving an application program interface based request for UP path selection from the 3.sup.rd party entity; performing a validation and authorization procedure with the request; transmitting a UP path selection configuration request to a Control Plane Function that maintains configuration data; obtaining a reference number confirming the UP path selection configuration request; and installing the UP path selection according to the reference number.

IP ADDRESS DISTRIBUTION DEVICE, IP ADDRESS DISTRIBUTION SYSTEM, AND IP ADDRESS DISTRIBUTION METHOD
20170346786 · 2017-11-30 · ·

An IP address distribution device includes: a display; a storage storing an IP address management table in which an IP address and an in-train installation position of a device in which the IP address needs to be used are managed in association with each other and which includes information as to whether the IP address is in use or not in use; and an IP address distribution unit referring to the IP address management table in response to receiving a request for an IP address from the requesting device, displaying, on the display, unused IP addresses in association with the in-train installation positions, accepting input information for selecting, from among the unused IP addresses, an IP address corresponding to an in-train installation position of the requesting device, and selecting, from the IP address management table, an IP address to be assigned to the requesting device based on the input information.