Abstract:
Novel tools and techniques are provided for implementing network experience shifting using shared objects. In various embodiments, a network node in a first network might receive, via a first network access device (“NAD”) in a second network, a request from a first user device to establish roaming network access, a first user being associated with a second NAD in the first network and being unassociated with the first NAD. The network node might authenticate the first user, receive customer network telemetry data regarding visited LAN associated with the first NAD via a gateway API, receive service provider network telemetry data via a network API, determine whether the first user is associated with (and authorized to access services accessible by) the second NAD. If so, the network node might configure the visited LAN and/or the first NAD to simulate the interface environment of the user's home LAN and/or the second NAD.
Abstract:
Novel tools and techniques might provide for implementing applications management, based at least in part on operations, administration, and management (“OAM”) information. A host computing system might comprise a dedicated OAM management agent. While normal application frame flow might be sent or received by VMs running on the host computing system, OAM frame flow might be sent or received by the OAM management agent, which might also serve as an OAM frame generator. Alternatively, or additionally, based on a determination that at least one OAM frame has changed (in response to a change in address of far-end and/or near-end OAM server functions), the OAM management agent might update a list associating the at least one OAM frame that has changed with corresponding at least one VM of the one or more VMs, without restarting any of the at least one VM, the OAM management agent, and/or the host computing system.
Abstract:
When the physical network is transitioned into a virtual network, functionality provided by physical ports are no longer available in the virtual machine (“VM”) environments. Physical to virtual network transport function abstraction may be implemented to provide software applications running in the VM with state information or similar information necessary for the software applications to continue running, without the physical ports that would provide such information in a physical system. In some embodiments, a virtual machine manager might send first information to a virtual infrastructure manager, which might send second information to a virtualized application manager or orchestrator. The virtualized application manager or orchestrator might in turn send third information to a virtualized application running in a virtual machine or container. The first, second, and/or third information might include state information (e.g., state change information) that enable software applications running in the VM to continue running, without physical ports.
Abstract:
The disclosed embodiments include a system and method for monitoring performance of a packet network. In one embodiment, a method includes collecting network performance information from a plurality of network nodes of a packet network, the network performance information being indicative of a health of the network packet network. The method includes storing the network performance information collected from the plurality of network nodes and generating a graphical user interface including a graphical representation of the network performance information, wherein the graphical representation of a network segment is indicated as a line, and wherein a width of the line widens and narrows in accordance with an amount of traffic flow over the network segment.
Abstract:
Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment, the method includes storing policy information for machine to machine communications in a global DNS registry database server. The method further includes communicating the policy information for machine to machine communications from the global DNS registry database server to a machine DNS registry server located in an Internet service provider (ISP) network, wherein a control signaling gateway located in the ISP network is configured to utilize the policy information for machine to machine communications to allow only registered controllers associated with a machine to communicate with the machine.
Abstract:
A system for a searchable best fit abstraction framework includes a network having one or more network resources, a network inventory server programmed to generate a network inventory of the one or more network resources, and a searchable best fit abstraction engine in communication with the network inventory server. The searchable best fit abstraction engine includes at least one processor, and non-transitory computer readable media having encoded thereon computer software comprising a set of instructions executable by the at least one processor. The set of instructions includes instructions to retrieve the network inventory, instantiate an inventory class object for at least one network resource, define a set of service abstractions for the inventory class object, provide customer and service provider facing interfaces, and provision at least one service offering satisfying a customer service requirement, or as defined by a service template.
Abstract:
When the physical network is transitioned into a virtual network, functionality provided by physical ports are no longer available in the virtual machine (“VM”) environments. Physical to virtual network transport function abstraction may be implemented to provide software applications running in the VM with state information or similar information necessary for the software applications to continue running, without the physical ports that would provide such information in a physical system. In some embodiments, a virtual machine manager might send first information to a virtual infrastructure manager, which might send second information to a virtualized application manager or orchestrator. The virtualized application manager or orchestrator might in turn send third information to a virtualized application running in a virtual machine or container. The first, second, and/or third information might include state information (e.g., state change information) that enable software applications running in the VM to continue running, without physical ports.
Abstract:
Novel tools and techniques for Internet service providers to enable enhanced user control over content delivery. In an aspect of certain embodiments, these tools can allow the customer to select, on a variety of different bases, whether content should be obtained from the Internet or from a lower-cost source, such as a metropolitan content delivery network (“CDN”) operated by the ISP or a private peering connection with a content source. Both of these options can, for example, avoid accessing content over the Internet and thus can reduce ISP delivery costs. In some embodiments, these cost reductions can be passed to the consumer in the way the ISP accounts for the content delivery.
Abstract:
A system and method for tracking a line rate utilization. An effective throughput is measured for a data stream during a time period. A number of frames in the data stream is counted during the time period. A line rate utilization is determined for the data stream utilizing the number of frames and a size of the frames in response to the time period ending. The line rate utilization is save for communication to one or more users. The line rate utilization is communicated to one or more users.
Abstract:
Novel tools and techniques might provide for implementing customer-based Internet of Things (“IoT”)-transparent privacy functionality. Various methods, systems, and apparatuses might provide connectivity between a network interface device (“NID”) and each of one or more first user devices of a plurality of user devices associated with the customer premises and/or a user who is associated with the customer premises. In some cases, at least one virtual network function (“VNF”) might be sent to each of the one or more first user devices. The NID might restrict, in some cases using the VNF, access by a third party to the information regarding the at least one portion of the at least one of one or more first user devices connected to the network or one or more applications running on one or more first user devices connected to the network.