Abstract:
Novel tools and techniques are provided for implementing Internet of Things (“IoT”) functionality. In some embodiments, a processor might receive sensor data from a plurality of sensors of a first IoT-capable device, and might analyze the sensor data to determine whether to send the sensor data to at least one of second IoT-capable devices or user devices, each associated with the user of the first IoT-capable device, and/or to at least one of third IoT-capable devices associated with one or more third party groups. Based on a determination to send the sensor data to at least one of the second IoT-capable devices associated with the user, the user devices associated with the user, and/or the third IoT-capable devices associated with third party group(s), the processor might send the sensor data to the at least one of the second IoT-capable devices, the user devices, and/or the third IoT-capable devices.
Abstract:
Novel tools and techniques might provide for implementing application, service, and/or content access control. Based at least in part on a consumer's choice of applications, services, content, and/or content providers—particular in exchange for a subsidy on content and/or network access fees provided to the consumer by chosen content providers—, a computing system may determine whether access to applications, services, and/or content not associated with the chosen content providers (“other content”) should be allowed or restricted. If restricted, the computing system might utilize various network access techniques and/or technologies to block the consumer's access to the other content, to allow access to the other content on a charge per access basis, or to allow access to the other content at reduced network access speeds. In some embodiments, an access provider (e.g., an Internet service provider, etc.) might perform both determination and implementation of content access and restriction.
Abstract:
Novel tools and techniques that can provide wireless service for multiple service providers from a single, multi-service provider wireless access point. In an aspect, a multi-service provider wireless access point might communicate with a plurality of wireless devices, each associated with a different wireless carrier, and route communications from each device to the appropriate carrier (and/or, similarly, transmit communications from each carrier to the appropriate wireless device). In this way, for example, a single wireless access point could provide service to cellphones of subscribers of a number of different carriers. Such a wireless access point can provide enhanced efficiency and reduced cost, along with the ability to provide higher service for a number of wireless carriers.
Abstract:
Novel tools and techniques are provided for testing a data connection (e.g., network connection and/or packet-based service connection) and determining a performance condition of the data connection. The data connection may depend on conditions of an access network and/or a local area network. In some embodiments, a local performance test device may be in communication with an access network and/or a local area network. The local performance test device may receive a request to test the access network and/or the local area network. The local performance test device may further be configured to analyze the access network and/or the local area network to determine whether a data connection issue is occurring on the access network and/or the local area network. Once the local performance test device determines where a performance issue is occurring, the local performance test device may send the result of the test to a requesting device.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
Novel tools and techniques might provide for implementing customer-based Internet of Things (“IoT”) functionality. Various methods, systems, and apparatuses might provide connectivity between a network interface device (“NID”) and each of one or more first user devices of a plurality of user devices associated with the customer premises and/or a user who is associated with the customer premises. At least one virtual network function (“VNF”) might be sent to each of the one or more first user devices. Each of the one or more first user devices might be mapped with each of one or more second user devices of the plurality of user devices associated with at least one of the customer premises or the user who is associated with the customer premises, and with each resource node of a plurality of resource nodes in communication with the NID, based at least in part on user input.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based in part on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
Novel tools and techniques are provided for implementing network enhanced gateway functionality, and, in particular embodiments, for implementing network enhanced gateway functionality using network functions virtualization (“NFV”) and/or software defined networks (“SDNs”). In some embodiments, a network switch, which is disposed within a gateway device, might route network traffic to a host computing system, at least a portion of the network traffic being originally directed to a client device via a corresponding client port among a plurality of client ports. Based at least in part on one or more characteristics of the at least a portion of the network traffic, the host computing system selects one or more virtual network functions (“VNFs”), which are then sent to the host computing system via the network switch. According to some embodiments, the network switch and the host computing system are under control of a NFV entity and/or a SDN controller.
Abstract:
Novel tools and techniques might provide for implementing extension of customer local area networks (“LANs”) and/or implementing isolated service overlays over a network. In some embodiments, a network service point that is located external to a demarcation point at each of a plurality of customer premises might establish a connection between a service provider network and a customer LAN, which has already been established within a customer premises. The system subsequently extends the customer LAN, via this connection, to span between the network service point and the customer premises. Alternatively, or additionally, the system might establish two or more isolated service overlays across the customer LAN between the network service point and the customer premises, each of the two or more isolated service overlays having network traffic that is isolated from network traffic transmitted along another of the two or more isolated service overlays.
Abstract:
Methods and systems are disclosed for enabling installation of antennas in a cost effective and efficient manner. The methods and systems disclosed herein provide a hollow pole and an elevating mechanism, wherein the elevating mechanism can be used to position antenna equipment located in one or more capsules attached to the elevating mechanism. The antenna equipment may be attached to a removable power source located in the capsule or to a non-removable power source located at the base of the hollow pole. Additionally, the antenna equipment may also be attached to communications equipment adapted to communicate with one or more communications networks. In an embodiment disclosed herein, the capsules may be adapted to rotate around a one or more axis in response to received commands and/or in accordance with instructions stored on a memory module attached to the capsules.