Abstract:
A system, method, and computer program product are provided for automated exploratory testing. In use, a plurality of actions to be performed as a test flow in an exploratory test associated with at least one testing project are identified. Additionally, a plurality of additional options are identified for each performed action of the plurality of actions of the test flow that are capable of being performed instead of one or more of the plurality of actions in the test flow. Further, a graph is generated showing all combinations of the plurality of first actions and the plurality of additional options as a possible scope of the exploratory test associated with the at least one testing project. In addition, the graph is modified based on received input, the received input identifying one or more test flows to execute as the exploratory test associated with the at least one testing project. Still yet, the exploratory test associated with the at least one testing project is automatically executed in accordance with the modified graph based on the received input. Moreover, a status of the automatic execution of the exploratory test associated with the at least one testing project is reported utilizing the graph.
Abstract:
A system, method, and computer program product are provided for limiting an impact of at least one internal network entity on a network function virtualization (NFV) based communication network hosting the network entity, the method including: providing a container including at least one borderline gateway, providing within the container at least one of internal network entity, where the internal network entity includes a software module, a virtual network function (VNF), and a VNF instance, and assigning the borderline gateway at least one protective limit, where NFV-based network includes at least one external network entity, the external network entity is external to the container, where the at least one internal network entity communicates with any of the external network entities only via the at least one borderline gateway, and where the borderline gateway is operative to use the protective limit to limit the impact on the NFV-based network.
Abstract:
A system, method, and computer program product are provided for segregated policy decision making in the context of network function virtualization orchestration in a communication network. In use, at least one orchestration task is identified to be performed by a Network Function Virtualization Orchestrator (NFV-O) associated with a communication network. Additionally, the at least one orchestration task is assigned to be performed by a network service planning module, the network service planning module functioning to assure the at least one orchestration task is acceptable based on an orchestration template. Further, a policy decision module is queried with contextual information associated with the at least one orchestration task, the policy decision module functioning to assure one or more business goals are considered based on the contextual information.
Abstract:
According to one aspect of the present invention there is provided a system, method, and computer program product for recovering from a network failure in a communication network using network function virtualization (NFV-based network), the method including: selecting a first network component of the NFV-based network, detecting at least one probable failure of the first network component, identifying at least one virtual network function (VNF) instance using the first network component, selecting a second network component to be used by same VNF for replacing the VNF instance in the first network component when the first network component is faulty, and securing at least one resource of the second network component for the VNF.
Abstract:
A system, method, and computer program product are provided for conditionally implementing protected content. In use, protected content is identified. Additionally, one or more elements associated with the protected content are verified. Further, the protected content is conditionally implemented, based on the verifying.
Abstract:
A system, method, and computer program product are provided for providing security in a Network Function Virtualization based (NFV-based) communication network. In operation, a security attack is identified. Additionally, a first hardware unit attacked by the security attack is identified. Further, a hardware unit in which to initiate a security defense software program is identified. Moreover, the security defense software program is initiated in the identified hardware unit.
Abstract:
A system, method, and computer program product are provided for preserving service continuity in a Network Function Virtualization based (NFV-based) communication network. In use, a first virtual network function (VNF) instance associated with a first VNF in a first hardware unit in a Network Function Virtualization based (NFV-based) communication network is identified. Additionally, a second VNF instance on a second hardware unit is instantiated, the second VNF instance being compatible with the first VNF instance. Further, communication directed to the first VNF instance is diverted to the second VNF instance on the second hardware unit, in response to initiating the second VNF instance on a second hardware unit.
Abstract:
A system, method, and computer program product are provided for utilizing an alternative Policy and Charging Rules Function (PCRF) node in a consumer telecommunications system. In use, an Sy session for a subscriber of a consumer telecommunications network is established, the Sy session being between a first PCRF node and an Online Charging System (OCS) node of the consumer telecommunications network. Additionally, the first PCRF node specifies an alternative PCRF node. Further, information associated with the Sy session is maintained at the alternative PCRF node. In addition, the first PCRF node is monitored and it is determined whether the first PCRF node is responsive to communication therewith. Responsive to determining that first PCRF node is not responsive to communication therewith, the Sy session is continued between the OCS node and the alternative PCRF node.
Abstract:
A system, method, and computer program product are provided for managing a shared quota for a plurality of network subscribers in a consumer telecommunications network. In use, an Sy interface session is established for a subscriber of a consumer telecommunications network, the Sy interface session being between a Policy and Charging Rules Function (PCRF) node and an Online Charging System (OCS) node of the consumer telecommunications network. Further, it is determined whether the subscriber is associated with any multi-subscriber shared usage counters on the consumer telecommunications network. Responsive to determining that the subscriber is associated with at least one multi-subscriber shared usage counter on the consumer telecommunications network, a reference to the at least one multi-subscriber shared usage counter is provided to the PCRF node by the OCS node. Additionally, the OCS node monitors the at least one multi-subscriber shared usage counter. Responsive to determining that a status of the at least one multi-subscriber shared usage counter has changed, a single Spending Status Notification Request (SNR) message is sent to the PCRF node, the single SNR message notifying the PCRF node that the status of the at least one multi-subscriber shared usage counter has changed. Responsive to the PCRF node receiving the single SNR message notifying the PCRF node that the status of the at least one multi-subscriber shared usage counter has changed, the PCRF node determines which open sessions on the consumer telecommunications network are associated with the at least one multi-subscriber shared usage counter. Furthermore, one or more policy changes to the open sessions are executed in accordance with the change to the at least one multi-subscriber shared usage counter.
Abstract:
A system, method, and computer program product are provided for proactively identifying and addressing customer needs. In use, at least one customer need for at least one customer is predicted, based, at least in part, on information associated with the one or more detected customer care request triggering events, information associated with the one or more customer care interactions, and information associated with the one or more after-effects.