H04L41/0856

METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR BACKUP ASSIGNMENT OF A MOBILE ELECTRONICS DEVICE

A method, system and computer program product for backup assignment of a mobile electronics device is disclosed. In response to one or more device assignment requests received by a controller apparatus when a server is operating in an off-line mode, one or more device assignment records are created within the controller apparatus, and which indicate assignment of the at least one mobile electronics device to a respective one or more users. When the server is operating in an off-line mode such that communication between the controller apparatus and the server is off-line, the one or more device assignment records, in relation to the at least one mobile electronics device, are stored in the controller apparatus. In response to the server re-entering the on-line mode, the server is updated with the one or more device assignment records.

Automatic discovery of cloud-based infrastructure and resources

A discovery computing system may receive an account identifier (ID) and a set of credentials required to access a first service account. The discovery computing system may transmit a first API query to a remote computing system. The discovery computing system may receive an organization identifier (ID) of the organization from the remote computing system. The discovery computing system may further transmit a second API query to the remote computing system. The discovery computing system may be further configured to receive information about a set of projects, in the organization, from the remote computing system. The discovery computing system may further generate a set of service accounts and further determine the set of resources, in the remote computing system, associated with each of the generated set of service accounts. The discovery computing system may further store the determined set of resources, as configuration items in a persistent storage.

Peer-level control of industrial automation system components

Embodiments of this present disclosure may include a system that includes a first network device. The first network device may perform an operation according to a device configuration file. The system may also include a second network device that directly communicatively couples to the first network device through a peer-to-peer (P-P) communication network. The second network device may include a backup file of the device configuration file. The second network device may transmit the backup file of the device configuration file to the first network device in response to detecting that the first network device is lacking the device configuration file.

Predictive pipeline analytics for a network management system

A controller device includes a memory and one or more processors coupled to the memory. The memory stores instructions that, when executed, cause the one or more processors to receive a query indicating a first time and a network service, determine a first set of configuration elements using telemetry data associated with the first time and the network service, and determine a second set of configuration elements using an intent model. The instructions further cause the one or more processors to determine one or more first metrics that occur at the first time using the first set of configuration elements and the second set of configuration elements, determine one or more second metrics at a second time using telemetry data received from the plurality of network devices, and generate data representing a user interface presenting the one or more first metrics and the one or more second metrics.

Monitoring system and method for connecting a monitoring device to a service server
11595351 · 2023-02-28 · ·

Methods for configuring a monitoring device to communicate with a service server are provided. The method includes the monitoring device sending a message including a code used for authentication of the monitoring device to a control server, receiving one or more addresses of a service server associated with the monitoring device from the control server in response to the monitoring device being authenticated by the control server, storing the one or more addresses retrieved by the control server, and establishing a connection between the monitoring device and the service server using at least one of the one or more addresses received from the control server.

TRANSFORMING EVENT DATA USING REMOTE CAPTURE AGENTS AND TRANSFORMATION SERVERS
20180006911 · 2018-01-04 ·

The disclosed embodiments provide a method and system for processing network data. During operation, the system obtains, at a remote capture agent, configuration information for the remote capture agent from a configuration server over a network. Next, the system uses the configuration information to configure the generation of event data from network data obtained from network packets at the remote capture agent. The system then uses the configuration information to configure transformation of the event data or the network data into transformed event data at the remote capture agent.

Cloud Assisted Behavioral Automated Testing
20180007175 · 2018-01-04 ·

A computer readable storage medium, system and method for improving automated testing systems to include a first and second behavioral data. The first behavioral data is collected periodically and the second behavioral data is collected in real time. The receipt of the first behavioral data and a second behavioral data are followed by the receipt of a system configuration template. A test case is updated based on the first and second behavioral data, and an automated test environment is reconfigured based on the first behavioral data, second behavioral data, and the system configuration template. The test executes in the automated test environment producing a test result.

INFORMATION SYSTEM, CONTROL SERVER, VIRTUAL NETWORK MANAGEMENT METHOD, AND PROGRAM
20180013626 · 2018-01-11 ·

A control apparatus, includes a first unit configured to be capable of specifying an identification rule to identify a packet based on a user of a virtual network including a plurality of virtual nodes; and a second unit configured to be capable of sending an instruction to a physical node corresponding to each of the virtual nodes of the virtual network, wherein each of the virtual nodes includes a predetermined network function being capable of providing a first packet operation to the packet, wherein the instruction includes that the physical node provides a second packet operation to the packet so as to emulate the first packet operation.

Deploying a network management controller in an existing data center fabric

Some organizations have a deployed and functional “controllerless” EVPN VxLAN Fabric in their data centers. Eventually, however, the organization may deploy a controller within the network. In one example, this disclosure describes a method that includes configuring a controller to communicate with each of a plurality of elements in a network; determining, by the controller, an initial operational state of the network; translating, by the controller, the initial operational state of the network to an intent-based configuration; pushing, by the controller, the intent-based configuration to the network to reconfigure each of the plurality of elements in the network in a manner consistent with the intent-based configuration; determining, by the controller and after pushing the intent-based configuration, an updated operational state of the network; and comparing, by the controller, the initial operational state of the network with the updated operational state of the network.

Stable References for Network Function Life Cycle Management Automation

A persistent version-controlled is provided the enables automated configuration of VNFs/CNFs following deployment or re-deployment of VNF/CNF instances throughout the life cycle of the VNFs/CNFs. Immutable copies of NF configurations for a VNF/CNF are stored in the version controlled data storage 100. Multiple versions of a NF configuration can be associated with a common configuration reference (e.g., URL). Metadata associated with the different versions of a NF configuration indicates which of two or more different versions is the current version. The collection of different versions of a NF configuration associated with the same stable reference provide a complete history of the NF configuration, thus allowing rollback to any previous version of the NF configuration by simply modifying the metadata to mark that version as the current version. If a VNF/CNF needs to be re-deployed, the same configuration reference used during the initial deployment is used to download the most recent version of the NF configuration based on the metadata.