Abstract:
Methods, apparatus, and systems for the process-efficient generation of data records for data communications involving groups or aggregates of user equipment (UE), such as IoT devices, are described. In one illustrative example, for each one of a plurality of UEs associated with a group or aggregation identifier (ID), a request which includes data indicative of a network resource usage event of the UE is received and the data are stored in association with the group or aggregation ID. In response to identifying a predetermined condition, the data indicative of the network resource usage events associated with the group or aggregation ID are aggregated, and a request for generating a data record based on the aggregated data is sent to a data function for generating the data record. The generated data record (e.g. a CDR) may be stored for subsequent retrieval for reporting, analysis, network/communications management, or billing.
Abstract:
Techniques for interface bandwidth management. A wired interface bandwidth is configured for a wired interface of a router. A cellular interface bandwidth is configured for a cellular interface of cellular interfaces of the router. The cellular interface bandwidth includes an uplink bandwidth. One or more instantaneous uplink throughput values for the cellular interface are determined based on one or more uplink throughput per resource block values for the cellular interface. A predicted average uplink throughput for the cellular interface is determined based on the one or more instantaneous uplink throughput values. The uplink bandwidth is dynamically adjusted based on the predicted average uplink throughput determined for the cellular interface of the router.
Abstract:
A method is provided in one example embodiment and may include determining a predicted average throughput for each of one or more cellular interfaces and adjusting bandwidth for each of the one or more of the cellular interfaces based, at least in part, on the predicted average throughput determined for each of the one or more cellular interfaces. Another method can be provided, which may include determining a variance in path metrics for multiple cellular interfaces and updating a routing table for the cellular interfaces using the determined variance if there is a difference between the determined variance and a previous variance determined for the cellular interfaces. Another method can be provided, which may include monitoring watermark thresholds for a MAC buffer; generating an interrupt when a particular watermark threshold for the MAC buffer is reached; and adjusting enqueueing of uplink packets into the MAC buffer based on the interrupt.
Abstract:
A Unified Data Repository (UDR) proxy obtains first subscriber data from a first UDR of a first network operator, second subscriber data from a second UDR of a second network operator, and third subscriber data from a third UDR of an enterprise. The UDR proxy stores the first subscriber data, the second subscriber data, and the third subscriber data locally. The UDR proxy obtains a request to access a network asset that is accessible through the first network operator. Based on the first subscriber data, the second subscriber data, and the third subscriber data stored locally, the UDR proxy attempts to determine whether the request to access the network asset is authorized to access the network asset. In response to determining that the request to access the network asset is authorized, the UDR proxy permits access to the network asset.
Abstract:
A method is provided in one example embodiment and may include determining a predicted average throughput for each of one or more cellular interfaces and adjusting bandwidth for each of the one or more of the cellular interfaces based, at least in part, on the predicted average throughput determined for each of the one or more cellular interfaces. Another method can be provided, which may include determining a variance in path metrics for multiple cellular interfaces and updating a routing table for the cellular interfaces using the determined variance if there is a difference between the determined variance and a previous variance determined for the cellular interfaces. Another method can be provided, which may include monitoring watermark thresholds for a MAC buffer; generating an interrupt when a particular watermark threshold for the MAC buffer is reached; and adjusting enqueueing of uplink packets into the MAC buffer based on the interrupt.
Abstract:
A method is provided in one embodiment and includes establishing a primary wired access link between a first routing device and a second routing device, and establishing a backup wireless access link between the first routing device and the second routing device. The method further includes determining a status of the primary wired access link indicative of whether the primary wired access link between the first routing device and the second routing device has failed. The method still further include activating the backup wireless access link between the first routing device and the second routing device when it is determined that the status of the primary wired access link is indicative that the primary wired access link has failed.
Abstract:
Embodiments relate to a method for enhancing and prioritizing operation technology (OT) control systems in a safety instrumented system (SIS) environment by incorporating safety levels. The method includes receiving network packets associated with OT systems by network interface. From network packets, OT systems associated with safety integrity level (SIL) values are identified. In response to identifying OT control systems associated with SIL values, determining priority levels from SIL values of OT systems. The method includes identifying, among OT control systems, network packets associated with a critical OT system associated with a SIL value having a higher priority level. The critical OT system may be prioritized that comprises encoding the network packets of the critical OT system, with corresponding SIL value. The prioritized critical OT system may be prioritized based on SIL value and classified into a network group associated with a network tag to deliver traffic with higher priority.
Abstract:
Embodiments relate to a method for enhancing and prioritizing operation technology (OT) control systems in a safety instrumented system (SIS) environment by incorporating safety levels. The method includes receiving network packets associated with OT systems by network interface. From network packets, OT systems associated with safety integrity level (SIL) values are identified. In response to identifying OT control systems associated with SIL values, determining priority levels from SIL values of OT systems. The method includes identifying, among OT control systems, network packets associated with a critical OT system associated with a SIL value having a higher priority level. The critical OT system may be prioritized that comprises encoding the network packets of the critical OT system, with corresponding SIL value. The prioritized critical OT system may be prioritized based on SIL value and classified into a network group associated with a network tag to deliver traffic with higher priority.
Abstract:
In one embodiment, a process discovers network topology information of a particular computer network and creates a plurality of zones of devices in the particular computer network based on the network topology information. The process also discovers network communication activity patterns and endpoints of the particular computer network and creates a plurality of conduits between devices of the particular computer network based on the network communication activity patterns and endpoints of the particular computer network and association of the devices within the plurality of zones as described above.
Abstract:
Automatic onboarding of a device onto a cellular network may be provided through a Wireless Local Area Network (WLAN). Subsequent to a device connecting to a first network (e.g., the WLAN), information associated with the device and the first network may be received. One or more tags may be generated and an intent profile may be defined for the device based on the received information, where the intent profile may indicate at least a second network (e.g., the cellular network) that the device is enabled to connect with and one or more policies associated with the connection. The tags and intent profile may be transmitted to a service provider platform, and an onboarding profile template identified using the tags and the intent profile may be received from the service provider platform. The onboarding profile template may be provided to the device to enable connection to the second network.