Patent classifications
H04L41/0853
Mechanized modify/add/create/delete for network configuration
Techniques for mechanized modify/add/create/delete (MACD) for network configuration are provided. A method can include creating a data object from input data relating to a requested change to a target network configuration, the data object comprising a first parameter indicating a type of the requested change and a second parameter identifying the target network configuration; retrieving, from a repository according to a group of logical rules, executable instructions associated with the type of the requested change, as given by the first parameter of the data object, and the target network configuration, as given by the second parameter of the data object; and performing, further according to the group of logical rules, the requested change to the target network configuration, the performing of the requested change comprising executing the executable instructions retrieved from the repository.
Mechanized modify/add/create/delete for network configuration
Techniques for mechanized modify/add/create/delete (MACD) for network configuration are provided. A method can include creating a data object from input data relating to a requested change to a target network configuration, the data object comprising a first parameter indicating a type of the requested change and a second parameter identifying the target network configuration; retrieving, from a repository according to a group of logical rules, executable instructions associated with the type of the requested change, as given by the first parameter of the data object, and the target network configuration, as given by the second parameter of the data object; and performing, further according to the group of logical rules, the requested change to the target network configuration, the performing of the requested change comprising executing the executable instructions retrieved from the repository.
Method for updating policy information, network device and terminal device
Provided are a wireless communication method, a network device and a terminal device. The method includes: after acquiring a PSI parameter of a terminal device, a first network device determines whether to update policy information of the terminal device, wherein the PSI parameter is used for identifying a part of policy information for the terminal device under a subscribed user. In an implementation of the present disclosure, after acquiring a Policy Section Identifier (PSI) parameter of a terminal device, a first network device directly determines whether to update policy information of the terminal device.
Techniques for sharing device capabilities over a network of user devices
Techniques are disclosed for generating device cluster capability information for a cluster of devices in a network environment. Capability information can specify capabilities of the devices in the cluster. A first user device can generate device capabilities for the first user device and obtain device capabilities for other devices in the cluster. The first user device can generate cluster capability information providing an intersection of the first set of device capabilities and device capabilities of the other user devices in the cluster. The first user device can obtain cluster capability information for other clusters in the network environment and receive a request from a service user device to perform a specific task. The first user device can transmit cluster capability information relating to a selected cluster that corresponds with the request.
Using stability metrics for live evaluation of device classification systems and hard examples collection
In one embodiment, a label stability analyzer service receives classification data indicative of device type labels assigned to endpoints in a network by a device classification service. The label stability analyzer service counts device type label changes made by the device classification service to the endpoints. The label stability analyzer service computes variability metrics for the device type labels, wherein the variability metric for a device type label is based on a count of the device type label changes associated with that label. The label stability analyzer service determines, based on one of the variability metrics for a particular one of the device type labels exceeding a threshold value, a configuration change for the device classification service that adjusts how the device classification service applies the particular label to endpoints. The label stability analyzer service provides the configuration change to the device classification service.
Acceleration management node, acceleration node, client, and method
Embodiments of the present application provide an acceleration management node. The acceleration management node separately receives acceleration device information of all acceleration devices. The acceleration device information includes an algorithm type, an acceleration bandwidth or non-uniform memory access architecture (NUMA). The acceleration management node obtains an invocation request from a client. The acceleration management node queries the acceleration device information to determine, from all the acceleration devices of the at least one acceleration node, a target acceleration device matching the invocation request. The acceleration management node further instructs a target acceleration node to respond to the invocation request.
Machine-learning application proxy for IoT devices including large-scale data collection using dynamic servlets with access control
An apparatus and method for providing ML processing for one or more ML applications operating on one or more Internet of Things (IoT) devices includes receiving a ML request from an IoT device. The ML request can be generated by a ML application operating on the IoT device and include input data collected by the first ML application. A ML model to perform ML processing of the input data included in the ML request is identified and provided to an ML core for ML processing along with the input data included in the first ML request. The ML core produces ML processing output data based on ML processing by the ML core of input data included in the ML request using the ML model. The ML processing output data can be transmitted to the IoT device.
Automatic discovery of cloud-based infrastructure and resources
A discovery computing system may receive an account identifier (ID) and a set of credentials required to access a first service account. The discovery computing system may transmit a first API query to a remote computing system. The discovery computing system may receive an organization identifier (ID) of the organization from the remote computing system. The discovery computing system may further transmit a second API query to the remote computing system. The discovery computing system may be further configured to receive information about a set of projects, in the organization, from the remote computing system. The discovery computing system may further generate a set of service accounts and further determine the set of resources, in the remote computing system, associated with each of the generated set of service accounts. The discovery computing system may further store the determined set of resources, as configuration items in a persistent storage.
Automatic discovery of cloud-based infrastructure and resources
A discovery computing system may receive an account identifier (ID) and a set of credentials required to access a first service account. The discovery computing system may transmit a first API query to a remote computing system. The discovery computing system may receive an organization identifier (ID) of the organization from the remote computing system. The discovery computing system may further transmit a second API query to the remote computing system. The discovery computing system may be further configured to receive information about a set of projects, in the organization, from the remote computing system. The discovery computing system may further generate a set of service accounts and further determine the set of resources, in the remote computing system, associated with each of the generated set of service accounts. The discovery computing system may further store the determined set of resources, as configuration items in a persistent storage.
Telemetry-based network switch configuration validation
Methods, apparatuses, and computer program products for telemetry-based network switch configuration validation are disclosed. An analytics engine captures a first network snapshot including telemetry data received from one or more network switches in a first state. Upon receiving a notice indicating that a network configuration change has been applied, the analytics engine initiates a timer in response to receiving the notice. The analytics engine captures, in response to expiration of the timer, a second network snapshot including telemetry data received from the one or more network switches in a second state and compares the first network snapshot and the second network snapshot. In dependence upon the comparison of the first network snapshot to the second network snapshot, the analytics engine validates the network configuration change.