Patent classifications
H04L41/0863
Automated incident triage and diagnosis
Techniques for automated incident triage and diagnosis are described. A method of automated incident triage and diagnosis may include receiving incident data associated with an incident, identifying one or more mitigation actions to resolve the incident using at least one machine learning model based at least on the incident data, and automatically executing the one or more mitigation actions to mitigate the incident.
Methods and network devices for detecting and resolving abnormal routes
The embodiments herein relate to a method in a network device. In one embodiment, there proposes a method in a network device, comprising: determining a classification to which a route belongs based on one or more classification criteria; determining, based on the classification to which the route belongs, a detection mechanism for detecting whether the route is an abnormal route; detecting whether the route is an abnormal route using the determined detection mechanism. With the embodiments herein, the abnormal routes, especially the black hole routes, can be automatically detected and resolved in real time.
UPGRADE OF NETWORK OBJECTS USING SECURITY ISLANDS
Systems and techniques to upgrade network objects using security islands are described herein. Security islands of node groupings are created based on trust relationships between nodes in an edge network. An upgrade request may be received to upgrade a target edge node in the edge network. Building blocks may be identified for a package installed on the target edge node to be upgraded. A state backup may be stored for the building blocks. An upgrade command and an upgrade payload may be transmitted to the target edge node. The target edge node may be queried to obtain a status of the target edge node. An upgrade action may be determined based on the status and the upgrade action may be executed.
System and method for managing clusters in an edge network
- Venkata Vamsi Krishna Kothuri ,
- Akshay Narayan Muramatti ,
- Anurag Choudhary ,
- Ashish Ramdas Mankar ,
- Nikita Vishwanath Shetty ,
- Sameer Narkhede ,
- Isha Singhal ,
- Matthew James Armstrong ,
- Prashant Batra ,
- Shi Shu ,
- Yiran Deng ,
- Zhuoran Li ,
- Mukesh Sohanlal Bafna ,
- Praveen Uday Bhaskara Pisipati ,
- Amarsinh Vijaysinh Patil ,
- Arvind Mohan
Various embodiments disclosed herein are related to an apparatus. In some embodiments, the apparatus includes a processor and a memory. In some embodiments, the memory includes instructions that, when executed by the processor, cause the apparatus to collect, at a cloud server, service data from a collector framework service of an edge network. In some embodiments, the memory includes instructions that, when executed by the processor, cause the apparatus to provide a configuration to the collector framework service based on the service data.
Management of IoT Devices in Wireless Communication Networks
Disclosed herein is a method of a network operator controller for managing a plurality of Internet of Things (IoT)-devices associated with an IoT device owner and connected to a wireless network. The method comprises receiving a list of IoT devices that are scheduled for a firmware update, wherein the list is indicative of respective update data and update procedure for each IoT device of the list; determining at least one network node serving a geographical area covering a respective location of each of the IoT devices of the list of devices; causing caching of the respective update data; determining an updating schedule indicative of when each IoT device is to receive its respective update data; and instructing the at least one network node to update the IoT devices with the cached respective update data according to the updating schedule and update procedure.
Testing virtualized network functions
According to a first aspect, there is provided a method of testing a plurality of virtual network functions (VNFs) during commissioning of the plurality of VNFs in a virtualized environment in a customer network, the method comprising: at a VNF testing component configured to have access to the virtualized environment of the customer network, performing interoperability testing between a first VNF component instantiation (VNFCI) within a first VNF of the plurality of VNFs and a second VNFCI within a second VNF of the plurality of VNFs, the second VNF being different from the first VNF, the first VNF and the second VNF comprising a subset of VNFs within the plurality of VNFs, wherein performing the interoperability testing comprises: instructing the first VNFCI to interoperate directly with the second VNFCI in a predetermined manner; and determining whether the second VNFCI reacts to the instructed direct interoperation in an expected manner.
INTERACTIVE GRAPHICAL MODEL-BASED CONFIGURATION CONTROL OF NETWORKED PHYSICAL ASSETS USING LOGICAL TRANSACTIONAL CONFIGURATION CHANGE RULES
Physical assets in a network are graphically modeled and controlled using a monitoring and control interface. Prior to committing configuration changes to the physical assets, the draft configuration changes are analyzed to determine if they violate any logical configuration change rules. The logical configuration rules can be model-based according to target physical asset(s) for the draft configuration changes. A logical configuration change rule violation can be graphically displayed on the monitoring and control interface. The configuration changes can be stored to debug the physical assets and to roll back the configuration of the physical assets to a prior state.
Grouping configuration-modifying transactions from collaborating agents
Systems, methods, and non-transitory computer-readable media for coordinating modifications to a network device configuration (config) are provided. A system, according to one implementation, includes a processing device and a memory device configured to store a computer program having instructions that, when executed, enable the processing device to create a collaboration group including a plurality of contributing members. Each contributing member is adapted to provide proposed changes to a configuration for defining operating parameters of a Network Element (NE) in a network. The contributing members are adapted to provide the proposed changes within a predetermined timeframe. The instructions further enable the processing device to consolidate the proposed changes from the plurality of contributing members into a batched transaction and commit the batched transaction as a unitary transaction to encode modifications associated with the proposed changes from the plurality of contributing members into the configuration.
Validating configuration changes on a network device
A technique to manage a configuration database (CDB) for a network device is disclosed. Network devices may receive a configuration change request as a configuration change object. To process that request, a current configuration CLI set representative of the current CDB may be generated. The network device creates a shadow CDB initially corresponding to the current CDB and processes the change request against the shadow CDB. An updated configuration CLI set may then be generated from the updated shadow CDB. A differential CLI set indicating the difference between the first CLI set and the second CLI set may be generated to represent a set of CLI commands to transition from one CDB to the other (e.g., implement the request). Authorization of the user to execute the CLI commands of the differential CLI dataset may be verified. Upon verification, the current CDB may be replaced with the updated shadow CDB.
System and method for delivering modular tools
A system and method are presented for delivering modular tools through a cloud-based remote computing environment. Users may create and customize extensions to the modular tools for integration with the product system without requiring change to product. Using a script tag added to a website, a user is able to install the modular tool to a website. The modular tool extensions are able to directly communicate with handlers and websites and are able to become directly integrated with a premises-based product. This may be done through a multiplexed API exposed to the modular tool extensions that directly couples them to the premises-based product. The modular tools are able to be configured in the premises-based product, however they are hosted in the cloud and as such, the premises-based product is able to receive continuous integration and deployment from the cloud.