Access constructs for cloud orchestration

    公开(公告)号:US10601641B2

    公开(公告)日:2020-03-24

    申请号:US14919208

    申请日:2015-10-21

    Abstract: Novel tools and techniques might provide for implementing access constructs for a network, and, in some cases, for implementing access constructs for cloud orchestration. In some embodiments, a network might provide connectivity between a first access node(s) in the network and a hardware node(s) or between two or more first access nodes, via a corresponding first link(s). An apparatus, such as one disposed at an orchestration node or the like in the network, might bridge a second access node over one or more of at least one first access node or at least one first link (“bridge node or link”), and might roll service over to the second access node from the bridged node or link. Based on a determination that failure has occurred during service through the second access node, the apparatus might roll service back over to the bridged node or link, from the second access node.

    Method and system for implementing intent-based service configuration, service conformance, and service auditing

    公开(公告)号:US10469407B2

    公开(公告)日:2019-11-05

    申请号:US16277498

    申请日:2019-02-15

    Abstract: Novel tools and techniques are provided for implementing intent-based service configuration, conformance, and auditing. In various embodiments, a computing system might receive a request for network services from a customer, the request for network services comprising desired characteristics and performance parameters for the requested network services, without information regarding specific hardware, hardware type, or network for providing the requested services. The computing system might analyze first metadata regarding resource attributes and characteristics of unassigned network resources to identify network resources among unassigned network resources for providing the requested network services, the first metadata having been striped to entries of the unassigned network resources in resource database(s). Based on the analysis, the computing system might allocate identified network resource(s) for providing the requested network services, and updating a service database by adding or updating an entry in the service database with information indicating that the identified network resource(s) have been allocated.

    Ethernet carrier group alarm (CGA)
    153.
    发明授权

    公开(公告)号:US10389577B2

    公开(公告)日:2019-08-20

    申请号:US14460085

    申请日:2014-08-14

    Abstract: Novel tools and techniques for providing network state information to customer equipment. In some embodiments, an operations, administration, and management (“OAM”) server might determine a status of a network connection between at least two network devices, might generate state information indicating the determined status of the network connection, and might send the state information to one or more customer equipment, using in-band signaling over a band between the at least two network devices. The state information might include one or more alarms that indicate one or more of a receive path error, a transmit path error, or a performance issue error (which might indicate at least one of jitter, delay, frame loss, peak actual throughput, or average actual throughput). The OAM server might be disposed or embodied within at least one of a customer equipment, a user network interface device, a network interface device, or a server over a network.

    Customer based internet of things (IOT)—transparent privacy functionality

    公开(公告)号:US10375172B2

    公开(公告)日:2019-08-06

    申请号:US14946548

    申请日:2015-11-19

    Abstract: Novel tools and techniques might provide for implementing customer-based Internet of Things (“IoT”)—transparent privacy functionality. Various methods, systems, and apparatuses might provide connectivity between a network interface device (“NID”) and each of one or more first user devices of a plurality of user devices associated with the customer premises and/or a user who is associated with the customer premises. In some cases, at least one virtual network function (“VNF”) might be sent to each of the one or more first user devices. The NID might restrict, in some cases using the VNF, access by a third party to the information regarding the at least one portion of the at least one of one or more first user devices connected to the network or one or more applications running on one or more first user devices connected to the network.

Patent Agency Ranking