H04L41/0836

Proactive and reactive management for devices in a network

The disclosed technology includes a health engine that monitors and modifies customer-premises equipment (CPE) devices. The health engine can detect patterns in CPE device behavior, identify problems with CPE devices, and adjust CPE device configurations proactively or reactively to address problems or prevent problems. In some implementations, the health engine can instruct a CPE device or gateway to restart, update its software or firmware, notify a user of the CPE device of an unhealthy behavior pattern in a CPE device. The health engine can modify a CPE device prior to a user using the device or when the CPE device is inactive.

Cybersecurity hardening for networked systems

A computer-readable medium contains cybersecurity configuration settings (CCS) generating file(s) including instructions when executed cause a processor of a computer located at a node in a networked system having computers including at least one computer system class to generate CCS. The CCS generating file includes group policy objects (GPOs) applicable to all computers, policy setting scripts that are applicable to <all the computer s, and group policy definition files which provide a policy setting library for the computer class. Execution of the CCS generating file at the node automatically generates the CCS for cybersecurity protection of the node. The computer class can include computer classes that include ≥2 different operating systems, and there can be a CCS generating file for each computer class. The CCS generating file can be a single multi-class CCS generating file that includes a plurality of CCS generating files.

HIGHLY RELIABLE PATH ACCOMMODATION DESIGN APPARATUS AND METHOD

Accommodation design for wavelength and sub-λ paths in a communication network is performed. If sub-λ path accommodation is possible according to search for a wavelength path present in a single-hop logical route, the accommodation in the wavelength path is executed. If sub-λ path accommodation is possible according to search for a wavelength path present in a multi-hop logical route, a logical route is selected based on the wavelength path and the sub-λ path is accommodated in the wavelength path. Additionally, each physical route suitable for the sub-λ path accommodation is searched for. If the route can accommodate a wavelength path set in a single-hop logical route by available wavelength allocation, the sub-λ path is accommodated in the wavelength path. Furthermore, routes in consideration of overlapping of nodes, pipelines, and links and operation rate are selected based on information about the start and end nodes of each of redundant routes.

MANAGEMENT OF NETWORK FUNCTIONS VIRTUALIZATION AND ORCHESTRATION APPARATUS, SYSTEM, MANAGEMENT METHOD, AND PROGRAM

Provided a management apparatus including a maintenance mode setting unit that transitions a first virtualization infrastructure (NFVI0) to a maintenance mode, a mobility control unit that at least instructs a virtualization deployment unit (VDU) on the first virtualization infrastructure in the maintenance mode to move to a second virtualization infrastructure (NFVI1), and a maintenance mode release unit that releases the maintenance mode of the first virtualization infrastructure (NFVI0).

Techniques for dynamic network strengthening

Various embodiments are generally directed to techniques for network strengthening, such as by detecting issues with one or more network components and reconfiguring one or more upstream or downstream network components to preempt issues with the one or more upstream or downstream network components, for instance. Some embodiments are particularly directed to a tool (e.g., strengthening agent) that implements pre-scripted or dynamic hardening of up and downstream dependencies of a network component in response to an issue identified with the network component. In many embodiments, up and downstream components of a network component may be reconfigured while the issue with the network component is being addressed to preempt issues with the up and downstream components.

Unified recommendation engine
11711287 · 2023-07-25 · ·

A system receives, from one or more subsystems, one or more predicted outcomes associated with a device. The system provides provide at least a subset of the predicted outcomes as input to a machine learning model trained to identify a set of resolution actions. The system receives, from the machine learning model, the set of resolution actions for the subset of the predicted outcomes, wherein each resolution action in the set of resolution actions is associated with a probability of resolving at least one of the predicted outcomes in the subset of predicted outcomes. The system identifies a first resolution action from the set of resolution actions, wherein the first resolution action has a highest probability of resolving the at least one of the predicted outcomes in the subset of predicted outcomes. The system provides a first instruction to execute the first resolution action.

METHOD AND SYSTEM FOR NODE DISCOVERY AND SELF-HEALING OF BLOCKCHAIN NETWORKS
20230006882 · 2023-01-05 ·

A method for automatic configuration of a communication network includes: generating a request message, the request message including a communication address associated; transmitting the generated request message as a broadcast message to a plurality of computing devices using a predefined user datagram protocol (UDP) port, the message being broadcast with a predetermined time to live; receiving agreement messages from computing devices transmitted by the respective computing device using the predefined UDP port, each agreement message including a communication address associated with the respective computing device and a specified transmission control protocol (TCP) port; identifying at least one of the one or more agreement messages for establishment of communication; and establishing a communication connection to the computing device associated with each identified agreement message using the specific TCP port.

ENVIRONMENTAL SUSTAINABILITY OF NETWORKING DEVICES AND SYSTEMS

Techniques are provided for improving the environmental sustainability of a networking device and/or a networking system. In one example, a sustainability server obtains power consumption data of a networking device on a per-plane basis. Based on the power consumption data, the sustainability server computes an individual sustainability score that indicates a level of environmental sustainability of the networking device. The sustainability server further analyzes the power consumption data on the per-plane basis. In response to analyzing the power consumption data on the per-plane basis, the sustainability server provides a recommendation to implement a change to a configuration or operating parameter of the networking device, or to a networking system that includes the networking device, to improve the individual sustainability score.

VISUALLY GUIDED TOPOLOGY WIRING
20230231772 · 2023-07-20 ·

Methods, systems, and devices are provided herein for providing a visually guided topology wiring scheme. As described herein, after determining that a first end of a cable has been inserted at a first port of a first peer device, a wiring application may reference a topology file to identify a second port of a second peer device with which the first peer device is intended to have a link. Subsequently, the wiring application may activate an indicator associated with the second port to mimic an indicator associated with the first port. For example, the wiring application may cause both indicators associated with each port to flash according to a same or similar flashing pattern, to produce or illuminate at a similar or identical color (e.g., approximately the same color), to flash at approximately a same rate, or by substantially synchronizing a flashing of each indicator.

SYSTEMS AND METHODS FOR CONTROLLING THE DEPLOYMENT OF NETWORK CONFIGURATION CHANGES BASED ON WEIGHTED IMPACT

A method for controlling deployment of network configuration changes includes receiving, by centralized network management system executed by a processor and memory, configuration change instructions to alter a configuration of a network; computing, by the centralized network management system, a weighted impact of the configuration change instructions; determining, by the centralized network management system, whether the weighted impact of the configuration change instructions exceeds a threshold impact level; and in response to determining that the weighted impact does not exceed the threshold impact level, executing the configuration change instructions.