H04L41/5058

INTUITIVE GRAPHICAL NETWORK MAPPING BASED ON COLLECTIVE INTELLIGENCE

In one embodiment, a method comprises: obtaining, by a process, path trace data collected by a plurality of performance monitoring agents across a computer network; obtaining, by the process, one or more catalogs having application-based correlation information for the path trace data; generating, by the process, network mapping directed graphs by correlating the path trace data using the one or more catalogs, the network mapping directed graphs logically comprising nodes categorized at a plurality of levels of aggregation and edges connecting the nodes; associating, by the process, test-based performance data with the edges of the network mapping directed graphs; and providing, by the process, at least one Sankey diagram based on the network mapping directed graphs and test-based performance data associated with their edges for selectable display by a user interface.

Discovery of network load balancers

A discovery application on a computing system is provided. The discovery application receives a user input, which is for discovery of resources associated with a cloud operating system of a cloud computing system. The user input includes an authentication credential and account information associated with the cloud operating system. Based on the received input, the discovery application executes a discovery pattern comprising operations for the discovery of resources. The cloud operating system includes a group of services to access such resources. At least one of the operations corresponds to an API call to an API endpoint associated with a service of the group of services. The discovery application receives a response to the API call from the cloud operating system. The response includes a payload of information associated with the resources. The discovery application updates, based on the received response, one or more configuration items in a configuration management database.

Information technology (IT) topology solutions according to operational goals

Disclosed are various examples for determining an IT topology for an enterprise IT organization based on operational goals of the enterprise organization. Visual models that are designed to facilitate responses associated with the current IT topology and operational goals of an enterprise IT organization are displayed to an entity of the enterprise. The entity can provide enterprise profile data to an IT solutions system by interacting with user interfaces. The IT solutions system can generate the IT topology prescription and roadmap for implementing the IT topology prescription based on the operational goals identified in the responses. Statements of work can be dynamically generated that outline details and terms of implementing the IT topology prescription for the enterprise IT organization.

System and method of using a global discovery service to enable routing of packets from a source container to a destination container

Systems, methods, and computer-readable storage media are provided to populate databases with routing data for containers to eliminate the need for continuously accessing a global discovery service. An example method includes initiating, from a source container operating on a first machine in a first rack, a communication with a destination container operating on a second machine on a second rack, wherein a local database on the first machine does not know an address of the destination container. The method includes accessing a global discovery service to provide the address of the destination container, populating the local database on the first machine with the address of the destination container and routing a packet from the source container to the destination container according to the address of the destination container.

Endpoint computing device multi-network slice remediation/productivity system

An endpoint computing device multi-network slice remediation/productivity system includes a core network system coupled to a RAN system and configured to allocate network slices and make them available for use in wireless communications via the RAN system. While operating in a pre-boot environment, an endpoint computing device determines that it is unable to transition to operating in a runtime environment and, in response, establishes a remediation network connection with a first network slice, and establishes a productivity network connection with a second network slice. While operating in a pre-boot environment and performing the remediation operations, the endpoint computing device then performs remediation operations via remediation wireless communications over the remediation network connection with the first network slice, and provides access to productivity application(s) that are configured to allow a user to perform productivity operations via productivity wireless communications over the productivity network connection with the second network slice.

Systems and methods for understanding identity and organizational access to applications within an enterprise environment

Methods and systems for understanding identity and organizational access to applications within an enterprise environment are provided. Exemplary methods include collecting data about relationships between applications and metadata associated with the applications in a computing environment of an enterprise, the metadata including information concerning a plurality of users accessing the applications; updating a graph database including nodes representing the applications of the computing environment of the enterprise and edges representing relationships between the applications; enriching the graph database by associating the nodes with metadata associated with the applications and associating user accounts with metadata associated with roles, organizations membership, privileges, and permissions; analyzing the graph database to identify a subset of nodes being accessed by a user of the plurality of users; and displaying, via a graphical user interface, a graphical representation of the subset of nodes and relationships between the nodes in the subset of the nodes.

Discovery of a Service-Providing Network Function

There is provided mechanisms for enabling discovery of a service-providing NF in a 3GPP communication network. A method is performed by a Network Repository Function. The method comprises registering locality information of service-providing NFs according to locality attribute of each service-providing NF. Each locality attribute comprises structured values of location information of its service-providing NF. The method comprises obtaining a request from a service-requesting NF for one of the service-providing NFs. The request specifies a preferred locality of the requested service-providing NF. The preferred locality indicates, in terms of structured values of location information, geographical location where the service-requesting NF is deployed. The method comprises identifying, out of the service-providing NFs, that service-providing NF which has a locality attribute that best matches the preferred locality, whereby the service-providing NF closest to the geographical location where the service-requesting NF is deployed is identified. The method comprises providing a response to the service-requesting NF. The response comprises the locality attribute of the identified service-providing NF, thereby enabling discovery of the service-providing NF.

Service enabler function

The present application describes a method and apparatus for updating a service in a service layer function of a network. In particular, a method for adding a service is disclosed. Initially, a request is received at a service enabler function located in the service layer function to add the service. A service description of the requested service is reviewed to understand its capabilities. A verification request is sent to a service capability located in the service layer function. Further, another service layer function or application is notified that the requested service is enabled.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR GENERATING AND USING NETWORK FUNCTION (NF) SET OVERLOAD CONTROL INFORMATION (OCI) AND LOAD CONTROL INFORMATION (LCI) AT SERVICE COMMUNICATIONS PROXY (SCP)

A method for generating and using network function (NF) set load information, the method includes, at a service communications proxy (SCP), receiving service based interface (SBI) requests from consumer NFs. The method further includes forwarding the SBI requests to producer NF instances that are members of an NF set. The method further includes receiving responses to the SBI requests from the producer NF instances. The method further includes determining NF instance load control information (LCI) for the producer NF instances using the responses. The method further includes computing, by the SCP and from the NF instance LCI for the producer NF instances, NF set LCI for the NF set. The method further includes communicating the NF set LCI for the NF set to at least one of the consumer NFs or using the NF set LCI for the NF set to select a producer NF instance within an NF set to provide a service for one of the consumer NFs.

Peer-to-peer relaying of discovery information

Certain aspects of the present disclosure relate to methods and apparatus for wireless communication, and more specifically to advertising discovery information, relaying discovery information, and to the secure relay of discovery information in wireless networks. Various frame structures are provided for such transmitting and relaying of discovery information. According to certain aspects of the present disclosure, security is provided for relaying discovery information. According to certain aspects of the present disclosure, compensation may be provided to a device that relays discovery information (e.g., when the relaying results in a transaction).