Patent classifications
H04L41/0886
A METHOD OF DETERMINING LOCATION ADDRESSES OF NODE DEVICES IN A NETWORK OF NODE DEVICES AND SUCH A NODE DEVICE
A method of and a node device for determining location addresses of node devices (21, 22 . . . 26) of a network (10). The node devices (21, 22 . . . 26) are arranged along an elongated track (12) and geographically distanced from each other by an inter-node distance “d”. Each node device (21, 22 . . . 26) comprises a short range communication interface (20). A node device (22) receives a message (27) from an immediate neighbouring node device (21) having a known location address comprised in the message (27). The receiving node device (21) determines its own location address based on the location address received in the message (27). The receiving node device (22) then may transmit a further message (28) comprising its determined location address to a further node device (23), allowing the further node device (23) to determine its location address as well.
METHOD AND MODULE FOR MANAGING CLASSIFICATION CONFIGURATION FOR TRAFFIC IN SOFTWARE DEFINED NETWORK
A method and a classification configuration module for managing a classification configuration for traffic, related to a service, in a software defined network are disclosed. The classification configuration module receives the classification configuration from a service related module. The classification configuration includes a first indication indicating a traffic treatment for the traffic, and a second indication identifying the traffic to be treated according to the first indication for traffic treatment. The classification configuration module determines, based on the classification configuration, a set of traffic filters for use by a software defined network controlling module to determine a list of service functions implementing the traffic treatment for the traffic. The classification configuration module transmits information relating to the set of traffic filters to the software defined network controlling module.
System and method for optimizing network topology in a virtual computing environment
A computer network optimization methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature selection analysis performed thereon. Provided the feature selection analysis determines that features of the components are in frequent communication and generating network latency. Provided the feature selection analysis determines that features of the components are not well defined, a similarity analysis of the features is performed. Results of the feature selection methodology are generated, and the components involved in the network traffic latency are reassigned to migrate the latency.
Dynamic intent assurance and programmability in computer networks
In general, techniques are described for automatic intent provisioning and management in computer networks. A device comprising a processor, a memory, and an interface may perform the techniques. The processor may obtain a policy that includes high-level configuration data defining a service to be deployed within a network, the high-level configuration data including resource selector criteria that identifies one or more criteria for selecting a resource to support the service from a plurality of potential resources. The processor may also determine, based on the resource selector criteria, the resource to support the service from the plurality of potential resources, and translate the high-level configuration data to low-level configuration data specific to the determined resource. The memory may store the low-level configuration data specific to the determined resource. The interface may enable configuration, when provisioning the service, the determined resource using the low-level configuration data specific to the determined resource.
Configuration settings management in a network environment
A configuration resource automatically synchronizes configuration settings associated with one or more communication resources disposed in a respective subscriber domain. For example, a communication resource such as communication device operated by the subscriber initiates a change to configuration settings associated with a first communication resource disposed in a subscriber domain. The first communication resource notifies the auto-configuration resource of the new configuration settings applied to the first communication resource. The auto-configuration resource identifies one or more other communication resources disposed in the subscriber domain. To ensure synchronization of the communication resources in the subscriber domain, in response to receiving notification of the new configuration settings applied to at least one communication resource and the subscriber domain, the auto-configuration resource initiates modification of configuration settings associated with the one or more other communication resources in the subscriber domain.
Service Action Guidance Engine (SAGE)
Novel tools and techniques are provided for implementing service diagnostics and provisioning via a service action guidance engine (“SAGE”). In various embodiments, SAGE may autonomously analyze data to identify any issues with provisioning one or more first services, among a plurality of services, to a first customer of a service provider. SAGE may autonomously identify one or more first automation actions from a plurality of automation actions to address at least one first issue identified based on the analysis, and may autonomously send one or more first instructions to one or more first automation bots, among a plurality of automation bots, to perform the identified one or more first automation actions. SAGE may also generate and present one or more guidance messages to call center users to guide interaction between customers and the call center users, based on analysis data associated with provisioning of services to the customers.
Configuration change control for computing environments
Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.
Apparatus and method for network automation in wireless communication system
Disclosed is a 5.sup.th generation (5G) or a pre-5G communication system provided to support a higher data transmission rate than that of post-4.sup.th generation (4G) communication systems, such as long term evolution (LTE). A method of operating a network node in a wireless communication system is provided. The method includes receiving, from a plurality of first network nodes, network data, generating first recommendation operation information for a second network node based on the network data, and transmitting, to the second network node, a first analysis result message including the first recommendation operation information.
Automatic derivation of repository access data based on symbolic configuration
In an embodiment, a data processing method comprises detecting an approval of a change to an electronic configuration document that symbolically identifies one or more configurations of users, groups, and/or permissions relating to access to computer program artifacts that are stored in a first repository of a geographically distributed, replicated artifact repository system; the artifact repository system comprising one or more second repositories that are geographically remote with respect to the first repository and which replicate the first repository; in response to the detecting: obtaining the electronic configuration document and deriving, based on the electronic configuration document, a plurality of regional repository settings values for users, groups, and/or permissions relating to access to the computer program artifacts and for the one or more second repositories; transmitting the one or more settings values to the one or more second repositories and causing injection of the one or more settings values into one or more repository configuration settings of the second repositories.
Techniques for managing SCIM-compliant systems
The present disclosure describes techniques for using instances of a connector to communicate with multiple target systems without a manual pre-configuration step for each of the multiple target systems. The connector may be an extensible program-code-template for creating objects to perform one or more operations. For example, each instance of the connector may obtain information regarding a corresponding target system, determine an interface to the corresponding target system based on the information, and translate requests for the corresponding target system according to the interface.