Abstract:
Novel tools and techniques are provided for implementing self-organizing mobile networks (“SOMNETs”) of drones and platforms. In various embodiments, a computing system might receive first data from each of a plurality of vehicles; might receive second data from each of a plurality of platforms; might analyze the first data to determine a status of each vehicle; and might analyze the second data to determine a status of each platform. Based at least in part on the analyzed first and second data, the computing system might generate at least one of first control instructions to at least one first vehicle of the plurality of vehicles or second control instructions to at least one first platform of the plurality of platforms that respectively cause the at least one first vehicle to perform one or more first actions or cause the at least one first platform to perform one or more second actions.
Abstract:
Novel tools and techniques are provided for implementing Internet of Things (“IoT”) functionality. In some embodiments, a first IoT-capable device might receive beacon data from each of one or more other IoT-capable devices in a self-organizing network (“SON”) of IoT devices, might compare the received beacon data with stored beacon data, and might send at least one first data to a computing system to update the computing system of any changes in the SON (indicating, without limitation, new devices, failed devices, disabled devices, devices that have moved out of range, etc.). The computing system might receive and analyze the at least one first data to determine a status of each IoT-capable device in the SON, might generate control instructions, and might autonomously send the control instructions to at least one of the IoT-capable devices in the SON to improve the functionality of the SON.
Abstract:
Novel tools and techniques are provided for implementing Internet of Things (“IoT”) functionality. In some embodiments, a processor might receive sensor data from a plurality of sensors of a first IoT-capable device, and might analyze the sensor data to determine whether to send the sensor data to at least one of second IoT-capable devices or user devices, each associated with the user of the first IoT-capable device, and/or to at least one of third IoT-capable devices associated with one or more third party groups. Based on a determination to send the sensor data to at least one of the second IoT-capable devices associated with the user, the user devices associated with the user, and/or the third IoT-capable devices associated with third party group(s), the processor might send the sensor data to the at least one of the second IoT-capable devices, the user devices, and/or the third IoT-capable devices.
Abstract:
Novel tools and techniques might provide for implementing application, service, and/or content access control. Based at least in part on a consumer's choice of applications, services, content, and/or content providers—particular in exchange for a subsidy on content and/or network access fees provided to the consumer by chosen content providers—, a computing system may determine whether access to applications, services, and/or content not associated with the chosen content providers (“other content”) should be allowed or restricted. If restricted, the computing system might utilize various network access techniques and/or technologies to block the consumer's access to the other content, to allow access to the other content on a charge per access basis, or to allow access to the other content at reduced network access speeds. In some embodiments, an access provider (e.g., an Internet service provider, etc.) might perform both determination and implementation of content access and restriction.
Abstract:
Novel tools and techniques that can provide wireless service for multiple service providers from a single, multi-service provider wireless access point. In an aspect, a multi-service provider wireless access point might communicate with a plurality of wireless devices, each associated with a different wireless carrier, and route communications from each device to the appropriate carrier (and/or, similarly, transmit communications from each carrier to the appropriate wireless device). In this way, for example, a single wireless access point could provide service to cellphones of subscribers of a number of different carriers. Such a wireless access point can provide enhanced efficiency and reduced cost, along with the ability to provide higher service for a number of wireless carriers.
Abstract:
Novel tools and techniques are provided for testing a data connection (e.g., network connection and/or packet-based service connection) and determining a performance condition of the data connection. The data connection may depend on conditions of an access network and/or a local area network. In some embodiments, a local performance test device may be in communication with an access network and/or a local area network. The local performance test device may receive a request to test the access network and/or the local area network. The local performance test device may further be configured to analyze the access network and/or the local area network to determine whether a data connection issue is occurring on the access network and/or the local area network. Once the local performance test device determines where a performance issue is occurring, the local performance test device may send the result of the test to a requesting device.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
Novel tools and techniques might provide for implementing customer-based Internet of Things (“IoT”) functionality. Various methods, systems, and apparatuses might provide connectivity between a network interface device (“NID”) and each of one or more first user devices of a plurality of user devices associated with the customer premises and/or a user who is associated with the customer premises. At least one virtual network function (“VNF”) might be sent to each of the one or more first user devices. Each of the one or more first user devices might be mapped with each of one or more second user devices of the plurality of user devices associated with at least one of the customer premises or the user who is associated with the customer premises, and with each resource node of a plurality of resource nodes in communication with the NID, based at least in part on user input.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based in part on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
Novel tools and techniques are provided for implementing network enhanced gateway functionality, and, in particular embodiments, for implementing network enhanced gateway functionality using network functions virtualization (“NFV”) and/or software defined networks (“SDNs”). In some embodiments, a network switch, which is disposed within a gateway device, might route network traffic to a host computing system, at least a portion of the network traffic being originally directed to a client device via a corresponding client port among a plurality of client ports. Based at least in part on one or more characteristics of the at least a portion of the network traffic, the host computing system selects one or more virtual network functions (“VNFs”), which are then sent to the host computing system via the network switch. According to some embodiments, the network switch and the host computing system are under control of a NFV entity and/or a SDN controller.