摘要:
The disclosed technology is directed towards locating and counting unused nodes, such as free Internet Protocol version 4 (IPv4) address blocks. A hierarchical structure of nodes is created from an origin block to a specified lower level, and the hierarchical structure is processed using mapping and eliminating to locate free nodes. A first node group comprises node(s) in use, a second node group identifies intermediate subnets between the first node of the first node group and the specified origin block, and a third node group identifies any subnets hierarchically below node(s) in use. Unused (free) node count information is obtained based on nodes below the origin block that are not in the first node group, the second node group, or the third node group.
摘要:
The transport latency, processing time, and computing time in virtual functions (VFs) and physical functions (PFs) that are allocated to delay sensitive services may be assessed and stored. The assessment may be used to create latency zones for network planning or design, as well as determining in near real time the available resources to meet the service needs.
摘要:
Aspects of the subject disclosure may include, for example, a method in which a processing system determines a location of a failure in a communication network and a cause of the failure. If the failure cannot be resolved using a recovery feature of the network, the processing system identifies a recovery procedure for resolving the failure, and dispatches an automated vehicle to the failure location; the vehicle is provided with instructions for performing the recovery procedure, which may include replacement of a hardware component of the network. The operations also include determining whether the recovery procedure is successful; if the recovery procedure is not successful, the processing system obtains information via the vehicle regarding the failure, to facilitate human intervention to resolve the failure. Other embodiments are disclosed.
摘要:
Architectures and techniques are presented that improve or increase network security for networks that have network slicing capability. In addition to (or instead of) conventional network slices, various security-based network slices can be defined and/or implemented. Network traffic of a subscriber device can be assigned to one of these security based network slices. Assignment can be based on characteristics of the subscriber device and/or based on the current behavior or role of the subscriber device. Further, in response to determining that a behavior of the subscriber device satisfies a criterion (e.g., a criterion relating to malfeasance or misbehavior, a criterion relating to switching to a maintenance cycle, and so on), reassigning network traffic of the subscriber device from the currently assigned network slice to a different network slice.
摘要:
Preemptive based radio access control is facilitated. Queue data is received, wherein the queue data corresponds to a set of requests for highly prioritized communications included on a prioritized queue. The queue data is used to determine whether a set of conditions for involuntarily terminating a radio communication session has been met. Session data corresponding to characteristics for each of a plurality of radio communication sessions are also received and utilized to determine which of the plurality of radio communication sessions to terminate if the set of conditions for involuntarily terminating a radio communication session have been met.
摘要:
Preemptive based radio access control is facilitated. Queue data is received, wherein the queue data corresponds to a set of requests for highly prioritized communications included on a prioritized queue. The queue data is used to determine whether a set of conditions for involuntarily terminating a radio communication session has been met. Session data corresponding to characteristics for each of a plurality of radio communication sessions are also received and utilized to determine which of the plurality of radio communication sessions to terminate if the set of conditions for involuntarily terminating a radio communication session have been met.
摘要:
A method and apparatus for enabling prioritization of signaling messages in a communication network are disclosed. For example, the method receives at least one signaling message, and classifies each of the at least one signaling message. The method schedules each of the at least one signaling message for processing, and discards selectively one or more signaling messages that have been scheduled under an overload condition.
摘要:
The described technology is generally directed towards latency diagnostics for multiparty systems, such as a system comprising a communication network, a content delivery network (CDN), and one or more internet service providers (ISPs). A latency analyzer component can process latency data in response to a latency diagnostic trigger, such as an alert from a video quality monitoring system. The latency analyzer can determine whether latency is attributable to the communication network. If not, the latency analyzer can determine whether the latency is attributable to the CDN. If the latency is not attributable to the communication network or the CDN, the latency analyzer can determine that the latency is attributable to the ISP, and the latency analyzer can identify the ISP and generate appropriate reports and notifications.
摘要:
Devices, computer-readable media, and methods for predictively managing the customer experience in a content distribution network are disclosed. In one example, a method includes acquiring a system log from a component of a content distribution network, detecting an event in a report derived from the system log that has been correlated with a decline in a key performance indicator of the content distribution network, and initiating a corrective action in response to the detecting.
摘要:
The described technology is generally directed towards latency diagnostics for multiparty systems, such as a system comprising a communication network, a content delivery network (CDN), and one or more internet service providers (ISPs). A latency analyzer component can process latency data in response to a latency diagnostic trigger, such as an alert from a video quality monitoring system. The latency analyzer can determine whether latency is attributable to the communication network. If not, the latency analyzer can determine whether the latency is attributable to the CDN. If the latency is not attributable to the communication network or the CDN, the latency analyzer can determine that the latency is attributable to the ISP, and the latency analyzer can identify the ISP and generate appropriate reports and notifications.