Abstract:
In one embodiment, a first device in a network receives information regarding one or more nodes in the network. The first device determines a property of the one or more nodes based on the received information. The first device determines a degree of trustworthiness of the one or more nodes based on the received information. The first device attests to the determined property and degree of trustworthiness of the one or more nodes to a verification device. The verification device is configured to verify the attested property and degree of trustworthiness.
Abstract:
In one embodiment, a ceiling tile, configured to be positioned above a given area, comprises a plurality of sensors and a plurality actuators embedded within the ceiling tile, each sensor configured to sense a corresponding feature of the area, and each actuator configured to modify a corresponding feature of the area. The plurality of sensors and plurality of actuators are configured to interact with a controlling device that controls a plurality of ceiling tiles for the area. In another embodiment, one or more floor tiles with one or more sensors (e.g., and actuators) may also be located within the area, and the controlling device further controls the floor tiles, accordingly.
Abstract:
In one embodiment, a device receives data regarding a plurality of heterogeneous computing environments. The received data comprises measured application metrics for applications executed in the computing environments and indications of processing capabilities of the computing environments. The device generates a training dataset by applying a machine learning-based classifier to the received data regarding the plurality of existing heterogeneous environments. The device trains a machine learning-based configuration engine using the training dataset. The device uses the configuration engine to generate configuration parameters for a particular heterogeneous computing environment based on one or more system requirements of the particular heterogeneous computing environment. The device provides the configuration parameters to the particular heterogeneous computing environment.
Abstract:
Approaches are disclosed for virtualizing a network management protocol (NMP). A network element offloads processes for communicating in the NMP to a virtualization engine (e.g., a backend virtualization proxy for the network element). The network element transmits a message containing a NMP request to the virtualization engine using service function chaining (SFC) by inserting service plane protocol data (e.g., a network service header (NSH)) into the message (e.g., an impregnated request). The virtualization engine expropriates, from the network element, processes for communicating in the NMP and can, thereby, reduce the computational resources used by the network element for communicating in the NMP. The virtualization engine generates a NMP response to the NMP request. The virtualization engine transmits a different message containing the NMP response to the network element using SFC by inserting service plane protocol data into the message (e.g., an impregnated response).
Abstract:
Techniques are provided herein for establishing at a network management server a presence on a network. A presence associated with one or more managed devices on the network is detected. An instant messaging (IM) session is established with the one or more managed devices. The IM session forms a virtual chat room for performing a management function on the one or more managed devices, and IM messages are sent that are configured to perform the management function on the one or more managed devices. Techniques are also provided herein for establishing on a network an enriched presence by a network management server that is configured to perform a management function via a presence function of a messaging and presence protocol.
Abstract:
Presented herein are methods and systems that facilitate data plane signaling of a packet as a candidate for capture at various network nodes within an IPv6 network. The signaling occurs in-band, via the data plane—that is, a capture or interrogation signal is embedded within the respective packet (e.g., in the packet header) that carries a user traffic. The signaling is inserted, preferably when the packet is classified, e.g., at the ingress node of the network, to which subsequent network nodes with the IPv6 network are signaled to capture or further inspect the packet for capture.
Abstract:
A method includes obtaining performance characterization values from endpoints managed by a first fog node at a first hierarchical level in a hierarchy of fog nodes. The method includes changing a first operating characteristic of the wireless network based on the performance characterization values. The first operating characteristic affects the operation of one or more of the endpoints. The method includes transmitting a portion of the performance characterization values to a second fog node at a second hierarchical level in the hierarchy of fog nodes. The method includes changing a second operating characteristic of the wireless network based on an instruction from the second fog node. The second operating characteristic affects the operation of the first fog node and/or other fog nodes at the first hierarchical level. Changing one or more of the first operating characteristic and the second operating characteristic satisfies an operating threshold for the wireless network.
Abstract:
A network device receives a data packet including a source address and a destination address. The network device drops the data packet before it reaches the destination address and generates an error message indicating that the data packet has been dropped. The network device encapsulates the error message with a segment routing header comprising a list of segments. The first segment of the list of segments in the segment routing header identifies a remote server, and at least one additional segment is an instruction for handling the error message. The network device sends the encapsulated error message to the remote server based on the first segment of the segment routing header.
Abstract:
Embodiments herein receive a request to reserve a fog computing resource for an end device, where the request includes a specified future time at which the fog computing resource will be used by the end device. It is determined that sufficient fog computing resources are available at the specified future time on a first fog node of a plurality of fog nodes. The fog computing resource of the first fog node is reserved for the specified future time, and an address corresponding to the first fog node is transmitted.
Abstract:
A method includes obtaining performance characterization values from endpoints managed by a first fog node at a first hierarchical level in a hierarchy of fog nodes. The method includes changing a first operating characteristic of the wireless network based on the performance characterization values. The first operating characteristic affects the operation of one or more of the endpoints. The method includes transmitting a portion of the performance characterization values to a second fog node at a second hierarchical level in the hierarchy of fog nodes. The method includes changing a second operating characteristic of the wireless network based on an instruction from the second fog node. The second operating characteristic affects the operation of the first fog node and/or other fog nodes at the first hierarchical level. Changing one or more of the first operating characteristic and the second operating characteristic satisfies an operating threshold for the wireless network.