Abstract:
Novel tools and techniques might provide for implementing interconnection gateway and/or hub functionalities between two or more network functions virtualization (“NFV”) entities that are located in different networks. In some embodiments, a NFV interconnection gateway (“NFVIG”) might receive a set of network interconnection information from each of two or more sets of NFV entities, each set of NFV entities being located within a network separate from the networks in which the other sets of NFV entities are located. The NFVIG might be located in one of these networks. The NFVIG might abstract each set of network interconnection information, and might establish one or more links between the two or more sets of NFV entities, based at least in part on the abstracted sets of network interconnection information. The NFVIG might provide access to one or more virtualized network functions (“VNFs”) via the one or more links.
Abstract:
Disclosed embodiments include optical network termination systems, network interface devices, and methods of terminating an optical telecommunications network. Telecommunications signals are conveyed over an optical fiber between an external telecommunications network and a processor at or near a customer premises. Some or all of the telecommunications signals are conveyed between the processor and devices within the premises over at least two internal transport media. One internal transport media is an electrically conductive internal transport medium. Another internal transport media is a wireless signal provided by a wireless access point. Power to the wireless access point is provided from the customer premises over the electrically conductive internal transport medium.
Abstract:
Optical network termination systems, devices and methods including an optical network terminal (ONT) having a processor in communication with an external optical fiber. The ONT processors further in communication with a wireless access point and at least one electrically conductive internal transport medium, both providing for the communication of telecommunication signals with devices located within a customer premises. The wireless access point and in certain instances the processor are back powered over the electrically conductive internal transport medium from AC power within the premises. In certain embodiments, the wireless access point communicates with devices within the premises over a distributed antenna.
Abstract:
Methods and systems are disclosed for enabling installation of antennas in a cost effective and efficient manner. The methods and systems disclosed herein provide a hollow pole and an elevating mechanism, wherein the elevating mechanism can be used to position antenna equipment located in one or more capsules attached to the elevating mechanism. The antenna equipment may be attached to a removable power source located in the capsule or to a non-removable power source located at the base of the hollow pole. Additionally, the antenna equipment may also be attached to communications equipment adapted to communicate with one or more communications networks. In an embodiment disclosed herein, the capsules may be adapted to rotate around a one or more axis in response to received commands and/or in accordance with instructions stored on a memory module attached to the capsules.
Abstract:
Novel tools and techniques might provide for implementing extension of customer local area networks (“LANs”) and/or implementing isolated service overlays over a network. In some embodiments, a network service point that is located external to a demarcation point at each of a plurality of customer premises might establish a connection between a service provider network and a customer LAN, which has already been established within a customer premises. The system subsequently extends the customer LAN, via this connection, to span between the network service point and the customer premises. Alternatively, or additionally, the system might establish two or more isolated service overlays across the customer LAN between the network service point and the customer premises, each of the two or more isolated service overlays having network traffic that is isolated from network traffic transmitted along another of the two or more isolated service overlays.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
Novel tools and techniques might provide for implementing customer-based Internet of Things (“IoT”)—transparent privacy functionality. Various methods, systems, and apparatuses might provide connectivity between a network interface device (“NID”) and each of one or more first user devices of a plurality of user devices associated with the customer premises and/or a user who is associated with the customer premises. In some cases, at least one virtual network function (“VNF”) might be sent to each of the one or more first user devices. The NID might restrict, in some cases using the VNF, access by a third party to the information regarding the at least one portion of the at least one of one or more first user devices connected to the network or one or more applications running on one or more first user devices connected to the network.
Abstract:
Novel tools and techniques provide for implementing network configuration, and, in particular embodiments, to methods, systems, apparatus, and computer software for implementing customer control point or customer portal for enabling customer-based virtualized platform and network configuration. In some embodiments, a network node might receive, via a user portal (e.g., an app-based or web-based customer portal), a request from a user to change a network configuration of a network. In response to receiving the request, the network node might determine one or more network configuration changes to make to effect the request to change the network configuration of the network, and might reconfigure the network by effecting the determined one or more network configuration changes. In some cases, the user portal might be represented by a graphical user interface that allows the user to manipulate or interact with icons of devices, apps, VNFs, etc., as a form of making the request.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
Novel tools and techniques are provided for implementing self-organizing mobile networks (“SOMNETs”) of drones and platforms. In various embodiments, a computing system might receive first data from each of a plurality of vehicles; might receive second data from each of a plurality of platforms; might analyze the first data to determine a status of each vehicle; and might analyze the second data to determine a status of each platform. Based at least in part on the analyzed first and second data, the computing system might generate at least one of first control instructions to at least one first vehicle of the plurality of vehicles or second control instructions to at least one first platform of the plurality of platforms that respectively cause the at least one first vehicle to perform one or more first actions or cause the at least one first platform to perform one or more second actions.