Abstract:
Concepts and technologies are disclosed herein for creating and using service control functions. The service control functions can detect a message via an adapter function. The message can relate to a service controlled by the service control functions. Service policies can be accessed. The service policies can include message handling policies and can be accessed to determine if a policy relating to the message exists. If a determination is made that the policy exists, the message and the policy can be analyzed to determine an action to take with respect to the message, and the action can be initiated.
Abstract:
Concepts and technologies disclosed herein are directed to recursive modularization of service provider components to reduce service delivery time and cost. In accordance with one aspect disclosed herein, a module is executable by a hardware compute resource of a virtualization platform. The module can include a module controller and a module instance. The module controller can expose a set of application programming interfaces (“APIs”). The set of APIs can include a configuration API that collects a configuration to be utilized to instantiate the module instance. The set of APIs also can include an instance provisioning API that instantiates the module instance based upon the configuration. The set of APIs also can include one or more other APIs to manage the module instance. The module instance can be a service module instance. The service module instance can encapsulate additional service module instances that have been instantiated by another module.
Abstract:
Concepts and technologies are disclosed herein for creating and using service control functions. The service control functions can detect a message via an adapter function. The message can relate to a service controlled by the service control functions. Service policies can be accessed. The service policies can include message handling policies and can be accessed to determine if a policy relating to the message exists. If a determination is made that the policy exists, the message and the policy can be analyzed to determine an action to take with respect to the message, and the action can be initiated.
Abstract:
Concepts and technologies are disclosed herein for creating and using service control functions. The service control functions can detect a message via an adapter function. The message can relate to a service controlled by the service control functions. Service policies can be accessed. The service policies can include message handling policies and can be accessed to determine if a policy relating to the message exists. If a determination is made that the policy exists, the message and the policy can be analyzed to determine an action to take with respect to the message, and the action can be initiated.
Abstract:
A device and method manages components of a network. The method performed in a registry includes recording, for an instantiated component (IC), an identification thereof. The method includes recording, for the IC, a location of the IC, the location being a physical location or a virtual location. The method includes recording, for the IC, a relation of the IC to a second IC. The method includes receiving a change to one of the identification, the location, and the relation. The method includes recording the change and a further change to another one of the identification, the location, and the relation based upon the change.
Abstract:
Concepts and technologies are disclosed herein for creating and using service control functions. The service control functions can detect a message via an adapter function. The message can relate to a service controlled by the service control functions. Service policies can be accessed. The service policies can include message handling policies and can be accessed to determine if a policy relating to the message exists. If a determination is made that the policy exists, the message and the policy can be analyzed to determine an action to take with respect to the message, and the action can be initiated.
Abstract:
Concepts and technologies are disclosed herein for creating and using service control functions. The service control functions can detect a message via an adapter function. The message can relate to a service controlled by the service control functions. Service policies can be accessed. The service policies can include message handling policies and can be accessed to determine if a policy relating to the message exists. If a determination is made that the policy exists, the message and the policy can be analyzed to determine an action to take with respect to the message, and the action can be initiated.
Abstract:
Concepts and technologies are disclosed herein for creating and using service control functions. The service control functions can detect a message via an adapter function. The message can relate to a service controlled by the service control functions. Service policies can be accessed. The service policies can include message handling policies and can be accessed to determine if a policy relating to the message exists. If a determination is made that the policy exists, the message and the policy can be analyzed to determine an action to take with respect the message, and the action can be initiated.
Abstract:
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
Abstract:
Concepts and technologies disclosed herein are directed to recursive modularization of service provider components to reduce service delivery time and cost. In accordance with one aspect disclosed herein, a module is executable by a hardware compute resource of a virtualization platform. The module can include a module controller and a module instance. The module controller can expose a set of application programming interfaces (“APIs”). The set of APIs can include a configuration API that collects a configuration to be utilized to instantiate the module instance. The set of APIs also can include an instance provisioning API that instantiates the module instance based upon the configuration. The set of APIs also can include one or more other APIs to manage the module instance. The module instance can be a service module instance. The service module instance can encapsulate additional service module instances that have been instantiated by another module.