Abstract:
High-level network policies that represent a virtual private network (VPN) as a high-level policy model are received. The VPN is to provide secure connectivity between connection sites of the VPN based on the high-level network policies. The high-level network policies are translated into low-level device configuration information represented in a network overlay and used for configuring a network underlay that provides the connections sites to the VPN. The network underlay is configured with the device configuration information so that the network underlay implements the VPN in accordance with the high-level policies. It is determined whether the network underlay is operating to direct traffic flows between the connection sites in compliance with the high-level network policies. If it is determined that the network underlay is not operating in compliance, the network underlay is reconfigured with new low-level device configuration information so that the network underlay operates in compliance.
Abstract:
High-level network policies that represent a virtual private network (VPN) as a high-level policy model are received. The VPN is to provide secure connectivity between connection sites of the VPN based on the high-level network policies. The high-level network policies are translated into low-level device configuration information represented in a network overlay and used for configuring a network underlay that provides the connections sites to the VPN. The network underlay is configured with the device configuration information so that the network underlay implements the VPN in accordance with the high-level policies. It is determined whether the network underlay is operating to direct traffic flows between the connection sites in compliance with the high-level network policies. If it is determined that the network underlay is not operating in compliance, the network underlay is reconfigured with new low-level device configuration information so that the network underlay operates in compliance.
Abstract:
In one example embodiment, a Self Organizing Network (SON) element is provided to communicate with at least one Long-Term Evolution (LTE) wireless network and at least one transport communication network. The SON element is operative to obtain information that relates to updated Neighbor Lists from a plurality of enodeBs (eNBs) belonging to the at least one LTE wireless network, and to convey information that relates to the updated Neighbor Lists obtained, to at least one managing entity belonging to the transport communication network.
Abstract:
In one example embodiment, a Self Organizing Network (SON) element is provided to communicate with at least one Long-Term Evolution (LTE) wireless network and at least one transport communication network. The SON element is operative to obtain information that relates to updated Neighbor Lists from a plurality of enodeBs (eNBs) belonging to the at least one LTE wireless network, and to convey information that relates to the updated Neighbor Lists obtained, to at least one managing entity belonging to the transport communication network.