Abstract:
The disclosed technology is directed towards locating Internet Protocol version 4 (IPv4) address blocks that are not supernets to subnet address blocks. A list of IPv4 address blocks is first processed to determine supernet/subnet relationships across octets, to remove the supernets and provide a reduced list. The reduced list is iteratively processed in descending prefix length order to identify candidate supernets at each prefix length, determine which of the candidate supernets are actual supernets, remove the actual supernets, and move the remaining candidates to a leaf list. At the end of the iterations, the leaf list contains the IPv4 address blocks that do not have subnets (are not supernets).
Abstract:
Aspects of the subject disclosure may include, for example, identifying a threshold value of a streaming-media key performance indicator (KPI) based on a predetermined target portion of end-user devices that provide an acceptable performance. Performance records are obtained for a content delivery network (CDN) adapted to cache and serve media content requested by the end-user devices. Predicted values of the streaming-media KPI are generated according to the performance records of the CDN and compared to the threshold value of the streaming-media KPI to obtain a comparison. An anomaly is detected according to the comparison, to indicate that a predetermined number of the predicted values of the streaming-media KPI fail to satisfy the threshold value. Other embodiments are disclosed.
Abstract:
The disclosed technology is directed towards locating and counting unused nodes, such as free Internet Protocol version 4 (IPv4) address blocks. A hierarchical structure of nodes is created from an origin block to a specified lower level, and the hierarchical structure is processed using mapping and eliminating to locate free nodes. A first node group comprises node(s) in use, a second node group identifies intermediate subnets between the first node of the first node group and the specified origin block, and a third node group identifies any subnets hierarchically below node(s) in use. Unused (free) node count information is obtained based on nodes below the origin block that are not in the first node group, the second node group, or the third node group.
Abstract:
Aspects of the subject disclosure may include, for example, identifying a threshold value of a streaming-media key performance indicator (KPI) based on a predetermined target portion of end-user devices that provide an acceptable performance. Performance records are obtained for a content delivery network (CDN) adapted to cache and serve media content requested by the end-user devices. Predicted values of the streaming-media KPI are generated according to the performance records of the CDN and compared to the threshold value of the streaming-media KPI to obtain a comparison. An anomaly is detected according to the comparison, to indicate that a predetermined number of the predicted values of the streaming-media KPI fail to satisfy the threshold value. Other embodiments are disclosed.
Abstract:
A method and apparatus for enabling prioritization of signaling messages in a communication network are disclosed. For example, the method receives at least one signaling message, and classifies each of the at least one signaling message. The method schedules each of the at least one signaling message for processing, and discards selectively one or more signaling messages that have been scheduled under an overload condition.
Abstract:
Preemptive based radio access control is facilitated. Queue data is received, wherein the queue data corresponds to a set of requests for highly prioritized communications included on a prioritized queue. The queue data is used to determine whether a set of conditions for involuntarily terminating a radio communication session has been met. Session data corresponding to characteristics for each of a plurality of radio communication sessions are also received and utilized to determine which of the plurality of radio communication sessions to terminate if the set of conditions for involuntarily terminating a radio communication session have been met.
Abstract:
Preemptive based radio access control is facilitated. Queue data is received, wherein the queue data corresponds to a set of requests for highly prioritized communications included on a prioritized queue. The queue data is used to determine whether a set of conditions for involuntarily terminating a radio communication session has been met. Session data corresponding to characteristics for each of a plurality of radio communication sessions are also received and utilized to determine which of the plurality of radio communication sessions to terminate if the set of conditions for involuntarily terminating a radio communication session have been met.