-
公开(公告)号:US20220191648A1
公开(公告)日:2022-06-16
申请号:US17556738
申请日:2021-12-20
申请人: Ned M. Smith , S M Iftekharul Alam , Vesh Raj Sharma Banjade , Satish Chandra Jha , Liuyang Lily Yang , Christian Maciocco , Nageen Himayat , Arvind Merwaday , Francesc Guim Bernat , Kshitij Arun Doshi
发明人: Ned M. Smith , S M Iftekharul Alam , Vesh Raj Sharma Banjade , Satish Chandra Jha , Liuyang Lily Yang , Christian Maciocco , Nageen Himayat , Arvind Merwaday , Francesc Guim Bernat , Kshitij Arun Doshi
摘要: Systems and techniques for digital twin framework for next generation networks are described herein. A digital twin model may be generated for physical nodes of an edge network. The digital twin model may include a digital twin for a physical node of the physical nodes. An error may be identified of the physical node or the digital twin for the physical node. The digital twin model may be updated to halt communication with the physical node or the digital twin of the physical node. A path may be created to another physical node or a digital twin of the another physical node in the digital twin model.
-
公开(公告)号:US20220225227A1
公开(公告)日:2022-07-14
申请号:US17711579
申请日:2022-04-01
申请人: Satish Chandra Jha , S M Iftekharul Alam , Vesh Raj Sharma Banjade , Ned M. Smith , Arvind Merwaday , Kshitij Arun Doshi , Francesc Guim Bernat , Liuyang Lily Yang , Kuilin Clark Chen , Christian Maciocco , Marcio Rogerio Juliato , Maruti Gupta Hyde , Manoj R. Sastry
发明人: Satish Chandra Jha , S M Iftekharul Alam , Vesh Raj Sharma Banjade , Ned M. Smith , Arvind Merwaday , Kshitij Arun Doshi , Francesc Guim Bernat , Liuyang Lily Yang , Kuilin Clark Chen , Christian Maciocco , Marcio Rogerio Juliato , Maruti Gupta Hyde , Manoj R. Sastry
摘要: System and techniques for network slice resiliency are described herein. An indication of a fault-attack-failure-outage (FAFO) event for a network slice may be received. Here, the network slice is one of multiple network slices. A capacity in a slice segment may be estimated to determine whether there is enough capacity to meet a service level agreement (SLA) of the multiple network slices based on the FAFO event. In this case, the slice segment is a set of physical resources shared by the multiple network slices. Operation of the slice segment may then be modified based on results from estimating the capacity in the slice segment to address impacts from the FAFO event.
-
公开(公告)号:US20220014923A1
公开(公告)日:2022-01-13
申请号:US17484120
申请日:2021-09-24
申请人: Vesh Raj Sharma Banjade , Satish Chandra Jha , Kathiravetpillai Sivanesan , Liuyang Lily Yang , Ned M. Smith , S M Iftekharul Alam , Arvind Merwaday , Francesc Guim Bernat , Kshitij Arun Doshi , Kuilin Clark Chen
发明人: Vesh Raj Sharma Banjade , Satish Chandra Jha , Kathiravetpillai Sivanesan , Liuyang Lily Yang , Ned M. Smith , S M Iftekharul Alam , Arvind Merwaday , Francesc Guim Bernat , Kshitij Arun Doshi , Kuilin Clark Chen
IPC分类号: H04W12/122 , H04W64/00 , H04W16/18
摘要: Various aspects of methods, systems, and use cases include region identification of a malicious device based on crowdsourced locations. A method may include generating a grid of bins of a local radio coverage region, receiving location data from a plurality of devices in the local radio coverage region, and classifying locations of the plurality of devices with respect to the bins. The method may include associating the classified locations of the plurality of devices to the received location data for corresponding devices of the plurality of devices, and generating a model, from the associated classified locations and the received location data.
-
4.
公开(公告)号:US20220116335A1
公开(公告)日:2022-04-14
申请号:US17558391
申请日:2021-12-21
申请人: Vesh Raj Sharma Banjade , Satish Chandra Jha , Ned M. Smith , S M Iftekharul Alam , Christian Maciocco , Liuyang Lily Yang , Mona Vij , Kshitij Arun Doshi , Francesc Guim Bernat , Clark Chen
发明人: Vesh Raj Sharma Banjade , Satish Chandra Jha , Ned M. Smith , S M Iftekharul Alam , Christian Maciocco , Liuyang Lily Yang , Mona Vij , Kshitij Arun Doshi , Francesc Guim Bernat , Clark Chen
IPC分类号: H04L47/72 , H04W28/16 , H04W12/10 , H04W12/122 , H04W24/04
摘要: A computing node includes network interface circuitry and processing circuitry. The processing circuitry assigns available computing resources to a plurality of slice contexts. Each slice context of the plurality includes resource allocations of the available computing resources associated with multiple communication networks. A first portion of the resource allocations is designated as dedicated resources and a second, remaining portion is designated as shared resources. A FAFO event associated with a workload is detected. The workload executes on a network slice instance (NSI) associated with a slice context of a subset of slice contexts. The configuration of the NSI is restored to a pre-FAFO event state based on reconfiguring one or both of the dedicated resources or the shared resources of the slice context based on the resource allocations of at least a second slice context in the subset of slice contexts.
-
公开(公告)号:US20220231964A1
公开(公告)日:2022-07-21
申请号:US17711921
申请日:2022-04-01
申请人: S M Iftekharul Alam , Satish Chandra Jha , Ned M. Smith , Vesh Raj Sharma Banjade , Kshitij Arun Doshi , Francesc Guim Bernat , Arvind Merwaday , Kuilin Clark Chen , Christian Maciocco
发明人: S M Iftekharul Alam , Satish Chandra Jha , Ned M. Smith , Vesh Raj Sharma Banjade , Kshitij Arun Doshi , Francesc Guim Bernat , Arvind Merwaday , Kuilin Clark Chen , Christian Maciocco
摘要: A resource management framework may be used to improve performance of dominant and non-dominant resources for edge multi-tenant applications. The resource management framework may include an admission control mechanism, which may be used to balance disproportionate resource allocations by controlling allocation of unconstrained resources proportional to the requested dominant resources based on resource availability. The admission control mechanism may provide ongoing monitoring of dominant and non-dominant resource utilization, such as using a hybrid centralized-distributed telemetry collection approach. The resource management framework may also include a lightweight resource monitoring and policy enforcement mechanism on distributed networking elements to reduce or eliminate the exploitations of non-dominant resources.
-
公开(公告)号:US20220329499A1
公开(公告)日:2022-10-13
申请号:US17851853
申请日:2022-06-28
申请人: Ned M. Smith , S M Iftekharul Alam , Satish Chandra Jha , Vesh Raj Sharma Banjade , Christian Maciocco , Kshitij Arun Doshi , Francesc Guim Bernat , Nageen Himayat
发明人: Ned M. Smith , S M Iftekharul Alam , Satish Chandra Jha , Vesh Raj Sharma Banjade , Christian Maciocco , Kshitij Arun Doshi , Francesc Guim Bernat , Nageen Himayat
IPC分类号: H04L41/5019 , H04L41/16 , H04L41/5006 , H04L41/5009 , H04L41/12
摘要: Various systems and methods for providing opportunistic placement of compute in an edge network are described herein. A node in an edge network may be configured to access a service level agreement related to a workload, the workload to be orchestrated for a user equipment by the node; modify a machine learning model based on the service level agreement; implement the machine learning model to identify resource requirements to execute the workload in a manner to satisfy the service level agreement; initiate resource assignments from a resource provider, the resource assignments to satisfy the resource requirements; construct a resource hierarchy from the resource assignments; initiate execution of the workload using resources from the resource hierarchy; and monitor and adapt execution of the workload based on the resource hierarchy in response to the execution of the workload.
-
公开(公告)号:US20220014450A1
公开(公告)日:2022-01-13
申请号:US17484134
申请日:2021-09-24
申请人: Srikathyayani Srikanteswara , Marcin Spoczynski , Yi Zhang , Hao Feng , Kshitij Arun Doshi , Francesc Guim Bernat , Ned M. Smith , Satish Chandra Jha , S M Iftekharul Alam , Vesh Raj Sharma Banjade , Alexander Bachmutsky , Nageen Himayat
发明人: Srikathyayani Srikanteswara , Marcin Spoczynski , Yi Zhang , Hao Feng , Kshitij Arun Doshi , Francesc Guim Bernat , Ned M. Smith , Satish Chandra Jha , S M Iftekharul Alam , Vesh Raj Sharma Banjade , Alexander Bachmutsky , Nageen Himayat
IPC分类号: H04L12/24 , H04L29/08 , H04L12/751
摘要: System and techniques for storage node recruitment in an information centric network (ICN) are described herein. An ICN node receives a storage interest packet that includes an indication differentiating the storage interest from other ICN interests. The ICN node forwards the storage interest packet and receives a storage data packet in response. Here, the storage data packet includes an indication that the storage data packet is not to be cached along with node information for a node that created the storage data packet. The ICN node may then transmit the storage data packet in accordance with a pending interest table (PIT) entry corresponding to the storage interest packet.
-
公开(公告)号:US20220014422A1
公开(公告)日:2022-01-13
申请号:US17483285
申请日:2021-09-23
申请人: Maruti Gupta Hyde , Yi Zhang , Christian Maciocco , Alexander Bachmutsky , Satish Chandra Jha , S M Iftekharul Alam , Nageen Himayat , Ravikumar Balakrishnan , Vesh Raj Sharma Banjade , Kshitij Arun Doshi , Francesc Guim Bernat , Amar Srivastava , Srikathyayani Srikanteswara
发明人: Maruti Gupta Hyde , Yi Zhang , Christian Maciocco , Alexander Bachmutsky , Satish Chandra Jha , S M Iftekharul Alam , Nageen Himayat , Ravikumar Balakrishnan , Vesh Raj Sharma Banjade , Kshitij Arun Doshi , Francesc Guim Bernat , Amar Srivastava , Srikathyayani Srikanteswara
摘要: Systems and techniques for cross-layer automated fault tracking and anomaly detection are described herein. Anomaly data may be obtained from a plurality of layers of a network. Elements of the anomaly data may be identified that correspond to a data flow of an application executing on the network. An artificial intelligence model may be trained using the elements of the anomaly data to generate an impact score for the application. The impact score may be generated for the application by evaluating current network metrics using the artificial intelligence model. An operational component of the network may be modified based on the impact score.
-
公开(公告)号:US20220114055A1
公开(公告)日:2022-04-14
申请号:US17559877
申请日:2021-12-22
申请人: Kshitij Arun Doshi , Francesc Guim Bernat , Christian Maciocco , Ned M. Smith , S M Iftekharul Alam , Satish Chandra Jha , Vesh Raj Sharma Banjade , Alexander Bachmutsky
发明人: Kshitij Arun Doshi , Francesc Guim Bernat , Christian Maciocco , Ned M. Smith , S M Iftekharul Alam , Satish Chandra Jha , Vesh Raj Sharma Banjade , Alexander Bachmutsky
摘要: Systems and techniques for transparent dynamic reassembly of computing resource compositions are described herein. An indication may be obtained of an error state of a component of a computing system. An offload command may be transmitted to component management software of the computing system. An indication may be received that workloads to be executed using the component have been suspended. An administrative mode command may be transmitted to the component. The administrative mode command may place the component in partial shutdown to prevent the component from receiving non-administrative workloads. Data of the component may be synchronized with a backup component. Workloads from the component may be transferred to the backup component. An offload release command may be transmitted to the software of the computing system.
-
公开(公告)号:US20220329522A1
公开(公告)日:2022-10-13
申请号:US17853331
申请日:2022-06-29
申请人: Christian Maciocco , Ren Wang , Kshitij Arun Doshi , Francesc Guim Bernat , Ned M. Smith , Satish Chandra Jha , Vesh Raj Sharma Banjade , S M Iftekharul Alam , Shu-ping Yeh
发明人: Christian Maciocco , Ren Wang , Kshitij Arun Doshi , Francesc Guim Bernat , Ned M. Smith , Satish Chandra Jha , Vesh Raj Sharma Banjade , S M Iftekharul Alam , Shu-ping Yeh
摘要: Disclosed are systems and methods for adaptive resilient network communication. A system may monitor network traffic on multiple pathways between user equipment and an application or a service at a network destination, gather network telemetry data from the monitored network traffic, input the network telemetry data into a trained artificial intelligence model, and classify the network telemetry data using the model. The system may further determine, using the model, an anomaly condition in at least a portion of the multiple pathways, and in response to the determination of an anomaly, select a mitigation technique for the at least a portion of the multiple pathways.
-
-
-
-
-
-
-
-
-