In one embodiment, a method herein comprises: inputting, by a device, an input prompt to a first large language model to generate an output; computing, by the device, a reward metric in part by using a solver to process the output; tuning, by the device and based on the reward metric, a second large language model configured to correct errors of the first large language model using reinforcement learning; and using, by the device, the second large language model to correct an error of the first large language model.
In one embodiment, an electronic device includes a generally toroidal magnetic core having a first extension portion coupled to a first location of the generally toroidal magnetic core and a second extension portion coupled to a second location of the generally toroidal magnetic core generally opposite the first location and a common mode choke comprising a first wire and a second wire wound around the first extension portion and the second extension portion in a same winding direction. The first wire winds around the generally toroidal magnetic core in a first direction, and the second wire winds around the generally toroidal magnetic core in a second direction to form a primary winding. The electronic device further includes a transformer comprising the primary winding and a secondary winding, wherein the secondary winding of the transformer comprises a third wire and a fourth wire wound around the generally toroidal magnetic core in opposite directions.
Techniques are described for providing service level agreement performance in a link aggregation group computer networking environment. A performance measurement data packet such as a bi-directional forwarding detection (BFD) packet is received. The performance measuring data packet can be considered a parent performance measurement data packet is split into multiple child performance measurement data packets which are each different constituent links of a link aggregation database. The performance of each constituent is tested to determine which constituents satisfy service level agreement parameters. Data packets can then be sent to constituents that meet the data packet's service level agreement performance parameters while still allowing link aggregation grouping.
H04L 47/41 - Commande de fluxCommande de la congestion en agissant sur des flux ou des liens agrégés
H04L 47/2425 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS pour la prise en charge de spécifications de services, p. ex. SLA
4.
SAFETY MONITORING FOR CABLES TRANSMITTING DATA AND POWER
In one embodiment, a method generally comprises monitoring real-time electrical data at Power Sourcing Equipment (PSE) transmitting power over a cable to a Powered Device (PD), calculating thermal characteristics for the cable based on the monitored data, and periodically updating the thermal characteristics based on the monitored data. The power comprises multi-phase pulse power, the data comprises voltage and current measured for each phase of the multi-phase pulse power, and the voltage is greater than 60 volts at the PSE.
In one implementation, a device uses a large language model-based agent to perform a task in a network, to obtain a first result. The device executes code in the network to perform the task, to obtain a second result. The device makes a comparison between the first result and the second result. The device provides, based in part on the comparison, one or more performance metrics for the large language model-based agent for display.
G06F 40/58 - Utilisation de traduction automatisée, p. ex. pour recherches multilingues, pour fournir aux dispositifs clients une traduction effectuée par le serveur ou pour la traduction en temps réel
H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
6.
USING A CURRICULUM FOR REINFORCEMENT LEARNING TO TRAIN AN LLM-BASED NETWORK TROUBLESHOOTING AGENT
In one implementation, a device may determine how well a large language model-based troubleshooting agent for a network was able to perform during a first test having a first difficulty. The device may update the large language model-based troubleshooting agent using reinforcement learning based on how well the large language model-based troubleshooting agent was able to perform during the first test. The device may select a second difficulty for a second test based on how well the large language model-based troubleshooting agent was able to perform during the first test. The device may initiate the second test to assess how well the large language model-based troubleshooting agent is able to perform.
In one implementation, a device receives a prompt for input to a large language model of a troubleshooting agent for a computer network. The device generates, using the troubleshooting agent, an intermediate answer by inputting the prompt to the large language model. The device identifies a hyperlink to a view associated with the intermediate answer and provided by an online application associated with administration of the computer network. The device provides the hyperlink in conjunction with the intermediate answer for display.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
8.
USING AN LLM-BASED AGENT TO PROVIDE SELF-HEALING CAPABILITIES TO A NETWORK
In one implementation, a device makes a determination as to whether an issue identified in a network is eligible for self-healing. The device uses, based on the determination, a large language model-based agent to determine a root cause of the issue. The device identifies, using the large language model-based agent, a set of one or more self-healing actions to address the root cause of the issue. The device causes, using the large language model-based agent, performance of the set of one or more self-healing actions in the network.
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
9.
LLM-BASED NETWORK TROUBLESHOOTING USING EXPERT-CURATED RECIPES
In one implementation, a device receives an input request for a large language model-based network troubleshooting agent regarding an issue in a network. The large language model-based network troubleshooting agent performs a lookup of a recipe based on the input request, wherein the recipe comprises contextual information for the issue. The device generates, by the large language model-based network troubleshooting agent, a prompt for a large language model based on the input request and on the recipe. The device provides, by the large language model-based network troubleshooting agent, the prompt to the large language model to troubleshoot the issue in the network.
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
10.
OBJECTIVE SELECTION FOR LLM-BASED NETWORK TROUBLESHOOTING AND MONITORING AGENTS
In one implementation, a device receives an input request for a large language model-based troubleshooting agent for a network. The device selects an optimization criterion for the large language model-based troubleshooting agent based on the input request. The device provides the optimization criterion to the large language model-based troubleshooting agent to cause the large language model-based troubleshooting agent to select a particular large language model to process the input request based on the optimization criterion. The device sends, to a user interface, an indication of a result of the particular large language model processing the input request.
Systems and techniques are provided for path tracing. For example, a process can include establishing a path tracing session associated with path tracing (PT) probe packets from a PT source node of an IPv6 network fabric. A PT probe packet can be received with a first IPv6 Destination Options Header with Path Tracing Option (DOH-PT) header that encodes path tracing information of the PT source node and indicates respective path tracing information for each PT midpoint node along a path from the PT source node to a PT sink node of the IPv6 network fabric. The received PT probe packet can be updated to include a second DOH-PT header that encodes path tracing information of the PT sink node. An updated PT probe packet includes the first and second DOH-PT headers and can be encapsulated with an additional IPv6 header corresponding to forwarding information of a collector node.
An epoch scheme for Station (STA) privacy and, specifically, a structured Media Access Control (MAC) address rotation schedule for STAs may be provided. Providing an epoch scheme for STA privacy can include determining epoch parameters for a STA, the epoch parameters comprising a minimum epoch period duration and a maximum epoch period duration. The epoch parameters are sent to the STA, wherein the STA is operable to rotate a MAC address each epoch period at a time between the minimum epoch period duration and the maximum epoch period duration. A mapping of the STA and the MAC address can be updated each epoch period.
A method of cross-domain policy orchestration may include executing, with a cross-domain automation (CDA) controller, a macro-segmentation of a plurality of domains based at least in part on metadata defining a mapping to a corresponding plurality of domain controllers, and executing, with the CDA controller, a micro-segmentation of policies within a group based at least in part on a merged policy matrix obtained from policies of the domain controllers.
A method and system for implementing security policies for a user device based on one or more user device parameters. When a user device joins a domain, the security policy agent determines one or more security policies for the user device based on one or more parameters of the user device. The user parameters may include the type of user device, a user group, an application to be used, etc. The security polies are sent to the user device. The user device generates a data packet having metadata indicating the one or more device parameters. The data packet is sent to a remote security service where security policies are implemented based on the metadata.
Techniques to move high current power distribution layers for integrated circuit core power and serializer-deserializer (SERDES) power into a center area of the integrated circuit footprint. This provides a more reliable and higher current distribution into the center of a large integrated circuit footprint, without causing disruption of high speed signal routing or increased signal integrity burden to the high speed signals. Arrangements and methods for routing out the core power area of a main printed circuit board under an integrated circuit and replacing it with a custom power printed circuit board (power plug) that is attached by a metalized paste sintering process. This provides a more reliable and higher current distribution into the center of a large integrated circuit or other high-power component, without causing disruption of high speed signal routing.
Techniques are provided to extend training to an end-to-end method, where a ready -to-send (RTS) variable is added to training frames to indicate that, on a current interface, the Physical Medium Attachment (PMA) sublayer, with all its lanes, has valid data and appropriate clock timing and is ready to send data to the output when training is completed. These techniques are applicable to a PMA that is an endpoint (and thus has only a single network interface involved) as well as to PMAs that have two network interfaces connected to segment partners. Moreover, these techniques may be configured to work with legacy devices that do not support segmented link training.
H04L 69/14 - Protocoles multicanaux ou multi-liaisons
H04L 69/323 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche physique [couche OSI 1]
H04L 69/324 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche liaison de données [couche OSI 2], p. ex. HDLC
Irregular absence signaling may be provided. An Access Point (AP) may receive an irregular absence report from a station. The AP may parse the irregular absence report to determine upcoming absence periods of the station for non-Peer-to-Peer (P2P) traffic. The AP may schedule Transmit Opportunity's (TxOPs) of the non-P2P traffic to the station based on the determined upcoming absence periods.
Signaling preference order of links and maximum allowed links for multi-link operation may be provided. First, an Access Point (AP) Multilink Device (MLD) may receive an indication that a non-AP MLD supports preference ordering. Then the AP MLD may indicate that it supports preference ordering. Next, the AP MLD may receive from the non-AP MLD, a desired preference order. The AP MLD may then consider the desired preference order.
Signaling preference order of links and maximum allowed links for multi-link operation may be provided. First, an Access Point (AP) Multilink Device (MLD) may receive an indication that a non-AP MLD supports preference ordering for requested links (that are indicated in the Per-STA profile sub-elements). Then the AP MLD may indicate that it supports preference ordering for requested links (that are indicated in the Per-STA profile sub-elements). Next, the AP MLD may receive from the non-AP MLD, a desired preference ordering for the requested link. The AP MLD may then consider the desired preference ordering for requested links.
Control of service provider information collection and, particularly, control of Access Point (AP) location crowdsourcing and time zone information may be provided. A time zone to use in a venue can be determined. A time zone field can be set indicating the time zone. A venue mobility field can be set indicating the venue is mobile. One or more elements comprising the time zone field and the venue mobility field can be sent to a Station (STA), wherein the STA is operable to use the time zone according to the time zone field and based on the venue mobility field indicating the venue is mobile.
Techniques for improved peer-to-peer communication are provided. A first peer-to-peer device associated with a first wireless AP, may transmit a first peer-to-peer transmission schedule to a second wireless AP, where the first peer-to-peer transmission schedule was accepted by the first wireless AP. In response to receiving an acceptance from the second wireless AP, the first wireless AP transitions from to the second wireless AP. The first peer-to-peer device performs peer-to-peer communication in accordance with the first peer-to-peer transmission schedule.
Access network monitoring in a wireless federation may be provided. A plurality of access requests may be received from a probe device. Each of the plurality of access requests may comprise access request information. Next, an availability metric may be determined based on an amount of the plurality of access requests received and the access request information. The availability metric may then be reported.
In one implementation, a device performs, using a using a large language model-based troubleshooting agent, troubleshooting of a plurality of issues in a network indicated by a plurality of support tickets opened by users of the network. The device aggregates, based on results of the troubleshooting, the plurality of support tickets into a master support ticket. The device obtains a resolution to the master support ticket from a support engineer. The device uses the resolution to the master support ticket in conjunction with the large language model-based troubleshooting agent to troubleshoot a new support ticket.
H04L 41/5054 - Déploiement automatique des services déclenchés par le gestionnaire de service, p. ex. la mise en œuvre du service par configuration automatique des composants réseau
G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence
H04L 41/5074 - Traitement des plaintes des utilisateurs ou des tickets d’incident
24.
INTELLIGENT AUTO-PROMPT ENGINE FOR NETWORK MANAGEMENT
A unified prompt-based network management system that involves an intelligent auto-prompt engine generating contextualized prompts for an artificial intelligence model. The artificial intelligence model generates instructions and/or solutions and adapts to different application scenarios based on an enterprise network knowledge and reverse inference(s). Specifically, methods are provided that involve obtaining input data related to a configuration or an operation of one or more assets in an enterprise network and generating a contextualized prompt based on the input data, network knowledge information of the enterprise network, and at least one reverse inference generated using an artificial intelligence model. The methods further involve providing the contextualized prompt to the artificial intelligence model for generating a tailored response to the input data, wherein the tailored response includes a set of actionable tasks to be performed with respect to the one or more assets of the enterprise network.
H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
H04L 41/0813 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres
H04L 41/12 - Découverte ou gestion des topologies de réseau
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
An epoch scheme for Station (STA) privacy and, specifically, a structured Media Access Control (MAC) address rotation schedule for STAs may be provided. Providing an epoch scheme for STA privacy can include determining epoch parameters for a STA, the epoch parameters comprising a minimum epoch period duration and a maximum epoch period duration. The epoch parameters are sent to the STA, wherein the STA is operable to rotate a MAC address each epoch period at a time between the minimum epoch period duration and the maximum epoch period duration. A mapping of the STA and the MAC address can be updated each epoch period.
Irregular absence signaling may be provided. An Access Point (AP) may receive an irregular absence report from a station. The AP may parse the irregular absence report to determine upcoming absence periods of the station for non-Peer-to-Peer (P2P) traffic. The AP may schedule Transmit Opportunity's (TxOPs) of the non-P2P traffic to the station based on the determined upcoming absence periods.
H04W 74/0816 - Accès non planifié, p. ex. ALOHA utilisant une détection de porteuse, p. ex. accès multiple par détection de porteuse [CSMA] avec évitement de collision
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
In one implementation, a device receives feedback from a user regarding an output of a large language model-based troubleshooting agent for a network that the large language model-based troubleshooting agent generates in response to an input request from the user. The device determines a network scenario associated with the input request and the output. The device causes, based on the feedback, the network scenario to be replicated in a test network. The device updates the large language model-based troubleshooting agent in part by using the large language model-based troubleshooting agent to assess the network scenario in the test network.
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
28.
LAYOUT ARRANGEMENTS FOR PLUGGABLE OPTICS IN NETWORKING EQUIPMENT TO ACHIEVE SHORT ELECTRICAL SIGNAL TRACES
A device is provided that includes a printed circuit board and an integrated circuit that is installed on the printed circuit board. A plurality of optical transceiver modules are positioned on the printed circuit board around three or more sides of the integrated circuit. The plurality of optical transceiver modules are to be in operable communication with the integrated circuit. A faceplate is installed that has multiple face portions that expose receptacles for the plurality of optical transceiver modules around the integrated circuit.
Sending Quality-of-Experience (QoE) information to clients for selecting an Access Point (AP) may be provided. Sending QoE information can include determining values for a plurality of QoE attributes. Based on the values for the plurality of QoE attributes, a QoE indicator is determined. The QoE indicator is sent to a client, wherein the client is operable to use the QoE indicator to select an Access Point (AP) to connect to.
Techniques for an application watcher system that includes a plurality of watchers that obtain various types of application configurations and/or state data which is used to make networking decisions and drive networking operations. The watchers of the application watcher system may each be configured to communicate with an application orchestration system that manages the application and obtain different types of application configurations and/or state data. In some instances, the application watcher system may run on a network orchestrator of the network, or be in communication with the network orchestrator, and provide application configurations and/or state data to the network orchestrator to make networking decisions.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
H04L 41/085 - Récupération de la configuration du réseauSuivi de l’historique de configuration du réseau
31.
AI-BASED NETWORK TROUBLESHOOTING WITH EXPERT FEEDBACK
In one implementation, a device uses a large language model-based agent to identify a task to correct an issue in a network. The device makes a determination that the large language model-based agent cannot complete the task. The device identifies, based on the determination, a subject matter expert to help complete the task. The device sends a request to the subject matter expert to complete the task.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
G10L 15/22 - Procédures utilisées pendant le processus de reconnaissance de la parole, p. ex. dialogue homme-machine
Sending Quality-of-Experience (QoE) information to clients for selecting an Access Point (AP) may be provided. Sending QoE information can include determining values for a plurality of QoE attributes. Based on the values for the plurality of QoE attributes, a QoE indicator is determined. The QoE indicator is sent to a client, wherein the client is operable to use the QoE indicator to select an Access Point (AP) to connect to.
H04W 48/14 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration utilisant une requête de l’utilisateur
H04W 48/16 - ExplorationTraitement d'informations sur les restrictions d'accès ou les accès
Control of service provider information collection and, particularly, control of Access Point (AP) location crowdsourcing and time zone information may be provided. A time zone to use in a venue can be determined. A time zone field can be set indicating the time zone. A venue mobility field can be set indicating the venue is mobile. One or more elements comprising the time zone field and the venue mobility field can be sent to a Station (STA), wherein the STA is operable to use the time zone according to the time zone field and based on the venue mobility field indicating the venue is mobile.
H04W 4/42 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p. ex. communication véhicule-piétons pour les véhicules de transport collectif, p. ex. les autobus, les trains ou les aéronefs
H04W 8/00 - Gestion de données relatives au réseau
The present disclosure describes an optical system that uses a source optical signal to bias a receiver photodiode. The system includes an optical source, a receiver photodiode, a first biasing photodiode, a variable optical attenuator, and a compensation photodiode. The optical source produces a first optical signal. The receiver photodiode converts a second optical signal into an electrical signal. The first biasing photodiode generates a bias voltage for the receiver photodiode based on a first portion of the first optical signal. The variable optical attenuator produces a third optical signal based on (i) a second portion of the first optical signal and (ii) a portion of the electrical signal. The compensation photodiode passes the portion of the electrical signal based on the third optical signal.
G02F 1/01 - Dispositifs ou dispositions pour la commande de l'intensité, de la couleur, de la phase, de la polarisation ou de la direction de la lumière arrivant d'une source lumineuse indépendante, p. ex. commutation, ouverture de porte ou modulationOptique non linéaire pour la commande de l'intensité, de la phase, de la polarisation ou de la couleur
Techniques described herein can perform obfuscation detection on command lines used at computing devices in a network. In response to detecting obfuscation in a command line, the disclosed techniques can output a notification for use in connection with network security analysis. The command line obfuscation detection techniques include pre-processing command line input data and converting command lines into token groups. The token groups are then provided as an input to a natural language processor or other machine learned model, which is trained to identify obfuscation probabilities associated with token groups can corresponding command lines. A notification is generated to trigger further analysis in response to an obfuscation probability exceeding a threshold obfuscation probability.
In one aspect, a computer-implemented method for redundant multicast groups, includes receiving a request for an element of content from a device, where the element of content is associated with a first source address and a redundant source group identifying multiple servers in a network including the element of content, determining a second source address within the redundant source group has a shorter distance to a location of the device, and routing packets associated with the element of content from the second source address to the device. The method further includes determining the connection has failed, and routing, automatically upon determining the connection has failed, the device to a third source address of the multiple servers, where the third source address is selected according to a server selection policy.
Basic Service Set (BSS) resource reservation may be provided. BSS resource reservation may include determining a time window for a to accommodate a transmission of a target Station (STA) in a BSS, wherein the BSS further comprises one or more other STAs. An AP may then transmit a reservation scheduling frame, to claim access of a channel, inform the target STA of the time window, and reserve the channel for a duration defined by the time window.
A method, computer system, and computer program product are provided for deploying software using a versioning schema. An n-dimensional string is obtained that describes a version of a component, wherein a value for each dimension describes a particular feature of the component. The n-dimensional string is analyzed using a template to determine each feature of the component. It is determined whether to deploy the version of the component based on the analyzing and based on criteria related to one or more features of the component.
Secure device location sharing may be provided. Over a secured link, an indication that a peer-to-peer device desires Automated Frequency Coordination (AFC) based location sharing may be received. Then, from the peer-to-peer device over the secured link, an identity provider (IdP) may be received for the peer-to-peer device. Next, validation of the peer-to-peer device may be requested from the IdP. From the IdP in response to requesting validation of the peer-to-peer device from the IdP, authentication for the peer-to-peer device and an indication that the peer-to-peer device needs AFC based location sharing may be received. An indication that the peer-to-peer device is approved for AFC based location sharing may then be sent to the peer-to-peer device over the secured link.
Coordinated Frequency Division Multiple Access (C-FDMA) may be provided. C-FDMA may include determining sub-channels of a channel for each of a plurality of Access Points (APs). The sub-channels may then be assigned to the plurality of APs. Transmit Opportunities (TxOps) may be scheduled for the plurality of APs on the sub-channels.
A method includes generating a visual representation of one or more multicast data trees over a service provider network, each multicast data tree exchanging data between two or more of a plurality of nodes of an entity operating over the service provider network; determining a respective network bandwidth usage over each of the one or more multicast data trees and a network bandwidth waste based on current bandwidth usage of existing data tunnels of one or more multicast data trees and replication distances associated with the plurality of nodes; modifying the one or more multicast data trees based on at least the respective network bandwidth usage over each of the one or more multicast data trees to yield a modification; generating a traffic routing policy to implement the modification; and transmitting a notification to a subset of the plurality of nodes affected by the traffic routing policy.
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
Coordinated Frequency Division Multiple Access (C-FDMA) for the simultaneous transmission of a basic Physical Layer Protocol Data Unit (PPDU) may be provided. C-FDMA may include determining sub-channels of a channel for one or more Access Points (APs). The sub-channels may then be assigned to the one or more APs. Transmit Opportunities (TxOps) may be scheduled for the one or more APs on the sub-channels. It may then be determined that a basic PPDU and an enhanced PPDU will be simultaneously transmitted on adjacent sub-channels. In response to determining the basic PPDU and the enhanced PPDU will be simultaneously transmitted on adjacent sub-channels, one or more Resource Units (RUs) of a sub-channel the enhanced PPDU will be transmitted on may be selected to disable transmission in.
H04W 72/541 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de qualité en utilisant le niveau d’interférence
43.
COUPLED CONDUCTORS IN TWINAX CABLE AND STRIPLINE PRINTED CIRCUIT BOARD FOR SKEW MITIGATION
Techniques are provided to mitigate serializer-deserializer performance limiting positive/negative (P/N) skew issues in high-speed cable channels. This may be achieved by adding stripes with low/high dielectric constant (dk) material compared to the main dielectric surrounding cable wires. By adding strips/ stripes in the main dielectric, a non-homogeneous dielectric structure is created, and this results in greater coupling between the signal conductors in the cable, which in turn reduces skew impact. This may be useful in twinaxial cables as well as stripline printed circuit boards.
Coordinated Frequency Division Multiple Access (C-FDMA) may be provided. C-FDMA may include determining sub-channels of a channel for each of a plurality of Access Points (APs). The sub-channels may then be assigned to the plurality of APs. Transmit Opportunities (TxOps) may be scheduled for the plurality of APs on the sub-channels.
H04W 84/12 - Réseaux locaux sans fil [WLAN Wireless Local Area Network]
H04W 72/541 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de qualité en utilisant le niveau d’interférence
Techniques for forward error correction are disclosed. These techniques include receiving a forward error correction codeword transmitted over a communication network, the codeword including a parity portion and a payload portion. The techniques further include determining, based on the parity portion, to disable forward error correction for the codeword. The techniques further include disabling forward error correction for the codeword.
Embodiments for handling multidestination traffic in a network are described. It is determined that a destination of a packet, received at a network device, is a multihomed destination. In response to determining that the destination of the packet is a multihomed destination, a hash value is determined from one or more header values of the packet using a hash function. The device refrains from forwarding the packet to the destination using a shadow hash forwarding table and the has value based on determining that the network device is not a designated forwarder for the packet, where the shadow hash forwarding table is used rather than a hash forward table based at least in part on determining that an updated forwarding table has not converged in the network.
A method includes receiving, at a first edge node, an Internet Protocol (IP) multicast address of a first silent host node. The method further includes receiving, at a second edge node, an IP multicast address of a second silent host node. The IP multicast address of the first silent host node is equal to the IP multicast address of the second silent host node. The method further includes storing the IP multicast address of the first and second silent host node in a shared entry of a routing table. The method further includes receiving, at a third edge node, a packet from a third host node and determining that a destination address of the packet corresponds to the IP multicast address stored in the shared entry of the routing table. The method further includes sending the packet to both the first host node and the second host node.
Embodiments relate to a method for enhancing and prioritizing operation technology (OT) control systems in a safety instrumented system (SIS) environment by incorporating safety levels. The method includes receiving network packets associated with OT systems by network interface. From network packets, OT systems associated with safety integrity level (SIL) values are identified. In response to identifying OT control systems associated with SIL values, determining priority levels from SIL values of OT systems. The method includes identifying, among OT control systems, network packets associated with a critical OT system associated with a SIL value having a higher priority level. The critical OT system may be prioritized that comprises encoding the network packets of the critical OT system, with corresponding SIL value. The prioritized critical OT system may be prioritized based on SIL value and classified into a network group associated with a network tag to deliver traffic with higher priority.
H04L 41/06 - Gestion des fautes, des événements, des alarmes ou des notifications
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
Techniques for achieving hybrid control over overlay and underlay path selection by integrating underlay path identities into software-defined wide area network (SD-WAN) sessions to create individual SD-WAN sessions for each underlay path. The techniques may include receiving first path identification data associated with an underlay path of an overlay network domain that is disposed between a first edge node and a second edge node of an SD-WAN system. Based on the first path identification data, an SD-WAN session may be generated that is to utilize the underlay path for sending traffic through the overlay network domain. In some examples, the underlay path may be mapped to the SD-WAN session and the SD-WAN session may be bound to a data plane output forwarding chain associated with the underlay path such that the traffic sent over the SD-WAN session traverses the underlay path of the overlay network domain.
H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
H04L 45/50 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données utilisant l'échange d'étiquettes, p. ex. des commutateurs d'étiquette multi protocole [MPLS]
H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée
In one implementation, a method is disclosed comprising: identifying, by a device, a plurality of functions within a source code based on one or more programmatic annotations of each of the plurality of functions within the source code; monitoring, by the device, execution characteristics associated with each of the plurality of functions within the source code during execution; constructing, by the device, a function call graph from the plurality of functions wherein each particular function in the function call graph is annotated with corresponding execution characteristics; and partitioning, by the device and based on the function call graph and one or more deployment specifications, the plurality of functions within the source code into singularly executable function capsules that meet the one or more deployment specifications.
In one implementation, a method is disclosed comprising: determining, by a process, a network topology of a particular computer network and capabilities of particular devices within the network topology; determining, by the process, a logical framework of the particular computer network; mapping, by the process, access control and segmentation features of the particular devices to the logical framework based on the capabilities of the particular devices; and causing, by the process, mapped access control and segmentation features to be implemented to enforce the logical framework within the network topology.
Techniques are provided to mitigate serializer-deserializer performance limiting positive/negative (P/N) skew issues in high-speed cable channels. This may be achieved by adding stripes with low/high dielectric constant (dk) material compared to the main dielectric surrounding cable wires. By adding strips/stripes in the main dielectric, a non-homogeneous dielectric structure is created, and this results in greater coupling between the signal conductors in the cable, which in turn reduces skew impact. This may be useful in twinaxial cables as well as stripline printed circuit boards.
Techniques are provided to extend training to an end-to-end method, where a ready-to-send (RTS) variable is added to training frames to indicate that, on a current interface, the Physical Medium Attachment (PMA) sublayer, with all its lanes, has valid data and appropriate clock timing and is ready to send data to the output when training is completed. These techniques are applicable to a PMA that is an endpoint (and thus has only a single network interface involved) as well as to PMAs that have two network interfaces connected to segment partners. Moreover, these techniques may be configured to work with legacy devices that do not support segmented link training.
The present disclosure relates to an optical module and a method of operating the optical module. The optical module includes transmission channels and a monitor channel. The transmission channels produce a plurality of optical signals. Each transmission channel includes an equalizer circuit and a first converter. The equalizer circuit adjusts a received electrical signal to produce an adjusted electrical signal, and the first converter converts the adjusted electrical signal into the optical signal produced by the respective transmission channel. The monitor channel includes an optical multiplexer, a second converter, and a processing circuit. The optical multiplexer selects a first optical signal produced by a first transmission channel of the plurality of transmission channels. The second converter converts the first optical signal into a first electrical signal. The processing circuit adjusts a first equalizer circuit of the first transmission channel. Adjusting the first equalizer circuit adjusts the first optical signal.
A method comprises: at a control entity configured to communicate with a network: linking a user identifier of a user having an account for call-related information to a hardware identifier of a device to be sent to the user, to produce linked identifiers; loading on the device a limited use token associated with the user that enables only basic call functions on the device, and prevents the device from accessing the account; determining whether the user possesses the device based on the linked identifiers and proximity pairing of the device with a pairing device; and based on determining, either provisioning the device with a full access token that enables full calling functions on the device and grants full access to the account by the device, or not provisioning the device with the full access token to prevent access to the account.
A single-shot graph state generator prepares matter qubits in an entangled graph state. Each matter qubit may be in a first state, a second state, or an excited state. The single-shot graph state generator drives the matter qubits with one or more pulses that cause a transition from the first state to the excited state. A decay of a matter qubit from the excited state to the first state generates a corresponding photonic qubit. The single-shot graph state generator measures the matter qubits to teleport the entangled graph state to the photonic qubits.
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p. ex. couplage ou commande de qubit
G06N 10/20 - Modèles d’informatique quantique, p. ex. circuits quantiques ou ordinateurs quantiques universels
57.
TECHNIQUES TO FACILITATE CONSUMER-DEFINED WORKLOADS FOR A NETWORK SLICE OF A SLICE PROVIDER NETWORK
Provided herein are techniques to facilitate providing consumer-defined workloads for a network slice of a slice provider network. In at least one example, a method may include transmitting a query to a slice provider function for topology information of an instantiated network slice in which the instantiated network slice includes slice resources provided at a plurality of network locations. The method may further include obtaining the topology information that identifies, at least in part, the plurality of network locations at which the slice resources and identifying, based at least in part on the topology information, at least one network location of the instantiated network slice at which to instantiate a consumer-defined workload, and transmitting a request to instantiate the consumer-defined workload that includes at least one location identifier of the at least one network location and a workload identifier of the consumer-defined workload to be instantiated.
H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p. ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p. ex. prêt à l’emploi [plug-and-play]
H04L 41/122 - Découverte ou gestion des topologies de réseau des topologies virtualisées, p. ex. les réseaux définis par logiciel [SDN] ou la virtualisation de la fonction réseau [NFV]
In one aspect, a method includes sending, by a first network gateway component, an echo message to a network device, wherein the echo message is sent over a user plane of a wireless communication network; determining by the network gateway component, whether an echo response is received in response to the echo message; and sending, to a control plane network gateway component of the wireless communication network, a connection failure message upon determining that the echo response is not received, the connection failure message triggering the control plane network gateway component to select a second user plane network gateway component for user plane data communication with the network device.
H04W 76/16 - Établissement de connexions à liens multiples sans fil utilisant des technologies de réseaux centraux différentes, p. ex. une voie de commutation de paquets combinée à une voie de commutation de circuits
H04W 48/00 - Restriction d'accèsSélection de réseauSélection de point d'accès
The disclosed technology addresses the need in the art for systems and methods of dynamic but stateless NAT encryption and decryption. The disclosed technology provides a robust encryption/decryption algorithm for concurrently obfuscating source and destination IPv6 addresses for SNAP deployments with 100% reversal and zero collisions, thereby providing protection to both the source and destination IPv6 simultaneously.
Present disclosure includes determining, at two or more gateway nodes that each communicate with a plurality of branch nodes and a plurality of resources, dynamically a path between each of the plurality of branch nodes and each of the plurality of resources, wherein the path includes one or more virtual routers; generating, at the two or more gateways, dynamically a path length based upon a number of virtual routers each path traverses; automatically translating the path length to an overlay management protocol route preference for each of the plurality of resources.
Basic Service Set (BSS) resource reservation may be provided. BSS resource reservation may include determining a time window to accommodate a transmission of a target Station (STA) in a BSS, wherein the BSS further comprises one or more other STAs. An AP may then transmit a reservation scheduling frame, to claim access of a channel, inform the target STA of the time window, and reserve the channel for a duration defined by the time window.
H04W 28/16 - Gestion centrale des ressourcesNégociation de ressources ou de paramètres de communication, p. ex. négociation de la bande passante ou de la qualité de service [QoS Quality of Service]
H04W 16/14 - Dispositions de partage du spectre de fréquence
H04W 74/0816 - Accès non planifié, p. ex. ALOHA utilisant une détection de porteuse, p. ex. accès multiple par détection de porteuse [CSMA] avec évitement de collision
Advertising; marketing; marketing consulting; marketing services in the field of arranging for the distribution of the products of others; direct marketing of the goods and services of others; arranging and conducting advertising campaigns for the products and services of others; providing marketing services to reseller partners and distributors; online retail store services; business consulting and information services; business consulting services to members of a reseller program; business consulting services in the field of computer software, hardware, networking, collaboration technologies, telecommunications, and information technology; providing consulting in the field of sales methods, sales management, and sales improvement to reseller partners; business management; customer relationship management; customer loyalty services; sales promotion services for others; sales promotion provided by means of a partner program for resellers, distributors and enterprise customers in the field of computer software, hardware, networking, telecommunications, and information technology; providing information on sales methods for products and services in the field of computer software, hardware, networking, telecommunications, and information technology; reseller services, namely, distributorship services in the field of computer software, hardware, networking, telecommunications, and information technology; administering a channel partner program for enabling participants to obtain discounts on the costs of products and services sold to end users; administration of a partner program for enhancing and promoting the sale of products and services in the field of computer software, hardware, networking, telecommunications, and information technology; administration of a partner program for enabling participants to obtain information, training, and best practices regarding computer software, hardware, networking, telecommunications, and information technology; administration of incentive plans and loyalty programs to promote and reward business partners, resellers, distributors and enterprise customers for commercial, promotional and advertising purposes; promoting software products and services that enable customers to optimize information technology, security and business performance through channel partner programs; providing advertising, marketing and promotional services to members of a partner program.
63.
DECENTRALIZED DATA PROVENANCE AND LINEAGE TRACKING
In one embodiment, a device executing a first portion of a distributed application extracts label information from sensor data sent to the device by a sensor that indicates the sensor as a source of the sensor data and one or more data governance policies applicable to the sensor data. The device performs, based on the label information, a first data transformation of the distributed application on the sensor data using stored data, to form transformed data. The device forms combined label information for the transformed data by appending the label information with additional label information associated with the stored data and adding an indication of the first data transformation. The device provides the transformed data and combined label information to a remote device executing another portion of the distributed application.
In one implementation, a device configures an impairment scenario in a computer network. The device performs an evaluation of the impairment scenario by a language model-based troubleshooting agent. The device makes a comparison between a root cause associated with the impairment scenario and the evaluation of the impairment scenario by the language model-based troubleshooting agent. The device provides an indication of the comparison.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
65.
OPTIMIZING APPLICATION PROGRAMMING INTERFACE SYSTEM SCALABILITY IN A CLOUD ENVIRONMENT
In one embodiment, a method herein comprises: collecting, by a process, data corresponding to one or more variables used to measure convertibility of a particular synchronous application programming interface call into an asynchronous application programming interface call; performing, by the process, an analysis on the data to determine relationships between the one or more variables; making a determination, by the process and based on the analysis, as to whether to convert the particular synchronous application programming interface call to the asynchronous application programming interface call; and converting, by the process and based on the determination, the particular synchronous application programming interface call to the asynchronous application programming interface call.
In one implementation, a method is disclosed comprising: associating an application with an agent that instruments the application during execution; configuring the agent to load an extension that alters functionality of the agent; configuring an implementation of the extension of the agent as a wrapper to launch one or more custom extensions; and executing the one or more custom extensions via the wrapper.
In some aspects, a method for establishing a multicast-only Fast Re-Route (FRR) (MoFRR) path between a source node and a receiving node in a network, the method includes receiving, by a merged receiving node, a plurality of data packets in a data flow comprising an FRR indicator, wherein the merged receiving node is configured to identify an FRR path for data transmission to the source node, extracting, by the merged receiving node, from the FRR indicator, an identification of the source node as a destination of the data transmission, and a first identifier identifying a first data packet as part of a first flow of a MoFRR, and a second identifier identifying a second data packet as part of a second flow of a MoFRR, transmitting, by the receiving node, the first data packet along a primary data path and the second data packet along a secondary data path.
A data-driven audio codec system that involves producing multiple compressed streams comprising encoded information (e.g., codeword indices) at different time scales (time intervals or frequency). This may allow for separation of different properties of speech, such as content and aspects of style (prosody), into the different compressed streams without explicitly enforcing it, i.e., in an unsupervised manner. Speech audio is encoded to produce a plurality of encoded streams comprising encoded information for the speech audio at different time scales. The plurality of encoded streams are decoded to generate output audio.
G10L 21/043 - Compression ou expansion temporelles par changement de la vitesse
G10L 19/00 - Techniques d'analyse ou de synthèse de la parole ou des signaux audio pour la réduction de la redondance, p. ex. dans les vocodeursCodage ou décodage de la parole ou des signaux audio utilisant les modèles source-filtre ou l’analyse psychoacoustique
69.
VECTOR QUANTIZER CORRECTION FOR AUDIO CODEC SYSTEM
A method comprises: vector quantizing input vectors representative of audio into an original sequence including indices of codewords of a codebook; generating candidate sequences including the indices of the codewords of the codebook by evaluating, for each candidate sequence, transition costs for transitions between the indices based on (i) transition probabilities of the transitions, and (ii) distances between the codewords represented by the indices and the input vectors that corresponds to the indices; determining a preferred candidate sequence of the candidate sequences to replace the original sequence based on the transition costs for each candidate sequence; and transmitting the preferred candidate sequence in place of the original sequence.
According to some embodiments, a method includes detecting a start of an OpenTelemetry span by an application and determining security information related to the start of the OpenTelemetry span. The method further includes monitoring the application for one or more application behaviors during execution of the OpenTelemetry span. The method further includes detecting an end of the OpenTelemetry span by the application, and in response, calculate a security score for the OpenTelemetry span using the security information related to the start of the OpenTelemetry span and the one or more application behaviors detected during execution of the OpenTelemetry span. The method further includes updating a status of the OpenTelemetry span to include the security score and a text string related to the calculation of the security score.
A neural network audio codec system and related methods are provided. In one example, a method is provided comprising: obtaining speech audio to be encoded; applying the speech audio to an audio encoder that is part of a neural network audio codec system that includes the audio encoder and an audio decoder. The audio encoder and the audio decoder have been trained in an end-to-end manner. The speech audio is encoded with the audio encoder to generate embedding vectors that represent a snapshot of speech audio attributes over successive timeframes of the raw speech audio, and from the embedding vectors, codeword indices are generated to entries in a codebook. The codeword indices are then transmitted or stored for later retrieval and processing by the audio decoder. Further aspects include converting the speech audio to text based on decoding the codeword indices, translating the speech audio from a first language into a second language by mapping codeword indices from a first language to a second language, converting the speech audio prosody by mapping the codeword indices, text generation and discrimination tasks.Yet another aspect includes converting text to speech audio with a different prosody.
G10L 19/00 - Techniques d'analyse ou de synthèse de la parole ou des signaux audio pour la réduction de la redondance, p. ex. dans les vocodeursCodage ou décodage de la parole ou des signaux audio utilisant les modèles source-filtre ou l’analyse psychoacoustique
In one embodiment, a method includes obtaining content captured during a collaboration session, processing the content to identify a first cue included in the content, and interpreting the first cue, wherein interpreting the first cue includes generating a first insight associated with the first cue. The method also includes processing the first insight to generate an insight summary, and generating an output associated with the collaboration session, wherein the output includes the insight summary.
Techniques are described for enabling a cloud-based IT and security operations application to execute playbooks containing custom code in a manner that mitigates types of risk related to the misuse of cloud-based resources and security of user data. Users use a client application to create and modify playbooks and, upon receiving input to save a playbook, the client application determines whether the playbook includes custom code. If the client application determines that the playbook includes custom code, the client application establishes a connection with a proxy application (also referred to as an “automation broker”) running in the user's own on-premises network and sends a representation of the playbook to the proxy application. The client application further sends to the IT and security operations application an identifier of the playbook and an indication that the playbook (or the custom code portions of the playbook) is stored within the user's on-premises network.
H04L 41/5054 - Déploiement automatique des services déclenchés par le gestionnaire de service, p. ex. la mise en œuvre du service par configuration automatique des composants réseau
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
H04L 41/0681 - Configuration des conditions de déclenchement
H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
74.
MULTIPLE MODES OF STORING AND QUERYING TRACE DATA IN A MICROSERVICES-BASED ARCHITECTURE
A method of analyzing a performance of a microservices-based application comprises generating a plurality of traces from a plurality of spans associated with the microservices-based application. The method also comprises generating a plurality of data sets each associated with a respective analysis mode of a plurality of analysis modes using the plurality of traces, wherein each analysis mode extracts a different level of detail for analyzing the performance of the services in the application from the plurality of spans. Further, the method comprises selecting, based on a first user query, a first analysis mode from the plurality of analysis modes for generating a response to the first user query. The method also comprises accessing a data set of the plurality of data sets that is associated with the first analysis mode and generating the response to the first user query using the data set associated with the first analysis mode.
According to some embodiments, a method is performed by a software defined wide area network (SD-WAN) edge router in a hierarchical SD-WAN network comprising a plurality of edge routers and a plurality of border routers. The method comprises: originating a SD-WAN system route for advertising reachability to the edge router, the system route comprising an encryption key associated with the edge router; and transmitting the system route to one or more SD-WAN border routers. The method may further comprise: receiving a packet destined for the edge router from one of the one or more SD-WAN border routers, wherein the packet is at least partially encrypted with the encryption key associated with the edge router; and decrypting the received packet.
H04L 45/50 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données utilisant l'échange d'étiquettes, p. ex. des commutateurs d'étiquette multi protocole [MPLS]
H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée
76.
MULTI-PATH MONITORING OF APPLICATION INSTANCES USING DNS-BASED REACHABILITY INFORMATION
In one embodiment, a device receives a domain name system text record containing Internet reachability information for a plurality of application instances of a particular application identified by a given domain name. The device determines a primary Internet address for a primary application instance of the plurality of application instances and one or more secondary Internet addresses for one or more respective secondary application instances of the plurality of application instances based on the Internet reachability information. The device configures a path monitoring agent to perform path performance monitoring of a network path to the primary Internet address and perform path performance monitoring of one or more alternate network paths to the one or more secondary Internet addresses.
H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
77.
LABEL-BASED DATA GOVERNANCE ENFORCEMENT FOR DECENTRALIZED SYSTEMS
In one embodiment, a sidecar proxy executed by a device extracts label information from input data for input to a microservice associated with the sidecar proxy indicative of a lineage of the input data. The sidecar proxy makes, based on the label information, a determination as to whether the microservice processing the input data would violate a data governance policy. The sidecar proxy provides, based on the determination, the input data to the microservice. The sidecar proxy tags output data generated by the microservice with appended label information that includes the label information extracted from the input data and an indication of a data transformation performed by the microservice to the input data to form the output data.
Techniques for programming an omnidirectional programmable client interface module (OPCIM) to receive a control signal and for configuring a set of outputs of a first output and a second output. Programming the OPCIM for routing the control signal from one input of the OPCIM to the first output and the second output of the OPCIM to output a first output signal and a second output signal to a first Line Card and a second Line Card coupled to each output, respectively. In response to a failure of at least either one of the Line Cards, automatically enabling reprogramming the OPCIM for routing the control signal to either Line Card that is still operational to prevent a service interruption in sending the control signal from one input to an output of either the first output or the second output to the Line Cards coupled to outputs of the OPCIM.
In one implementation, a method is disclosed comprising: associating, by a device in a service mesh, a security function with a portion of an online application that is executed in a distributed manner across the service mesh; executing, by the device, the security function and the portion of the online application within a trusted execution environment of the device to produce output data; generating, by the device, a cryptographic proof for the output data based on the security function; and providing, by the device, the output data and the cryptographic proof to a remote execution environment within the service mesh to establish a verifiable data lineage for the output data.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
In one implementation, a method is disclosed comprising: determining, by a process, a log template mapped from network monitoring log messages; generating, by the process, a visualization of the log template including interactive graphical representations of a detection frequency for the log template, a frequency distribution of parameter values per parameter for the log template, and relationships between parameter values across different parameters for the log template; filtering, by the process, data included in the visualization based on a user selection of a portion of a particular graphical representation; and modifying, by the process and based on user feedback on the visualization, generation of subsequent visualizations of log templates.
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
H04L 43/028 - Capture des données de surveillance en filtrant
81.
HYBRID AGENT STRATEGY FOR FULL STACK OBSERVABILITY
In one implementation, a method is introduced herein that facilitates a hybrid agent strategy for full stack observability. The method can include observing, by a device executing an agent of a first observability platform, first observability information associated with the first observability platform and monitoring, by the device executing the agent, for a message containing second observability information on the device generated for a second observability platform. The method can further include generating a new observability information as a combination of the first observability information and the second observability information and providing the new observability information to a given observability backend service within a computer network via an observability pipeline associated with the given observability backend service.
According to one or more embodiments of the disclosure, receive-side audio processing for calls in a web conferencing client is provided by a method that includes receiving, by a device, an audio signal from a sending device and detecting, by the device, a particular telephony audio cue present in the audio signal, wherein the particular telephony audio cue has similar characteristics of noise that is to be removed by a noise removal operation. The method further includes preserving, by the device, the particular telephony audio cue in the audio signal throughout the noise removal operation on the audio signal and causing, by the device, an enhanced audio signal to be produced in conjunction with the noise removal operation, wherein the enhanced audio signal includes the particular telephony audio cue to be delivered to a receiver device.
G10L 21/0232 - Traitement dans le domaine fréquentiel
G10L 15/06 - Création de gabarits de référenceEntraînement des systèmes de reconnaissance de la parole, p. ex. adaptation aux caractéristiques de la voix du locuteur
G10L 25/18 - Techniques d'analyse de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par le type de paramètres extraits les paramètres extraits étant l’information spectrale de chaque sous-bande
G10L 25/21 - Techniques d'analyse de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par le type de paramètres extraits les paramètres extraits étant l’information sur la puissance
G10L 25/51 - Techniques d'analyse de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation
H04M 3/18 - Centraux automatiques ou semi-automatiques avec des moyens pour diminuer les interférencesCentraux automatiques ou semi-automatiques avec des moyens pour diminuer les effets dus aux défauts de ligne
83.
BGP NEXT-HOP GROUPS FOR MULTI-HOMED SERVICES IN SCALED SERVICE PROVIDER NETWORKS
Methods and systems are described herein for reducing border gateway protocol (BGP) signaling for multi-homed devices. In one aspect, the method comprises: receiving one or more signals from one or more provider edge devices. The one or more signals include an address of a membership group associated with a multi-homed device. A router receives, from a provider edge device of the one or more provider edge devices, a service prefix. The service prefix is associated with the multi-homed device and the membership group. The router may store the service prefix and the one or more provider edge devices and connect, according to the service prefix and the one or more provider edge devices, to the multi-homed device associated with the membership group.
H04L 41/0659 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en isolant ou en reconfigurant les entités défectueuses
H04L 45/02 - Mise à jour ou découverte de topologie
84.
DECENTRALIZED INTERNET PROTOCOL SECURITY KEY NEGOTIATION
Methods are provided for decentralized key negotiation. One method includes initiating, by a first Internet Key Exchange (IKE) node from among a plurality of IKE nodes, a rekeying process for an Internet Protocol Security (IPSec) communication session established with a client device and serviced by a second IKE node from among the plurality of IKE nodes, and in which a first encryption key is used to encrypt traffic. The method further includes obtaining, by the first IKE node from a key value store, information about the IPSec communication session and performing, by the first IKE node, at least a part of the rekeying process in which the first encryption key is replaced with a second encryption key for the IPSec communication session.
H04L 9/16 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération
In one aspect, a method includes receiving, a serving gateway of a core network of a wireless communication system, a call request associated with an emergency service; assigning a Tunnel Endpoint Identifier (TEID) to the call, wherein the TEID has a plurality of bits and a first segment of the plurality of bits are set to identify the TEID as being associated with the emergency service; and establishing the call for the emergency service with a Packet Data Gateway (PGW) of the core network using the TEID, wherein the TEID enables the PGW to suppress deletion of a bearer associated with the call.
H04W 76/12 - Établissement de tunnels de transport
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 76/50 - Gestion de la connexion pour les connexions d'urgence
86.
TECHNIQUES TO FACILITATE NETWORK SLICE SERVICE CONTINUITY FOR MOBILE NETWORK ENVIRONMENTS
Provided herein are techniques to facilitate network slice service continuity in a mobile network environment. In one example, a method may include for a registration request involving a user equipment (UE), obtaining, by an Access and Mobility Management Function (AMF), subscription information identifying primary network slices backup network slices to which the UE is subscribed in which each of the primary network slices and the backup network slices are active network slices capable of actively handling sessions for multiple UEs. The method may further include determining whether there is registration capacity for the UE with each of the network slices with which the UE is allowed registration. Based on the determining that there is registration capacity for registration of the UE, the AMF can transmit a registration response to the UE that indicating registration with the first primary network slice and the first backup network slice is accepted.
H04W 60/04 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
87.
FIREWALLS AUTOMATIC RULES CREATION FROM STEALTHWATCH DATA
In one aspect, a method for automated creation and management of firewall rules in a network environment, includes obtaining network traffic patterns including data exported from one or more network appliances in the network environment, where the data includes a plurality of network identifiers, automatically generating a first set of firewall rules based on a source and destination of each network identifier, automatically generating a second set of firewall rules based on firewall data including a source and destination of address, and generating a revised set of firewall rules based on the first set of firewall rules and the second set of firewall rules, where the revised set of firewall rules is also based on a detection of a number of times at least one of the second set of rules is invoked at the firewall.
Methods and devices provide machine learning of mappings between test script endpoints and network configuration and state differences described according to YANG models. Such machine learning is implemented in a network environment by a training workflow and a production workflow, each implemented across a network device and a machine learning computing system, and each utilizing a learning model which includes an encoder-decoder architecture. The learning model is trained on training datasets which include mappings of executable endpoints to YANG model differences, generated by telemetry capture in network environments to generate training datasets.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
G06N 3/0442 - Réseaux récurrents, p. ex. réseaux de Hopfield caractérisés par la présence de mémoire ou de portes, p. ex. mémoire longue à court terme [LSTM] ou unités récurrentes à porte [GRU]
In some embodiments, an apparatus includes a layer of a printed circuit board (PCB), a pair of signal vias formed on the layer of the PCB and including a first signal via a second signal via each configured to propagate a respective signal, a first plurality of ground vias formed on the layer and at least partially circumferentially surrounding the first signal via of the pair of signal vias, and a second plurality of ground vias formed on the layer and at least partially circumferentially surrounding the second signal via of the pair of signal vias. The first plurality of ground vias and the second plurality of ground vias include a shared ground via.
H01L 21/48 - Fabrication ou traitement de parties, p. ex. de conteneurs, avant l'assemblage des dispositifs, en utilisant des procédés non couverts par l'un uniquement des groupes ou
H01L 23/498 - Connexions électriques sur des substrats isolants
H05K 3/40 - Fabrication d'éléments imprimés destinés à réaliser des connexions électriques avec ou entre des circuits imprimés
90.
GENERATIVE SPEECH MODEL FOR COMPACT DATA-DRIVEN SPEECH VECTORS FOR VERSATILE SPEECH APPLICATIONS
A neural network audio codec system and related methods are provided. In one example, a method is provided comprising: obtaining speech audio to be encoded; applying the speech audio to an audio encoder that is part of a neural network audio codec system that includes the audio encoder and an audio decoder. The audio encoder and the audio decoder have been trained in an end-to-end manner. The speech audio is encoded with the audio encoder to generate embedding vectors that represent a snapshot of speech audio attributes over successive timeframes of the raw speech audio, and from the embedding vectors, codeword indices are generated to entries in a codebook. The codeword indices are then transmitted or stored for later retrieval and processing by the audio decoder.
G10L 15/16 - Classement ou recherche de la parole utilisant des réseaux neuronaux artificiels
G10L 15/06 - Création de gabarits de référenceEntraînement des systèmes de reconnaissance de la parole, p. ex. adaptation aux caractéristiques de la voix du locuteur
G10L 15/18 - Classement ou recherche de la parole utilisant une modélisation du langage naturel
A method of performing packet loss concealment in a neural audio encoder/decoder (codec) system. The method includes receiving an indication of a lost audio packet at a receive side of a neural network audio codec system that includes an audio encoder and an audio decoder, wherein the lost audio packet comprises an index of a codeword that is representative of a portion of speech audio presented to the audio encoder, predicting the index of the codeword in the lost packet to obtain a predicted index, deriving a predicted embedding vector from the predicted index, and decoding, by the audio decoder, the embedding vector to generate an audio output.
G10L 19/08 - Détermination ou codage de la fonction d'excitationDétermination ou codage des paramètres de prédiction à long terme
G10L 19/00 - Techniques d'analyse ou de synthèse de la parole ou des signaux audio pour la réduction de la redondance, p. ex. dans les vocodeursCodage ou décodage de la parole ou des signaux audio utilisant les modèles source-filtre ou l’analyse psychoacoustique
92.
REDUCED MULTIDIMENSIONAL INDICES COMPRESSION FOR AUDIO CODEC SYSTEM
A method comprises: storing n dimension (nD) dictionaries (nD dictionaries) where n decreases from a highest dimension to a lowest dimension, each nD dictionary including codewords for sequences of n symbols that are of a limited number that is less than all possible sequences of n symbols; storing key blocks for corresponding ones of the nD dictionaries, each key block configured with keys that map sequences of n−1 symbols to dictionaries of a corresponding one of the nD dictionaries that includes the codewords; receiving a sequence of symbols that represent indices of codevectors of a vector quantizer codebook that are representative of audio; determining a codeword using the key blocks and the nD dictionaries; and encoding a current symbol of the sequence of symbols using the codeword.
G10L 19/022 - Constitution de blocs, c.-à-d. regroupement d’échantillons temporelsChoix des fenêtres d’analyseFacteur de recouvrement
G10L 19/00 - Techniques d'analyse ou de synthèse de la parole ou des signaux audio pour la réduction de la redondance, p. ex. dans les vocodeursCodage ou décodage de la parole ou des signaux audio utilisant les modèles source-filtre ou l’analyse psychoacoustique
G10L 19/038 - Quantification vectorielle, p. ex. TwinVQ audio
93.
MULTI-HOMED LAYER-2 (L2) SERVICE INSERTION ENTERPRISE FABRIC NETWORKS
Techniques and architecture are described for L2 service insertion in a network. More particularly, the techniques and architecture provide for monitoring a L2 service, e.g., firewall, MAC address (instead of learning the MAC address) and registering/de-registering the service node (e.g., fabric border or edge or LISP service_etr) to the service control plane (e.g., LISP MSMR) based on this. This not only load-balances the traffic (per L2 flow) but also tracks it for node's liveliness. The techniques and architecture also provide L2 service insertion connected to a service border to allow for dynamic SGT based service, e.g., firewall, insertion for both software defined access (SDA) fabric and non-fabric deployments.
Techniques for programming an omnidirectional programmable client interface module (OPCIM) to receive a control signal and for configuring a set of outputs of a first output and a second output. Programming the OPCIM for routing the control signal from one input of the OPCIM to the first output and the second output of the OPCIM to output a first output signal and a second output signal to a first Line Card and a second Line Card coupled to each output, respectively. In response to a failure of at least either one of the Line Cards, automatically enabling reprogramming the OPCIM for routing the control signal to either Line Card that is still operational to prevent a sendee interruption in sending the control signal from one input to an output of either the first output or the second output to the Line Cards coupled to outputs of the OPCIM.
In some embodiments, an apparatus includes a layer of a printed circuit board (PCB), a pair of signal vias formed on the layer of the PCB and including a first signal via a second signal via each configured to propagate a respective signal, a first plurality of ground vias formed on the layer and at least partially circumferentially surrounding the first signal via of the pair of signal vias, and a second plurality of ground vias formed on the layer and at least partially circumferentially surrounding the second signal via of the pair of signal vias. The first plurality of ground vias and the second plurality of ground vias include a shared ground via.
Methods and systems are described herein for reducing border gateway protocol (BGP) signaling for multi-homed devices. In one aspect, the method comprises: receiving one or more signals from one or more provider edge devices. The one or more signals include an address of a membership group associated with a multi-homed device. A router receives, from a provider edge device of the one or more provider edge devices, a service prefix. The service prefix is associated with the multi-homed device and the membership group. The router may store the service prefix and the one or more provider edge devices and connect, according to the service prefix and the one or more provider edge devices, to the multi-homed device associated with the membership group.
Advertising; marketing; marketing consulting; marketing services in the field of arranging for the distribution of the products of others; direct marketing of the goods and services of others; arranging and conducting advertising campaigns for the products and services of others; providing marketing services to reseller partners and distributors; online retail store services; business consulting and information services; business consulting services to members of a reseller program; business consulting services in the field of computer software, hardware, networking, collaboration technologies, telecommunications, and information technology; providing consulting in the field of sales methods, sales management, and sales improvement to reseller partners; business management; customer relationship management; customer loyalty services; sales promotion services for others; sales promotion provided by means of a partner program for resellers, distributors and enterprise customers in the field of computer software, hardware, networking, telecommunications, and information technology; providing information on sales methods for products and services in the field of computer software, hardware, networking, telecommunications, and information technology; reseller services, namely, distributorship services in the field of computer software, hardware, networking, telecommunications, and information technology; administering a channel partner program for enabling participants to obtain discounts on the costs of products and services sold to end users; administration of a partner program for enhancing and promoting the sale of products and services in the field of computer software, hardware, networking, telecommunications, and information technology; administration of a partner program for enabling participants to obtain information, training, and best practices regarding computer software, hardware, networking, telecommunications, and information technology; administration of incentive plans and loyalty programs to promote and reward business partners, resellers, distributors and enterprise customers for commercial, promotional and advertising purposes; promoting software products and services that enable customers to optimize information technology, security and business performance through channel partner programs; providing advertising, marketing and promotional services to members of a partner program
(1) Arranging and conducting advertising campaigns for the products and services of others; business management; customer relationship management; direct marketing of the goods and services of others; marketing services in the field of arranging for the distribution of the products of others
(2) Advertising; marketing; marketing consulting; providing marketing services to reseller partners and distributors; online retail store services; business consulting and information services; business consulting services to members of a reseller program; business consulting services in the field of computer software, hardware, networking, collaboration technologies, telecommunications, and information technology; providing consulting in the field of sales methods, sales management, and sales improvement to reseller partners; customer loyalty services; sales promotion services for others; sales promotion provided by means of a partner program for resellers, distributors and enterprise customers in the field of computer software, hardware, networking, telecommunications, and information technology; providing information on sales methods for products and services in the field of computer software, hardware, networking, telecommunications, and information technology; reseller services, namely, distributorship services in the field of computer software, hardware, networking, telecommunications, and information technology; administering a channel partner program for enabling participants to obtain discounts on the costs of products and services sold to end users; administration of a partner program for enhancing and promoting the sale of products and services in the field of computer software, hardware, networking, telecommunications, and information technology; administration of a partner program for enabling participants to obtain information, training, and best practices regarding computer software, hardware, networking, telecommunications, and information technology; administration of incentive plans and loyalty programs to promote and reward business partners, resellers, distributors and enterprise customers for commercial, promotional and advertising purposes; promoting software products and services that enable customers to optimize information technology, security and business performance through channel partner programs; providing advertising, marketing and promotional services to members of a partner program
99.
Providing completion recommendation variations for a partial natural language request
In various embodiments, a natural language (NL) application receives a first incomplete natural language (NL) request, and generates one or more request completion recommendations based on at least the first incomplete NL request and a first recommendation model, where the first recommendation model is generated via a machine learning algorithm applied to a first data dependency model and a first request completion model. The NL application receives a selection of a first request completion recommendation included in the one or more request completion recommendations, generates a complete request based on the first incomplete NL request and the first request completion recommendation, and causes the complete request to be applied to the data storage system.