Abstract:
A system and method for performing session initiation protocol testing. A trigger is received to initiate a test between an initiating measurement agent and a target measurement agent. A determination is made whether the initiating measurement agent is configured to perform the test. A determination is made whether the target measurement agent is configured to perform the test. The testing is performed between the initiating measurement agent and the target measurement agent in response to determining the initiating measurement agent and the target measurement agent are configured to perform the test.
Abstract:
A system, method, and server for distributing content. The system includes a number of servers in communication with the Internet and configured to provide subscribers of the communications service provider with access to content stored on the number of servers without having to access external networks including the Internet. The system further includes a remote content management application operating on at least one of the number of servers and configured to provide content providers with: (1) digital rights management (DRM) and (2) guaranteed quality of service (QoS) to the subscribers of the communications service providers, wherein the content providers establish the DRM and the QoS.
Abstract:
A system, computer implemented method, and server for measuring compliance with a SLA. The system includes a server operable to communicate with a number of UNIs. The system further includes a network operable to communicate packets between the server and the number of UNIs. The server includes an application engine operable to determine that the network is noncompliant with the SLA in response to the determined frame loss and further in response to a determination that a committed information rate (CIR) has not been exceeded, and the monitoring device being further operable to log the network is noncompliant with the SLA.
Abstract:
The disclosed embodiments include a computer-implemented method for controlling network communications. In one embodiment, the method executes instructions, using a processor, to perform operations comprising: communicating with a first set of network communications devices of a first packet network; receiving and storing in memory network performance information associated with the first set of network communications devices; initiating routines on a second set of network communications devices of a second packet network of a second communications carrier for determining network performance information associated with the second packet network; storing the network performance information associated with the second set of network communications devices; determining an operational status of a network node within the second packet network based on the stored network performance information; and controlling network communications of data packets over node segments of the first packet network and the second packet network based on the stored network performance information.
Abstract:
Novel tools and techniques are provided for implementing customer resource telemetry and use as a service. In various embodiments, a computing system might receive, from a user, a request to access at least one network-accessible resource associated with a customer of a service provider, the user being unassociated and unrelated with the customer; might identify at least one of a user identification, a company, or a class of user associated with the user; might determine whether at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, based on the identification. If so, the computing system might provide the user with access to the at least one network-accessible resource associated with the customer. If not, the computing system might deny, to the user, access to the at least one network-accessible resource associated with the customer.
Abstract:
Novel tools and techniques are provided for implementing customer resource telemetry and use as a service. In various embodiments, a computing system might receive, from a user, a request to access at least one network-accessible resource associated with a customer of a service provider, the user being unassociated and unrelated with the customer; might identify at least one of a user identification, a company, or a class of user associated with the user; might determine whether at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, based on the identification. If so, the computing system might provide the user with access to the at least one network-accessible resource associated with the customer. If not, the computing system might deny, to the user, access to the at least one network-accessible resource associated with the customer.
Abstract:
Novel tools and techniques are provided for implementing network application programming interface (“API”), and, more particularly, API to provide network metrics and network resource control to users. In some embodiments, a computing system might receive customer network telemetry data from a first network via a gateway API, might receive service provider network telemetry data from a second network(s) via a network API, might compile the customer network telemetry data and the service provider network telemetry data, might receive a request from a user to access information regarding network services associated with the user, might filter the compiled customer network telemetry data and the compiled service provider network telemetry data to isolate first telemetry data and second telemetry data, respectively, might provide the user with access to at least one of the first telemetry data or the second telemetry data, and might provide the user with options to control network resources.
Abstract:
Novel tools and techniques are provided for implementing routing of network traffic across one or more network nodes or utilization of the one or more network nodes based on one or more demand classifications and/or based on detection of a trigger event associated with the one or more demand classifications. In some embodiment, a computing system might monitor network traffic across one or more network nodes or utilization of the one or more network nodes, the network traffic being routed based on a first demand classification. The computing system might determine whether at least one trigger event associated with a second demand classification has occurred. If so, the computing system might adjust the routing of the network traffic across the one or more network nodes or adjust the utilization of the one or more network nodes, based at least in part on the second demand classification.
Abstract:
Novel tools and techniques might provide for implementing applications management, based at least in part on operations, administration, and management (“OAM”) information. A host computing system might comprise a dedicated OAM management agent. While normal application frame flow might be sent or received by VMs running on the host computing system, OAM frame flow might be sent or received by the OAM management agent, which might also serve as an OAM frame generator. Alternatively, or additionally, based on a determination that at least one OAM frame has changed (in response to a change in address of far-end and/or near-end OAM server functions), the OAM management agent might update a list associating the at least one OAM frame that has changed with corresponding at least one VM of the one or more VMs, without restarting any of the at least one VM, the OAM management agent, and/or the host computing system.
Abstract:
When the physical network is transitioned into a virtual network, functionality provided by physical ports are no longer available in the virtual machine (“VM”) environments. Physical to virtual network transport function abstraction may be implemented to provide software applications running in the VM with state information or similar information necessary for the software applications to continue running, without the physical ports that would provide such information in a physical system. In some embodiments, a virtual machine manager might send first information to a virtual infrastructure manager, which might send second information to a virtualized application manager or orchestrator. The virtualized application manager or orchestrator might in turn send third information to a virtualized application running in a virtual machine or container. The first, second, and/or third information might include state information (e.g., state change information) that enable software applications running in the VM to continue running, without physical ports.