Abstract:
A system for topology state tracking includes a client device requesting network topology information, and a topology engine coupled to one or more network device. The topology engine includes at least one processor, and non-transitory computer readable media having encoded thereon computer software having a set of instructions executable by the at least one processor to perform one or more operations. The set of instructions includes instructions to receive state information associated with at least one network service, generate network topology information based on the state information, determine changes in the network topology for the at least one network service, update the network topology information, provide access to the network topology information by the client device, receive a request for network topology information from the client device, and transmit the network topology information to the client device.
Abstract:
Novel tools and techniques are provided for implementing network management layer configuration management. In some embodiments, a system might determine one or more network devices in a network for implementing a service arising from a service request that originates from a client device over the network. The system might further determine network technology utilized by each of the one or more network devices, and might generate flow domain information (in some cases, in the form of a flow domain network (“FDN”) object), using flow domain analysis, based at least in part on the determined network devices and/or the determined network technology. The system might automatically configure at least one of the network devices to enable performance of the service (which might include, without limitation, service activation, service modification, fault isolation, and/or performance monitoring), based at least in part on the generated flow domain information.
Abstract:
Novel tools and techniques are provided for implementing network management layer configuration management. In some embodiments, a system might determine one or more network devices in a network for implementing a service arising from a service request that originates from a client device over the network. The system might further determine network technology utilized by each of the one or more network devices, and might generate flow domain information (in some cases, in the form of a flow domain network (“FDN”) object), using flow domain analysis, based at least in part on the determined network devices and/or the determined network technology. The system might automatically configure at least one of the network devices to enable performance of the service (which might include, without limitation, service activation, service modification, fault isolation, and/or performance monitoring), based at least in part on the generated flow domain information.
Abstract:
Novel tools and techniques are provided for implementing network management layer configuration management. In some embodiments, a system might determine one or more network devices in a network for implementing a service arising from a service request that originates from a client device over the network. The system might further determine network technology utilized by each of the one or more network devices, and might generate flow domain information (in some cases, in the form of a flow domain network (“FDN”) object), using flow domain analysis, based at least in part on the determined network devices and/or the determined network technology. The system might automatically configure at least one of the network devices to enable performance of the service (which might include, without limitation, service activation, service modification, fault isolation, and/or performance monitoring), based at least in part on the generated flow domain information.
Abstract:
Novel tools and techniques might provide for implementing application, service, and/or content access control. Based at least in part on a consumer's choice of applications, services, content, and/or content providers—particular in exchange for a subsidy on content and/or network access fees provided to the consumer by chosen content providers—, a computing system may determine whether access to applications, services, and/or content not associated with the chosen content providers (“other content”) should be allowed or restricted. If restricted, the computing system might utilize various network access techniques and/or technologies to block the consumer's access to the other content, to allow access to the other content on a charge per access basis, or to allow access to the other content at reduced network access speeds. In some embodiments, an access provider (e.g., an Internet service provider, etc.) might perform both determination and implementation of content access and restriction.
Abstract:
Novel tools and techniques are provided for implementing network management layer configuration management. In some embodiments, a system might determine one or more network devices in a network for implementing a service arising from a service request that originates from a client device over the network. The system might further determine network technology utilized by each of the one or more network devices, and might generate flow domain information (in some cases, in the form of a flow domain network (“FDN”) object), using flow domain analysis, based at least in part on the determined network devices and/or the determined network technology. The system might automatically configure at least one of the network devices to enable performance of the service (which might include, without limitation, service activation, service modification, fault isolation, and/or performance monitoring), based at least in part on the generated flow domain information.
Abstract:
Novel tools and techniques provide for implementing community wireless communications service. In some embodiments, a network gateway device might receive, from a user device via a customer gateway device, a first request for wireless access to a network. If it determines that the user device is unassociated with the customer associated with customer gateway, the network gateway might send a second request with an identifier of the user device to a WiFi server, which might generate and send a login user interface (“UI”) to the user device. The user might send a response including a unique identifier, which the WiFi server might include in an access request to an authentication server. If authenticated by the authentication server, the WiFi server might send a care-of address (“COA”) request to the network gateway, which assigns the COA to the user device and provides the user device with wireless access to the network.
Abstract:
Novel tools and techniques that enable remote network monitoring, and in particular cases, remote monitoring of traffic on a L2VPN. In a particular aspect, tools enable a vendor-independent remote monitoring capability by allowing a port on to be spanned (mirrored) to a virtual local area network attachment circuit at two different provider edge devices. Such embodiments can allow test equipment located at one provider edge device to perform monitoring at another provider edge device without regard to conflicting monitoring protocols, interfaces, and/or the like.
Abstract:
Novel tools and techniques might provide for implementing application, service, and/or content access control. Based at least in part on a consumer's choice of applications, services, content, and/or content providers—particular in exchange for a subsidy on content and/or network access fees provided to the consumer by chosen content providers—, a computing system may determine whether access to applications, services, and/or content not associated with the chosen content providers (“other content”) should be allowed or restricted. If restricted, the computing system might utilize various network access techniques and/or technologies to block the consumer's access to the other content, to allow access to the other content on a charge per access basis, or to allow access to the other content at reduced network access speeds. In some embodiments, an access provider (e.g., an Internet service provider, etc.) might perform both determination and implementation of content access and restriction.
Abstract:
Novel tools and techniques that enable remote network monitoring, and in particular cases, remote monitoring of traffic on a L2VPN. In a particular aspect, tools enable a vendor-independent remote monitoring capability by allowing a port on to be spanned (mirrored) to a virtual local area network attachment circuit at two different provider edge devices. Such embodiments can allow test equipment located at one provider edge device to perform monitoring at another provider edge device without regard to conflicting monitoring protocols, interfaces, and/or the like.