Patent classifications
H04L41/5048
NETWORK SLICE INSTANCE PROVISIONING BASED ON A PERMISSIONED DISTRIBUTED LEDGER
A method and system for deployment of services for customers. Network service templates (NSTs) are determined, from a permissioned distributed ledger that is distributed between network operator systems of one or more network operators and customer systems. The NSTs include respective descriptions of network characteristics that provide respective logical networks. A subset of the NSTs and a corresponding subset of the network operator systems are selected based on a service description of the first service for deployment of the first service. Instantiation of the subset of the NSTs is requested on the corresponding subset of network operator systems as a subset of network slice instances to form the first service deployed for the first customer.
METHOD OF NETWORK SLICE RESOURCE ALLOCATION AND VISUALIZATION
The disclosure provides a method and a device for efficiently operating network slicing. According to the disclosure, a method of operating a first node configured to manage a network slice of a communication system includes: transmitting a service level agreement (SLA) range for each network slice subnet and a message requesting a resource according to the SLA range to a second node configured to manage the network slice subnet, receiving SLA arrangement flavor mapping relationship information in the network slice subnet unit from the second node, and identifying the SLA arrangement flavor mapping relationship in a network slice unit based on the received SLA arrangement flavor mapping relationship information in a network slice subnet unit.
METHOD AND DEVICE FOR PROVIDING NETWORK SLICE
The disclosure relates to a communication technique and a system thereof that fuse a 5th generation (5G) communication system with Internet of Things (IoT) technology to support a higher data transmission rate after a 4th generation (4G) system. The disclosure is applied to intelligent services (e.g., smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail, security and safety-related service, etc.) based on 5G communication technology and IoT-related technology. The disclosure is about telecommunication and 5G network slicing technology. A method for defining a network slice template (NST) to provide network slice, for generating a network slice instance (NSI), and a system for managing them are provided.
Service Action Guidance Engine (SAGE)
Novel tools and techniques are provided for implementing service diagnostics and provisioning via a service action guidance engine (“SAGE”). In various embodiments, SAGE may autonomously analyze data to identify any issues with provisioning one or more first services, among a plurality of services, to a first customer of a service provider. SAGE may autonomously identify one or more first automation actions from a plurality of automation actions to address at least one first issue identified based on the analysis, and may autonomously send one or more first instructions to one or more first automation bots, among a plurality of automation bots, to perform the identified one or more first automation actions. SAGE may also generate and present one or more guidance messages to call center users to guide interaction between customers and the call center users, based on analysis data associated with provisioning of services to the customers.
Dimensioning network services (NS)
A method and network node are provided for dimensioning a network service (NS). The method comprises calculating, based on given capacity requirements of the NS, a required number of virtual network functions component (VNFC) instances of each of a plurality of virtual network function (VNF) in the NS; selecting a VNF deployment flavor (VnfDf) for each of the plurality of VNFs in the NS, based on the calculated required number of VNFC instances; generating a network service deployment flavor (NsDf) including the selected VnfDfs; and onboarding a network service descriptor (NSD), which includes the NsDf, for use for instantiating the dimensioned NS.
Method, apparatus, and computer readable medium
A method includes creating a package of an application, registering the package with an orchestrator, triggering instantiation of the application in the orchestrator, generating initial configuration files for the instantiation of the application, changing an application state of the application to a planned state, changing the application state to a Keycloak state in response to obtaining client identification of the Keycloak information for the application, changing the application state to an instantiated state in response to deploying the application on the set of target servers, changing the application state to a configured state in response applying daily configuration files to perform daily configuration of the application in the set of target servers, and changing the application state to a monitored state in response to monitoring the application in the set of target servers by an observability framework tool.
Composable edge device platforms
Techniques discussed herein relate to providing composable edge devices. In some embodiments, a user request specifying a set of services to be executed at a cloud-computing edge device may be received by a computing device operated by a cloud computing provider. A manifest may be generated in accordance with the user request. The manifest may specify a configuration for the cloud-computing edge device. Another request can be received specifying the same or a different set of services to be executed at another edge device. Another manifest which specifies the configuration for that edge device may be generated and subsequently used to provision the request set of services on that device. In this manner, manifests can be used to compose the platform to be utilized at any given edge device.
Communication configuration selection
Apparatuses, methods, and systems are disclosed for communication configuration selection. One apparatus includes a receiver that receives configuration information for multiple communication configurations. The configuration information corresponds to services having different performance requirements, and the performance requirements include latency, reliability, peak data rate, efficiency overhead, control overhead, system capacity, or some combination thereof. The apparatus also includes a processor that selects a communication configuration of the multiple communication configurations. The apparatus communicates using the selected communication configuration.
TECHNIQUES FOR IMPLEMENTING ROLLBACK OF INFRASTRUCTURE CHANGES IN A CLOUD INFRASTRUCTURE ORCHESTRATION SERVICE
Techniques for implementing rollback of infrastructure changes in an infrastructure orchestration service are described. In certain examples, an infrastructure orchestration service is disclosed that manages both provisioning and deploying of infrastructure assets within a cloud environment. The service receives a plan comprising a set of instructions associated with a set of infrastructure assets of an execution target and identifies a first state of the set of infrastructure assets. The service executes the set of instructions in the plan to achieve a second state for the set of infrastructure assets. Based in part on the executing, the service receives a trigger for rolling back the plan to restore the set of infrastructure assets in the plan to the first state and executes a rollback plan for the plan. The service then transmits a result associated with the execution of the rollback plan.
Anomaly detection for automated information technology processes
Methods, systems, and computer-readable storage media for receiving a record including a set of attributes, each attribute having an attribute value, the record representing automatic execution of an IT process within a managed system, retrieving a model representing historical executions of the IT process and including a set of distribution parameters associated with a first type of attribute and a set of probability distributions associated with a second type of attribute, determining, for a first attribute, a first score based on distribution parameters and a value, determining, for a second attribute, a second score based on a probability distribution and a value, the second attribute being of the second type of attribute, and selectively indicating that the IT process is anomalous based on an outlier score.