Abstract:
Presented herein are service-function chaining techniques that enable data plane signaling of a packet as a candidate for capture at various network nodes along a service function path of a service function chain. That is, a capture signal is embedded within the respective packet that carries a user traffic. The signaling occurs in-band, via the data plane, such that classification of the packet for capture beneficially occurs, at the ingress node of the network, once to which subsequent network nodes along a service function path are signaled to capture or further inspect the packet for capture. Service function chaining treats service functions as resources with associated attributes available for scheduled consumption to which selective traffic are steered according to a policy construct to the requisite network-service resources.
Abstract:
A network device may connect to a smart-enabled network. Once connected, the network device may receive a network address for a network management server (NMS). Having the network address for the NMS, the network device may generate a vCard comprising the attributes necessary for registering with the NMS. The network device may then communicate the vCard to the NMS. The NMS may then be configured to identify, register, and add the network device to a directory.
Abstract:
Meta behavioral analytics techniques include, at one or more network devices that are operatively coupled to a plurality of behavioral analytics systems associated with a network or system, monitoring data outputs of the plurality of behavioral analytics systems that are representative of activity in the network or system. The one or more network devices correlate the data outputs from two or more of the plurality of behavioral analytics systems that are dedicated to analyzing different subject matter domains. Additionally, based on the correlating, the one or more network devices detect a previously unidentified condition in (a) the network or system; or (b) one of the plurality of behavioral analytics systems.
Abstract:
A network device receives a data packet including a source address and a destination address. The network device drops the data packet before it reaches the destination address and generates an error message indicating that the data packet has been dropped. The network device encapsulates the error message with a segment routing header comprising a list of segments. The first segment of the list of segments in the segment routing header identifies a remote server. The network device sends the encapsulated error message to the remote server based on the first segment of the segment routing header.
Abstract:
In one embodiment, a first wireless unmanned aerial vehicle (UAV)-locating signal is transmitted by a wireless network access point in a network based on a first UAV-locating mode selected from a plurality of UAV-locating modes. The wireless network access point receives a wireless signal in response to the first transmitted UAV-locating signal, the wireless signal indicative of a location of an airborne UAV, and causes the determination of the location of the airborne UAV based on the received wireless signal. The wireless network access point transmits a second wireless UAV-locating signal based on a second UAV-locating mode selected from the plurality of UAV-locating modes. The selected UAV-locating modes control an emission pattern of an antenna of the wireless network access point.
Abstract:
In one embodiment, an autonomous carrier transports a fog computing module to an enclosure at a location determined to be in need of a particular fog computing resource, and aligns and anchors the fog computing module to the enclosure, where the aligning and anchoring is based on mating mechanical connectors on the fog computing module and enclosure. One or more electronic components of the fog computing module may then interface to the enclosure due to the anchoring, and the fog computing module activates at the location, accordingly. In one particular embodiment, the particular fog computing resource of the fog computing module is an additive resource to an existing fog computing resource module at the enclosure, and the existing fog computing resource module provides the mechanical connectors and interfaced electronic components of the enclosure.
Abstract:
In one embodiment, a first device in a network receives information regarding one or more nodes in the network. The first device determines a property of the one or more nodes based on the received information. The first device determines a degree of trustworthiness of the one or more nodes based on the received information. The first device attests to the determined property and degree of trustworthiness of the one or more nodes to a verification device. The verification device is configured to verify the attested property and degree of trustworthiness.
Abstract:
A method includes obtaining performance characterization values from endpoints managed by a first fog node at a first hierarchical level in a hierarchy of fog nodes. The method includes changing a first operating characteristic of the wireless network based on the performance characterization values. The first operating characteristic affects the operation of one or more of the endpoints. The method includes transmitting a portion of the performance characterization values to a second fog node at a second hierarchical level in the hierarchy of fog nodes. The method includes changing a second operating characteristic of the wireless network based on an instruction from the second fog node. The second operating characteristic affects the operation of the first fog node and/or other fog nodes at the first hierarchical level. Changing one or more of the first operating characteristic and the second operating characteristic satisfies an operating threshold for the wireless network.
Abstract:
Various implementations disclosed herein enable transforming mutable wireless coverage areas using network coverage vehicles (NVCs) that are orchestrated by a network coverage controller. In various implementations, the method includes receiving coverage area performance characterization values from NCVs configured to provide a plurality of mutable wireless coverage areas. In various implementations, an arrangement of the mutable wireless coverage areas mutably defines the service area, which changes in accordance with changes to the arrangement of the mutable wireless coverage areas. In various implementations, the method also includes determining NCV operation adjustments for some of the NCVs based on the received coverage area performance characterization values in accordance with a service performance metric; and, altering an arrangement of one or more of the plurality of mutable wireless coverage areas within the service area by providing the NCV operation adjustments to some of the NCVs.
Abstract:
In one embodiment, an intermediate node, of a multi-stage process path through a computer network, receives a workload message with an associated latency budget to complete the multi-stage process at a final stage device. In response, the intermediate node determines a current latency from an initial stage device for the workload message to the receiving of the workload message, and also determines a remaining portion of the latency budget based on the current latency. In response to the remaining portion of the latency budget being less than expected at the intermediate node, the intermediate node may perform one or more latency-reducing actions, and then transmits the workload message toward the final stage device.