METHOD AND SYSTEM TO REDUCE NETWORK BANDWIDTH USAGE FOR VIDEO STREAMING

    公开(公告)号:US20220174359A1

    公开(公告)日:2022-06-02

    申请号:US17671659

    申请日:2022-02-15

    Abstract: Aspects of the subject disclosure may include, for example, a method comprising determining whether a skippable advertisement is being streamed preceding a requested video; responsive to determining that the skippable advertisement is being streamed, initiating a skippable advertisement procedure, wherein the skippable advertisement procedure comprises streaming a first portion of the skippable advertisement without imposing constraints and streaming a second portion of the skippable advertisement imposing constraints; responsive to receiving a request to skip the skippable advertisement, ceasing the streaming the second portion of the skippable advertisement and initiating streaming of the requested video without imposing constraints. Other embodiments are disclosed.

    ASSESSING THE IMPACTS OF CELLULAR NETWORK CHANGES

    公开(公告)号:US20210258808A1

    公开(公告)日:2021-08-19

    申请号:US16790949

    申请日:2020-02-14

    Abstract: A method includes selecting a study group including a first network element and a second network element of a network, selecting a control group including a third network element, identifying times at which a change is deployed at the first network element and the second network element, time-aligning the change at the first element and the change at the second network element to a common time, performing a statistical analysis that compares the performance of the network before the common time to the performance of the network after the common time, detecting an impact of the change on a performance of the network based on the statistical analysis, and initiating a remedial action when the impact comprises a degradation to the performance.

    Common abstraction for network traffic migration

    公开(公告)号:US10958560B2

    公开(公告)日:2021-03-23

    申请号:US16513147

    申请日:2019-07-16

    Abstract: A method of migrating traffic in a network includes receiving, via an API, a request to migrate traffic. The request identifies a target around which the traffic is to be migrated and a peer to which the traffic is to be migrated. The method also includes discovering at least one anchor point based on at least a topology of the network, the target, and the peer. The method includes, based on an identity of the at least one anchor point and the target, identifying a migration mechanism. The method also includes requesting, in accordance with the migration mechanism, that the at least one anchor point facilitate migration of the traffic. The method includes responding, through the API, to the request indicating whether the migration was successful.

    Monitoring Operational Activities In Networks And Detecting Potential Network Intrusions And Misuses
    17.
    发明申请
    Monitoring Operational Activities In Networks And Detecting Potential Network Intrusions And Misuses 有权
    监控网络中的运营活动并检测潜在的网络入侵和滥用

    公开(公告)号:US20140181968A1

    公开(公告)日:2014-06-26

    申请号:US13721698

    申请日:2012-12-20

    CPC classification number: H04L63/1416 H04L63/1425

    Abstract: Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein, an intrusion detection system can collect logs from an authentication, authorization, and accounting system. The intrusion detection system can extract information from the logs, update intrusion detection information utilized by an intrusion detection rule based upon the information extracted from the logs, update a profile utilized by the intrusion detection rule, compare the profile and the intrusion detection rule against a running state of an on-going session, tag corresponding log entries with a threat score, calculate the threat scores from the corresponding log entries to create an aggregated threat score, and present the aggregated threat score. The intrusion detection system can also present an alarm if the aggregated threat score triggers an alarm condition.

    Abstract translation: 本文所公开的概念和技术用于监控网络中的运行活动并检测潜在的网络入侵和滥用。 根据本文公开的一个方面,入侵检测系统可以从认证,授权和计费系统收集日志。 入侵检测系统可以从日志中提取信息,基于从日志提取的信息更新入侵检测规则所使用的入侵检测信息,更新入侵检测规则使用​​的配置文件,将配置文件和入侵检测规则相对于 正在进行的会话的运行状态,标记具有威胁分数的相应日志条目,从相应的日志条目计算威胁分数以创建聚合的威胁分数,并呈现聚合的威胁分数。 入侵检测系统还可以在聚合的威胁分数触发报警条件时发出报警。

    Methods, apparatus and articles of manufacture to perform root cause analysis for network events
    18.
    发明授权
    Methods, apparatus and articles of manufacture to perform root cause analysis for network events 有权
    方法,装置和制品对网络事件进行根本原因分析

    公开(公告)号:US08761029B2

    公开(公告)日:2014-06-24

    申请号:US13787374

    申请日:2013-03-06

    Abstract: Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.

    Abstract translation: 公开了对网络事件执行根本原因分析的示例性方法,装置和制造。 示例性方法包括:基于症状事件定义从归一化数据源集合检索症状事件实例; 从可能导致症状事件实例的归一化数据源集合生成一组诊断事件,诊断事件基于依赖规则确定; 并分析一组诊断事件以根据根本原因选择根本原因事件。

    Assessing the impacts of cellular network changes

    公开(公告)号:US12219377B2

    公开(公告)日:2025-02-04

    申请号:US17676796

    申请日:2022-02-21

    Abstract: A method includes selecting a study group including a first network element and a second network element of a network, selecting a control group including a third network element, identifying times at which a change is deployed at the first network element and the second network element, time-aligning the change at the first element and the change at the second network element to a common time, performing a statistical analysis that compares the performance of the network before the common time to the performance of the network after the common time, detecting an impact of the change on a performance of the network based on the statistical analysis, and initiating a remedial action when the impact comprises a degradation to the performance.

Patent Agency Ranking