Abstract:
Aspects of the disclosed technology address the problems of manually identifying and optimizing service function chaining (SFC) performance in response to changes in traffic profiles. In one aspect of the present disclosure, a method includes monitoring, by a first network component, incoming data packets; detecting, by the first network component, a change in a traffic profile of the incoming data packets; generating, by the first network component, in-band information on changes in the traffic profile; and transmitting, by the first network component, the in-band information with one or more data packets of the incoming data packets, the in-band information being used by a second network component to adjust one or more corresponding settings for servicing the incoming data packets.
Abstract:
In one embodiment, a server creates a reproduction environment of a particular condition of a particular device, the reproduction environment having a device under test (DUT) representative of the particular device, and also being seeded with features regarding the particular condition. The server generates a plurality of models for reaching a target state of the particular condition, each of the plurality of models having differing actions. According to the techniques herein, the server then iteratively refines a minimal model based on the actions of the plurality of models and whether those actions during testing of the DUT get closer to or further from the target state. In response to determining that the minimal model can no longer be further refined during the iterative refining, the server then stores the minimal model as a solution model indicating a given minimal set and order of actions required to reach the target state.
Abstract:
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Abstract:
Disclosed are systems, methods and non-transitory computer-readable mediums for dynamically presenting and updating a directed time graph displayed in a graphical user interface. In some examples, the method can include displaying a suggested path within a graphical user interface on a computer screen, the suggested path can include outstanding issues of elements of a network. The displaying the suggested path can include determining based on one or more factors an efficient ordering of the outstanding issues and ordering the outstanding issues based on the one or more factors. The method can also include monitoring, at regular intervals, updates to the one or more outstanding issues and automatically updating the suggested path, by a processor, based on the updates to the one or more outstanding issues.
Abstract:
Aspects of the disclosed technology address the problems of manually identifying and optimizing service chain (SC) performance bottlenecks by providing solutions for automatically identifying and tuning various SC parameters. In some aspects, a SC optimization process of the disclosed technology includes the replication or cloning of a SC for which traffic flow is to be optimized. Traffic flows for the production chain can then be simulated over one or more SC clones to identify and tune individual system parameters, for example, to determine if the simulated changes produce a positive, negative, or neutral change in flow performance. Systems and machine-readable media are also provided.
Abstract:
In one embodiment, a method comprises receiving, by a broker device in a persistent data network, a request from one or more sensor consumers for sensor data originated by one or more isolated sensor devices, the isolated sensor devices not reachable by any wired or wireless infrastructure; sending, by the broker device via the persistent data network in response to the request, a message to a mobile collector device indicating an instruction for obtaining the sensor data from the one or more isolated sensor devices; and receiving, by the broker device in the persistent data network, the sensor data from the mobile collector device having established a local data connection with the one or more isolated sensor devices, and in response causing sending of a credit for receiving the sensor data to a registered user of the mobile collector device.
Abstract:
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Abstract:
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Abstract:
Techniques are described to enable selective content sharing in a video conference. In one example, a conferencing system obtains first display content from a first endpoint device in a video conference session. The conferencing system streams the first display content to a second endpoint device in the video conference session and obtains second display content from the second endpoint device. While streaming the first display content to the second endpoint device, the conferencing system streams the second display content to a third endpoint device in the video conference session and prevents streaming of the second display content to the first endpoint device.
Abstract:
A network management station is configured to test a computer network through digital model personas. The network management station obtains network behavior data corresponding to user(s) of the computer network and generates digital model(s) based on the network behavior. The network management station deploys a first digital model persona based on a first digital model among the generated digital models. The first digital model persona operates at a first network location to test the computer network.