Abstract:
A method provided in a network including edge devices to collect data from data producers connected to the edge devices and to communicate with cloud-based prosumers connected with the edge devices. Data analytics tasks are identified. The data analytics tasks are used to process data collected from a data producer among the data producers to produce a result for consumption by one or more of the cloud-based prosumers. For each data analytics task it is determined whether a computational complexity of the data analytics task is less than or equal to a predetermined computational complexity. Each data analytics task determined to have a computational complexity less than or equal to the predetermined computational complexity is assigned to an edge device among the edge devices. Each data analytics task determined to have a computational complexity that exceeds the predetermined computational complexity is assigned to a prosumer among the prosumers.
Abstract:
In one embodiment, a device in a network identifies a set of network entities. The device determines characteristics of the network entities. The device assigns each of the set of network entities to one or more hyperedges of a hypergraph based on the characteristics. The device applies a security policy to a particular one of the network entities based on the one or more hyperedges of the hypergraph to which the particular network entity is assigned.
Abstract:
In one embodiment, a device in a network identifies a set of network entities. The device determines characteristics of the network entities. The device assigns each of the set of network entities to one or more hyperedges of a hypergraph based on the characteristics. The device applies a security policy to a particular one of the network entities based on the one or more hyperedges of the hypergraph to which the particular network entity is assigned.
Abstract:
Disclosed are systems, methods, and computer-readable storage media for fog enabled telemetry in real time multimedia applications. An edge computing device can receive first sensor data from at least a first sensor and a collaboration data stream from a first client device. The collaboration data stream can including at least one of chat, audio or video data. The edge computing device can convert the first sensor data into a collaboration data stream format, yielding a first converted sensor data, and then embed the first converted sensor data into the collaboration data stream, yielding an embedded collaboration data stream. The edge computing device can then transmit the embedded collaboration data stream to an intended recipient.
Abstract:
A method provided in a network including edge devices to collect data from data producers connected to the edge devices and to communicate with cloud-based prosumers connected with the edge devices. Data analytics tasks are identified. The data analytics tasks are used to process data collected from a data producer among the data producers to produce a result for consumption by one or more of the cloud-based prosumers. For each data analytics task it is determined whether a computational complexity of the data analytics task is less than or equal to a predetermined computational complexity. Each data analytics task determined to have a computational complexity less than or equal to the predetermined computational complexity is assigned to an edge device among the edge devices. Each data analytics task determined to have a computational complexity that exceeds the predetermined computational complexity is assigned to a prosumer among the prosumers.
Abstract:
An example method for zero touch deployment of multi-tenant services in a home network environment is provided and includes receiving router configuration information of a home router located in a home network, the router configuration information including at least one slice setting for a service deployment at the home router, and configuring the slice setting on the home router for the service from a remote network separate from the home network. The slice setting can logically divide the home router to enable separation of the service from other services provisioned and configured on the home router. In specific embodiments, the method further includes receiving a request for the service from a service user entity, sending a slice provisioning request to a router manager for provisioning the service in the home router, and receiving a slice provisioned response comprising the router configuration information from the router manager.
Abstract:
In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile.
Abstract:
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to obtain a unique identification (ID) of the device at the provisioning system. The device and provisioning system then participate in device and user authentication in response to a confirmed unique ID by a backend access control system, where the device generates a secure key pair after successful user authentication. In response to the device being approved for services (e.g., checked by the provisioning system via a registration system), the provisioning system provides a root certificate to the device, and the device sends a certificate enrollment request back to the provisioning system. In response to a certificate authority signing the certificate request, the provisioning system returns a valid certificate to the device, and the valid certificate is installed on the device.
Abstract:
Disclosed herein are systems, methods, and computer-readable media for network communication within a Lunar and Interplanetary communication system. In one aspect, a length of time of line of sight occlusion associated with an object is determined based on a position of the object within its orbit. A dynamic forwarding table is generated that schedules packet paths among nodes within the network based on the length of time of the line of sight occlusion. A packet path for a packet is determined based on the dynamic forwarding table, where the packet path is based on minimizing the length of time of the line of sight occlusion associated with the object.
Abstract:
Resource provider specifications, characterizing computing resources of computing resource providers, are received. The reachability of each IP address included in the received specification is determined. An agent is deployed that is operable to determine the value of each of a set of metrics in the environment of the host at which the agent is deployed. The agent determines the value of each metric of the set of metrics in the environment of the relevant host, and communicates the determined values to one or more computing devices that validate whether the resources characterized by the communicated values are sufficient to provide the performance characterized by the received specification and that each ISP router complies with a predetermined policy. For each computing resource provider validated and determined to comprise an ISP router compliant with policy, the specified computing resources are added to a pool of resources for cloud computing.