In general, this disclosure describes a network device comprising a physical interface comprising a port and a data path component; a storage device configured to store a power save profile for the network device, wherein the power save profile specifies one or more link down triggers each associated with a power saving action; and processing circuitry having access to the storage device. The processing circuitry may be configured to determine, based on a link fault associated with the port, a link down trigger of the one or more link down triggers specified in the power save profile. The processing circuitry may further be configured to execute the power saving action associated with the link down trigger to reduce power consumed by the data path component.
In an example, a method includes processing, by an application programming interface (API) server implemented by a configuration node of a network controller for a software-defined networking (SDN) architecture system, requests for operations on native resources of a container orchestration system; processing, by a custom API server implemented by the configuration node, requests for operations on custom resources for SDN architecture configuration, wherein each of the custom resources for SDN architecture configuration corresponds to a type of configuration object in the SDN architecture system; detecting, by a control node of the network controller, an event on an instance of a first custom resource of the custom resources; and by the control node, in response to detecting the event on the instance of the first custom resource, obtaining configuration data for the instance of the first custom resource and configuring a corresponding instance of a configuration object in the SDN architecture.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 69/00 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
Techniques are disclosed for a computing system comprising processing circuitry having access to a storage device, the processing circuitry configured to encode, by a network controller executing in a software defined network (SDN), one or more attributes with information identifying a network service, wherein the one or more attributes conform to a routing protocol. The processing circuitry is also configured to generate, by the network controller, an advertisement in a first network cluster executing within a container orchestration platform of the SDN, wherein the advertisement conforms to the routing protocol and includes the one or more attributes. The processing circuitry is also configured to broadcast, by the network controller and to a second network cluster executing within the container orchestration platform of the SDN, the advertisement in accordance with the routing protocol.
H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
A method comprising: receiving a request for a new stack that is to comprise a plurality of components at a plurality of levels of the new stack, wherein the request indicates the supporting components; in response to the request: interacting with a cloud services provider to provision instances of the components of the new stack, wherein at least one the instances of the components of the new stack is included in another stack hosted by the cloud services provider; generating configuration mapping data that relate the instances of the components of the other stack with the new stack; converting the configuration mapping data to one or more cloud provider-specific models that are specific to the cloud services provider; and deploying the new stack at the cloud-services provider for use by the first user based on the one or more cloud provider-specific models.
Techniques are disclosed for computing a priority of routes advertised by nodes implementing Layer-3 (L3) Multi-Node High Availability (MNHA) for a Software-Defined Wide Area Network (SD-WAN) interconnecting a first network device and a second network device according to link adherence to performance requirements. In one example, a node computes a priority for a route to the second network device based at least in part on a comparison between (1) one or more performance measurements of a link between the node and the second network device and (2) one or more performance requirements for the link. In some examples, the computed priority for the route is further based in part on a preference for the node. The node exports, to the first network device, the route to the second network device, wherein the route comprises data specifying the computed priority for the route.
Graphical user interfaces are generated that, when displayed, provide a visual and interactive representation of one or more aspects associated with the execution of one or more applications on a computer network. The graphical user interfaces may in include graphical depictions representation policy objects, each policy object assigned one or more tags, each tag assigned to a category or a sub-category. The tags, when taken in combination, may identify an application, and one or more other characteristics associated with each of the policy objects. The graphical elements representing the policy objects may be displayed in the graphical user interfaces so that the policy objects assigned to tags in a category are positioned in an outer ring, and policy objects assigned to sub-category tags are positioned in a inner ring surrounded by the outer ring, with interconnection elements representing communications between policy objects extending within an interior area.
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06F 9/451 - Execution arrangements for user interfaces
H04L 41/12 - Discovery or management of network topologies
H04L 41/142 - Network analysis or design using statistical or mathematical methods
7.
Processing channel state information (CSI) to determine characteristics of a space between wireless access points
A computing system includes a memory and one or more processors coupled to the memory and configured to obtain a sequence of channel state information (CSI) samples, wherein the sequence of CSI samples corresponds to a communication channel between a first computing device and a second computing device, and calculate, based on the sequence of CSI samples, frequency domain information. The one or more processors are further configured to determine one or more similarity values for the frequency domain information, wherein the one or more similarity values are indicative of one or more characteristics of a space between the first computing device and the second computing device.
Techniques are described by which a network management system (NMS) is configured to generate and monitor an RSSI-based proximity zone for a wireless network using a user interface (UI). The NMS may generate a UI comprising UI elements representing access point (AP) devices configured to provide a wireless network at a site; receive, at the user interface, an indication of a user input selecting one or more UI elements representing selected AP devices; establish a proximity zone for each of the selected AP devices based on an RSSI threshold value; receive network data comprising proximity information of a client device relative to the selected AP devices; generate, based on proximity assessments using the proximity information and the RSSI threshold value of the proximity zone, one or more proximity events indicating the client device relation to the proximity zone; and invoke, based on the proximity events, one or more actions.
A network device, with a user plane and a control plane, may establish a resiliency timeout and an association timeout for a packet forwarding control protocol utilized by the network device, and may detect expiration of the resiliency timeout. The network device may signal control plane or user plane applications based on the expiration of the resiliency timeout, and may cause the user plane to trigger a connected-pause state transition based on the expiration of the resiliency timeout.
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/0668 - Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
H04L 43/106 - Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
10.
Utilizing confidence scores to assess versions and rollouts of device upgrades
A device may determine base confidence factor data for a plurality of edge devices, and may identify an upgrade for the plurality of edge devices. The device may cause the upgrade to be incrementally implemented by a set of edge devices of the plurality of edge devices, and may receive variable confidence factor data associated with implementing the upgrade by the set of edge devices. The device may calculate a confidence score based on the base confidence factor data and the variable confidence factor data, and may determine whether the confidence score satisfies a score threshold. The device may selectively cause the upgrade to be removed from the set of edge devices based on the confidence score failing to satisfy the score threshold, or cause the upgrade to be implemented by a remaining set of edge devices, of the plurality of edge devices, based on the confidence score satisfying the score threshold.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
In general, techniques are described for a SDN architecture system that implements an integrated gateway service. In an example, network controller comprises processing circuitry and memory and is configured to: configure a virtual network in a cluster of nodes of a compute infrastructure, the cluster of nodes managed in part by the network controller; receive a manifest for a gateway service instance that abstracts a transit gateway resource configurable in a plurality of different types of compute infrastructures, wherein the manifest specifies an intended state of a transit gateway object of the gateway service instance; and reconcile the intended state of the transit gateway object for the gateway service instance by sending configuration data, generated based on the transit gateway object, to an interface for the compute infrastructure to configure a transit gateway to forward network packets between a compute infrastructure node of the compute infrastructure and the virtual network.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 45/586 - Association of routers of virtual routers
12.
Configuration mapping using a multi-dimensional rule space and rule consolidation
A configuration mapping system and method increase the effectiveness of mapping of information from an established product line to a new product offering. In at least one embodiment, the configuration mapping system herein uses configuration mapping rules to map individual product features and entire configurations from established products to a new product offering. The configuration mapping system also provides a way to appropriately map, for example, demand and sales information for the purpose of demand estimation and sales prediction. Conventionally, mapping can be ineffective because the configuration mapping rules usually focus on one part of the product at a time, and, if applied in isolation, the impact on other parts is missed. The systems and method herein provide a way to integrate configuration mapping rules across feature parts, time periods, and product lines into a unified, holistic view, allowing for new insights.
G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
G05B 19/4097 - Numerical control [NC], i.e. automatically operating machines, in particular machine tools, e.g. in a manufacturing environment, so as to execute positioning, movement or co-ordinated operations by means of programme data in numerical form characterised by using design data to control NC machines, e.g. CAD/CAM
G06F 12/06 - Addressing a physical block of locations, e.g. base addressing, module addressing, address space extension, memory dedication
A network device may receive an MPLS packet destined for a destination via a label-switched path (LSP), and may determine whether to apply a first special purpose label (SPL) option or a second SPL option for a label stack of the MPLS packet. The network device may apply, when the first SPL option is determined to be applied, one of a first type of the first SPL option for the label stack via a policy data indicator (PDI) and policy data (PD), or a second type of the first SPL option for the label stack via the PDI and the PD. The network device may forward the MPLS packet to a hop of the LSP based on the first type of the first SPL option or the second type of the first SPL option applied to the MPLS packet.
Techniques are described for determining a root cause of a networking loop that occurred at one or more access points. The techniques include a network management system (NMS) configured to obtain information of a plurality of network devices that indicate a plurality of network events comprising at least a networking loop event that occurred at an access point of the plurality of network devices and one or more network events that occurred at an upstream device to the access point; determine, based on correlating the plurality of network events, whether the one or more network events that occurred at the upstream device is a root cause of the networking loop event; and perform, based on determining that the one or more network events that occurred at the upstream device is a root cause of the networking loop event, an action to remedy the networking loop event.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
Techniques are described for dynamically invoking a radio frequency (RF) spectrum capture at a site based on detection of an anomalous event at a node or radio of an access point (AP) device at the site. For example, a system is configured to detect an anomalous event at a node of an AP device based on network data obtained for the AP device; based on the anomalous event, invoke an RF spectrum capture by one or more nodes of one or more AP devices at the site; store spectrum data obtained from the RF spectrum capture in association with the anomalous event; and determine a root cause of the anomalous event based on the spectrum data associated with the anomalous event and the network data from which the anomalous event was detected.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
A container-based orchestration system includes a master node and a plurality of worker nodes. The master node can receive, from each agent executing on a corresponding worker node, node characteristics associated with the worker node. The master node can determine, for each worker node, one or more parameters corresponding to the node characteristics associated with the corresponding worker node and a node profile of the worker node and provide the parameters to the agent executing on the corresponding worker node. The agent configures the worker node in accordance with the parameters. In response to receiving a request to deploy a pod to a worker node, the master node can select a worker node to receive the pod based on the node characteristics and the pod characteristics. The agent can configure the selected worker node to execute workloads of the pod in accordance with the one or more parameters.
Techniques are disclosed for sending downloadable software packages that may be executed to perform tests of a network device without requiring the network device to update firmware. In one example, the network device obtains a software package comprising instructions for simulating a network instance and stores the software package in a volatile memory of the network device. The network device simulates, based on the instructions, the network instance to obtain data indicative of a performance of the network instance. The network device sends, via a communication channel established with a network management system (NMS) based on the software package, the data indicative of the performance of the network instance. In some examples, the NMS uses the data indicative of the performance of the network instance to identify a root cause of a failure of the network device or a remedial action to be performed upon the network device.
In some implementations, a network device may receive an indication of a switchover for a subscriber group that contains subsets of subscriber sessions. The network device may transition each subset of the subscriber sessions to a state associated with traffic forwarding. The network device may selectively transition each subset of the subscriber sessions from the state associated with the traffic forwarding to a state associated with traffic services.
A multi-tenant, cloud-hosted Network Access Control (NAC) system may receive an indicator from a Network Access Server (NAS) device to identify the tenant with which the NAS device is associated. The NAS device may put the identifier in the Transport Layer Security (TLS)/Secure Sockets Layer (SSL) extension Server Name Indication (SNI) field. The NAC system may use the identifier to obtain tenant-specific configuration information for setting up a secure tunnel with the NAS device.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
20.
INTENT-BASED ENTERPRISE SECURITY USING DYNAMIC LEARNING OF NETWORK SEGMENT PREFIXES
In an example, systems and methods enable automatic implementation of intent-based security policies in a network system, such as a software-defined wide area network system, in which network segment prefixes for network segments at one or more sites are dynamically learned. A service orchestrator controller translates an intent-based security policy input by a user to a security policy for a first site. The security policy for the first site specifies a segment-specific queryable resource associated with a second site. To implement the security policy, a device associated with the first site queries the segment-specific queryable resource associated with the second site, and updates one or more forwarding tables of the device with the network segment prefixes associated with one or more network segments at the second site received in response to the query. The first site forwards network traffic to the second site based on the updated forwarding tables.
An optical communication device includes a first data interface providing a first channel and one or more additional data interfaces providing one or more additional channels. A multiplexer generates a multiplexed signal encoding the first channel and the one or more additional channels. An optical transmitter transmits the multiplexed signal over an optical link to a remote device. A controller receives a disable signal identifying the first channel, and in response to receiving the disable signal, causes the optical transmitter to transmit a remote fault signal to the remote device on the first channel of the multiplexed signal, disables the first channel, causes the multiplexer to generate a modified multiplexed signal encoding the one or more additional channels and not the first channel, and causes the optical transmitter to transmit the modified multiplexed signal to the remote device over the optical link.
In an example, a method includes obtaining a first plurality of distance measurements for each of a plurality of wireless signals transmitted between a first wireless device and a second wireless device, wherein a distance between the first wireless device and the second wireless device is known; determining coefficients of a polynomial function describing a relationship between estimate errors introduced to the obtained first plurality distance measurements by multipath signals and a statistical spread of the obtained first plurality of distance measurements; obtaining a second plurality of distance measurements for each of a plurality of wireless signals transmitted between a third wireless device and a fourth wireless device, wherein a distance between the third wireless device and the fourth wireless device is unknown; and correcting each of the second plurality of distance measurements based on the determined coefficients of the polynomial function.
In some implementations, a network device may cause instantiation of a base container associated with a line card of the network device. The network device may cause, based on causing the instantiation of the base container, instantiation of a module container associated with a physical interface module of the line card of the network device. The network device may manage, using the base container, a forwarding table associated with the line card. The network device may manage, using the module container, one or more physical components of the physical interface module.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable or recorded operating system software; downloadable or recorded computer software for management of artificial intelligence computer networks; downloadable or recorded operating system software for router and network infrastructure management; downloadable or recorded operating system software that hosts computer software applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer networking software; downloadable or recorded computer software, namely, downloadable operating system programs for router management services; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software for the administration, management, and optimization of computer networks; downloadable or recorded software for developing and operating cloud computer networks and applications; downloadable or recorded computer software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software over cloud computing networks; downloadable or recorded computer software, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software for data security and data protection; downloadable or recorded computer software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software for computer network security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; downloadable or recorded computer software for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software for data and network security; downloadable or recorded computer software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; downloadable or recorded operating system software using artificial intelligence for router and network infrastructure management; downloadable or recorded operating system software using artificial intelligence that hosts computer software using artificial intelligence applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer networking software using artificial intelligence; downloadable or recorded computer software using artificial intelligence, namely, downloadable operating system programs for router management services; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software using artificial intelligence for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software using artificial intelligence for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software using artificial intelligence for the administration, management, and optimization of computer networks; downloadable or recorded software using artificial intelligence for developing and operating cloud computer networks and applications; downloadable or recorded computer software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software using artificial intelligence for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software using artificial intelligence over cloud computing networks; downloadable or recorded computer software using artificial intelligence, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software using artificial intelligence for data security and data protection; downloadable or recorded computer software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software using artificial intelligence for computer network security, namely, software using artificial intelligence for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software using artificial intelligence for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded computer software using artificial intelligence for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software using artificial intelligence for data and network security; downloadable or recorded computer software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; downloadable webcasts, web seminars, case studies, audio files, and videos in the fields of interconnecting, establishing, managing, securing, monitoring, troubleshooting, operating, accessing, and automation of computer hardware, computer software, artificial intelligence, machine learning, technology, peripherals, operating systems, local networks, widearea networks, wired networks, wireless networks, computer networks, network infrastructure, network security, web browsers, electronic devices, cloud computing, and data security for cloud computing environments; videos and accompanying downloadable materials in the fields of cloud computing and data security for cloud computing environments; downloadable educational videos and accompanying downloadable training materials for use in association therewith in the fields of cloud computing and data security for cloud computing environments Educational services, namely, training in the field of technology and artificial intelligence; educational services, namely, providing online conferences, training, testing, tutorials, workshops, educational courses, and distributing online course materials on managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, securing, and troubleshooting of computer hardware and software, technology, peripherals, operating systems, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, network security, web browsers, artificial intelligence, and electronic devices; educational services, namely, providing in-person conferences, training, testing, tutorials, workshops, educational courses, and distributing course materials on managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, securing, and troubleshooting of computer hardware and software, technology, peripherals, operating systems, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, network security, web browsers, artificial intelligence, and electronic devices; developing educational manuals and guides for others in the fields of computer hardware and software, peripherals, operating systems, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, network security, web browsers, artificial intelligence, and electronic devices; providing a website featuring blogs and online non-downloadable publications in the nature of e-books, compliance guides, data sheets, and reports in the fields of cloud computing and data security for cloud computing environments; providing a website featuring online non-downloadable educational webcasts, web seminars, case studies, audio files, and videos and accompanying non-downloadable training materials for use in association therewith in the fields of cloud computing and data security for cloud computing environments Consulting services in the fields of design and implementation of computer networks, cloud computing, data center design, storage design, data center infrastructure, computer network and network infrastructure management, computer network security, computer software, development and use of computer hardware, development and use of computer networking equipment, computer network design, storage design, network security, cloud security, network virtualization, and computer network analytics; consulting services in the field of software scripts for network automation; consulting services for developing computer systems, applications, architecture, and computer hardware, software, and firmware, namely, application development computer software programs; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer hardware for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services, namely, migration of data centers, servers, and databases between computer networks; technical support services in the fields of computer, data, email, web, and network security, namely, monitoring of network systems for technical and computer security purposes; technical support services in the fields of computer software, development, and use of computer hardware, computer networking equipment, telecommunications equipment, computer network design, storage design, cloud computing, network security, cloud security, data center design, and analytics, namely, providing live and online diagnosing of problems, service desk, and help desk services in all of the above-listed fields; design and development of computer software applications for network efficiency improvement, storage design, cloud security, and data center design; design, testing, engineering, and research services relating to computers, telecommunications technology, computer networks, computer software, computer hardware, computer programming, and network security, and advisory services regarding designing, building, testing, engineering, operating, research and development in the above-listed fields; design and development of computer networks, local networks, wide-area networks, wired networks, wireless networks, and devices for network connectivity; testing, analysis, and evaluation of computer networks for the purposes of designing, building, and operation of computer networks; technical management in the field of computer networks; technical consulting in the field of the administration of computer networks; technical management in the field of administration of computer networks for designing, building, testing, engineering, and operating computer networks; consulting services in the field of cloud computing; computer management services, namely, the monitoring, reporting, management of, and automation of data traffic across wireless communications networks and the internet; management of wireless networks for others; computer network assessment for testing, analysis, and evaluation and providing authentication services, namely, restricting unauthorized network access by users without credentials; providing information via a website and via computer networks in the field of computer networking; providing technical information online in the fields of local networks, wide-area networks, wireless networks, computer networks, routers, network infrastructure, network applications, network programs, computer applications, computer programs, data, network traffic, network information, cloud computer networks, cloud programs, and data centers, namely, providing information regarding hardware and software performance as part of computer networking; installation, maintenance, and repair services in regards to computer software in the fields of computer networks, telecommunications, networking, communications, and network security; technical support services, namely, troubleshooting in the nature of repairing computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, and securing of local networks, wide-area networks, wireless networks, and wired networks; computer services namely, remote and on-site management of the information technology (IT) systems of others; providing online non-downloadable software for management of artificial intelligence computer networks; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online non-downloadable software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online non-downloadable software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable, cloud-based software featuring a virtual assistant for use in managing, monitoring, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self repair, and providing repair recommendations; providing online nondownloadable secure access service edge (SASE) software for data and network security; providing online nondownloadable software for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online non-downloadable software for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable computer programs for use in accessing and viewing computer network infrastructure and systems; non-downloadable software for managing wireless access points and local area network access points; providing online non-downloadable software for use in edge analytics; platform-as-a-service (PaaS) featuring software for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software for managing machine-to-machine applications and machine-to-machine networks; providing online non-downloadable software and cloud platforms for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; fog computing services, namely, providing virtual computer systems in which computing resources and application services are distributed as a decentralized computing infrastructure; providing online non-downloadable software and cloud platforms that route and transmit data between connected devices, applications, and data platforms; providing online nondownloadable software and cloud platforms for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online nondownloadable software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online nondownloadable software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software using artificial intelligence, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software using artificial intelligence for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software using artificial intelligence for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online, non-downloadable artificial intelligence and machine learning software using artificial intelligence for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; providing online non-downloadable secure access service edge (SASE) software using artificial intelligence for data and network security; providing online nondownloadable software using artificial intelligence for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online nondownloadable software using artificial intelligence for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable software using artificial intelligence for computer network management; providing online non-downloadable computer programs using artificial intelligence for use in accessing and viewing computer network infrastructure and systems; non-downloadable software using artificial intelligence for managing wireless access points and local area network access points; providing online non-downloadable software using artificial intelligence for use in edge analytics; platform-as-a-service (PaaS) featuring software using artificial intelligence for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing machine-to-machine applications and machine-to-machine networks; providing online nondownloadable and cloud platforms using artificial intelligence for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; providing online non-downloadable software and cloud platforms using artificial intelligence that route and transmit data between connected devices, applications, and data platforms; providing online non-downloadable software and cloud platforms using artificial intelligence for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture
An example first network device includes a control unit configured to execute at least one application and a forwarding unit. The forwarding unit includes an interface configured to receive packets, at least one packet processor operably coupled to a memory, and a forwarding path, wherein at least a portion of the forwarding path is stored in the memory and is executable by the at least one packet processor. The forwarding unit is configured to receive an advertisement originated by a second network device in a network, wherein the advertisement specifies a second micro segment identifier (SID), and store, in a destination lookup table, a route entry comprising a first micro SID associated with the first network device and the second micro SID.
The disclosed embodiments provide for rules-based deployment of software installations. In some aspects, operational parameters for a computer system are monitored over time to generate a historical database of values for the operational parameters. The computer system may include multiple instances of a software installation. A portion of the multiple instances is updated with a new version of software. The operational parameters are then monitored to quantify whether the new version results in an improvement or degradation of performance of the computer system. The improvement or degradation is based on comparing values of the operational parameters after deployment to their historical values. Depending on the evaluation of the operational parameters after the installation, the installation may be rolled back if a degradation is indicated. Otherwise, the new software version may be propagated to additional installation instances.
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
Techniques are disclosed for reporting diagnostics data by a first network device to a cloud-based Wide Area Network (WAN) assurance system, responsive to the first network device detecting a communication issue with the cloud-based WAN assurance system. For example, the first network device detects an issue with sending telemetry data to the cloud-based WAN assurance system via a first communication path. In response, the first network device determines a second network device that has connectivity to the WAN assurance system. The first network device sends diagnostics data to the second network device along a second communication path for forwarding to the cloud-based WAN assurance system. The cloud-based WAN assurance system receives the diagnostics data from the second network device. The cloud-based WAN assurance system controls the second network device to remediate the first network device based on the diagnostics data.
Techniques are described for determining one or more outlier logical paths in a computer network. A cloud-based network management system stores path data received from a plurality of network devices operating as network gateways for an enterprise network, the path data collected by each network device of the plurality of network devices for one or more logical paths of a physical interface from the network device over a wide area network (WAN). The network management system compares the path data for the plurality of logical paths to determine one or more outlier logical paths out of the plurality of logical paths. The network management system, in response to determining the one or more outlier logical paths, output a notification indicative of the one or more outlier path data out of the plurality of logical paths.
A disclosed apparatus may boost internal voltages of power supply units (PSUs) to extend hold-up times. For example, an apparatus may include a PSU and a controller. In one example, the PSU may be configured to convert power from an AC input into a direct current (DC) output and provide the DC output to a computing device. In this example, the controller may be configured to detect a loss of the AC input and extend a hold-up time of the PSU in response to detecting the loss of the AC input by modifying at least one switch included in the PSU. Various other apparatuses, systems, and methods are also disclosed.
H02M 1/42 - Circuits or arrangements for compensating for or adjusting power factor in converters or inverters
H02M 7/21 - Conversion of AC power input into DC power output without possibility of reversal by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal
H02M 7/217 - Conversion of AC power input into DC power output without possibility of reversal by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only
30.
Apparatus, system, and method for protecting power supply units from damage by limiting inrush current
A disclosed apparatus may protect power supply units (PSUs) from damage by limiting inrush current. For example, an apparatus may include a PSU and a controller. In one example, the PSU may be configured to convert power from an AC input into a DC output and to provide the DC output to a computing device. In this example, the controller may be configured to limit inrush current originating from the AC input by cycling at least one switch included in the PSU until a DC bulk voltage of the PSU reaches a certain threshold. Various other apparatuses, systems, and methods are also disclosed.
G06F 1/30 - Means for acting in the event of power-supply failure or interruption, e.g. power-supply fluctuations
H02M 1/42 - Circuits or arrangements for compensating for or adjusting power factor in converters or inverters
H02M 1/44 - Circuits or arrangements for compensating for electromagnetic interference in converters or inverters
H02M 7/06 - Conversion of AC power input into DC power output without possibility of reversal by static converters using discharge tubes without control electrode or semiconductor devices without control electrode
31.
SCALABLE MULTI-PLANE FABRIC-LESS CONNECTIVITY FOR PACKET FORWARDING ENGINE
A network device includes one or more dies, wherein each die, of the one or more dies includes one or more packet forwarding components and a switch fabric component. The switch fabric component of a particular die, of the one or more dies, may be connected to the one or more forwarding components of the particular die, and may be configured to provide a switching plane for the one or more packet forwarding components of the particular die. A first die, of the one or more dies, may be connected to the one or more packet forwarding components of a second die of the one or more dies, and may be configured to provide a switching plane for the one or more packet forwarding components of the second die.
A device may generate a first polynomial and a second polynomial, and may generate, based on the first polynomial, a primary path from a first network device to a second network device via a first set of intermediate network devices. The device may generate, based on the second polynomial, a secondary path from the first network device to the second network device via a second set of intermediate network devices, and may assign a point of the first and second polynomials to the device, to each of the first set of intermediate network devices and of the second set of intermediate network devices. The device may cause the primary path to be provided from the first network device to the second network device, and may cause the secondary path to be provided from the first network device to the second network device.
A system comprising one or more processors configured to receive a query indicating one or more of filtering information, sorting information, or joining information and retrieve, from a first datastore, an intent graph for a network, wherein the intent graph comprises nodes representing components of the network and edges representing connections between the components. The one or more processors being further configured to select a subset of a plurality of network devices of the network based on the query and the intent graph retrieved from the first datastore and retrieve, from a second datastore, data received from the plurality of network devices of the network. The one or more processors being further configured to determine a response to the query based on the selected subset of the plurality of network devices and the data retrieved from the second datastore and output the response to the query.
H04L 41/0873 - Checking configuration conflicts between network elements
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
34.
Apparatus, system, and method for performing self-contained reliability testing on computing devices
A disclosed computing device capable of performing self-contained reliability testing may include (1) a cooling device and (2) circuitry communicatively coupled to the cooling device, wherein the circuitry is configured to (A) alternate between periods of high computing activity that increases heat emission and periods of low computing activity that decreases the heat emission and (B) direct the cooling device to decrease cooling power during the periods of high computing activity and increase the cooling power during the periods of low computing activity. Various other apparatuses, systems, and methods are also disclosed.
Methods and apparatus for identifying the root cause of deterioration of system level experience (SLE). Offending network components that caused the SLE deterioration are identified and corrective actions are taken.
H04L 41/08 - Configuration management of networks or network elements
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
Techniques are described for forming on-demand mesh connections between spoke routers of a Software-Defined Wide Area Network (SD-WAN) arranged in a hub-and-spoke topology. A first spoke router modifies the first packet to include metadata specifying first reachability information and first Internet Protocol (IP) address information for the first spoke router. The first spoke router forwards the first packet to a hub router for forwarding to a second spoke router. The first spoke router receives a second packet from the hub router that includes metadata specifying second reachability information and second IP address information for the second spoke router. In response to determining that the first reachability information is compatible with the second reachability information, the first spoke router initiates a peering connection with the second spoke router along a path which bypasses the hub router for forwarding subsequent packets of the forward packet flow.
In some implementations, a network device may receive an indication that a user plane subscriber access device has rebooted. The network device may transmit based on the indication that the user plane subscriber access device has rebooted, an indication to refrain from notifying an access network that a logical port corresponding to a subscriber group created in a track-logical-port mode is associated with an active state.
In some implementations, a network device may receive one or more indications of one or more power usage ratings associated with a plurality of network devices. The network device may perform path placement on one or more network devices of the plurality of network devices using the one or more power usage ratings.
A controller at an IP (e.g., client) layer in a multi-layer network can request a network topology map from another controller at an optical (e.g., server) layer in the multi-layer network. The controller at the optical layer of the network can use a layer mapping function and common attributes between the formats used to describe the network topology map at the two layers to generate a common layer abstraction model representing the network topology map stored at the controller at the optical layer of the network. A controller-to-controller interface can translate and/or send the common layer abstraction model to the controller at the IP layer for processing data on the network.
A Private Mobile Network (PMN) orchestrator sends, to a controller for a public mobile network, a message indicating one or more network functions for a private mobile network slice for a private mobile network and configuration information for the private mobile network slice. In some examples, the message is a Global System for Mobile communications Association (GSMA) NEtwork Slice Type (NEST) extended to specify the one or more network functions for the private mobile network slice and the configuration information for the private mobile network slice. The message enables the public mobile network to deploy a public mobile network slice that extends the private mobile network slice.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04W 24/02 - Arrangements for optimising operational condition
A field-replaceable unit (FRU) includes an ejector component that is to facilitate removal of the FRU from a network system chassis, a knob that is connected to the ejector component, and a knob adjustment prevention apparatus. The knob adjustment prevention apparatus includes a mounting component and a guard component. The mounting component is attached to a frame of the FRU. The guard component is connected to the mounting component and is to move between a closed position and one or more open positions. The guard component, when positioned in the closed position, surrounds the knob to prevent physical adjustment of the knob. This prevents activation of the ejector component, and thereby prevents removal of the FRU from the network system chassis, such as when the FRU is operating.
A disclosed computing device capable of intelligent power management of underutilized packet forwarding devices may include (1) a plurality of packet forwarding devices and (2) a controller communicatively coupled to the plurality of packet forwarding devices, wherein the controller is programmed to (A) search for configuration data associated with the plurality of packet forwarding devices, (B) determine, based at least in part on the search for the configuration data, that a packet forwarding device included in the plurality of packet forwarding devices is underutilized, and (C) reduce power consumption of the packet forwarding device in response to determining that the packet forwarding device is underutilized. Various other apparatuses, systems, and methods are also disclosed.
H04L 41/0833 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network energy consumption
An example system includes an access network intelligent controller comprising processing circuitry configured to communicate with a 3GPP access network control function and a non-3GPP access network control function. The non-3GPP access network control function comprises a first plurality of controllable functions. The 3GPP access network control function comprises a second plurality of controllable functions. The access network intelligent controller is configured to execute one or more applications, each application of the one or more applications configured to: issue a subscription request for a subscription to a first controllable function of the first plurality of controllable functions of the non-3GPP access network control function or a second controllable function of the second plurality of controllable functions of the 3GPP access network control function, and exchange messages with the first controllable function or the second controllable function in accordance with the subscription.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer network switches, routers, adapters, and interface devices; wireless access point (WAP) devices; local area network access point devices; gateway routers; wireless communication devices for data, audio, video, or image transmission; computer hardware containing network security functionality, namely, firewalls, data encryption, and interoperability with network security protocols; downloadable or recorded artificial intelligence software; downloadable or recorded operating system software; downloadable or recorded computer software for management of artificial intelligence computer networks; downloadable or recorded operating system software for router and network infrastructure management; downloadable or recorded operating system software that hosts computer software applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer networking software; downloadable or recorded computer software, namely, downloadable operating system programs for router management services; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software for the administration, management, and optimization of computer networks; downloadable or recorded software for developing and operating cloud computer networks and applications; downloadable or recorded computer software for routing,switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software over cloud computing networks; downloadable or recorded computer software, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software for data security and data protection; downloadable or recorded computer software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software for computer network security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; downloadable or recorded computer software for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software for data and network security; downloadable or recorded computer software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; downloadable or recorded operating system software using artificial intelligence for router and network infrastructure management; downloadable or recorded operating system software using artificial intelligence that hosts computer software using artificial intelligence applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer networking software using artificial intelligence; downloadable or recorded computer software using artificial intelligence, namely, downloadable operating system programs for router management services; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining,controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software using artificial intelligence for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software using artificial intelligence for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software using artificial intelligence for the administration, management, and optimization of computer networks; downloadable or recorded software using artificial intelligence for developing and operating cloud computer networks and applications; downloadable or recorded computer software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software using artificial intelligence for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software using artificial intelligence over cloud computing networks; downloadable or recorded computer software using artificial intelligence, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software using artificial intelligence for data security and data protection; downloadable or recorded computer software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software using artificial intelligence for computer network security, namely, software using artificial intelligence for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software using artificial intelligence for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded computer software using artificial intelligence for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software using artificial intelligence for data and network security; downloadable or recorded computer software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of network applications, network programs, computer applications, and computer programs; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting,navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of routers, network switches, network infrastructure, and computer infrastructure; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; computer hardware and recorded or downloadable software sold as a unit for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing and management; computer hardware and recorded or downloadable software sold as a unit for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable webcasts, web seminars, case studies, audio files, and videos in the fields of interconnecting, establishing, managing, securing, monitoring, troubleshooting, operating, accessing, and automation of computer hardware, computer software, artificial intelligence, machine learning, technology, peripherals, operating systems, local networks, widearea networks, wired networks, wireless networks, computer networks, network infrastructure, network security, web browsers, electronic devices, cloud computing, and data security for cloud computing environments; videos and accompanying downloadable materials in the fields of cloud computing and data security for cloud computing environments; downloadable educational videos and accompanying downloadable training materials for use in association therewith in the fields of cloud computing and data security for cloud computing environments; all of the aforementioned goods excluding laser welding apparatus, lasers for controlling engraving machines, laser marking apparatus, and accessories therefor. Providing online non-downloadable software for management of artificial intelligence computer networks; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online non-downloadable software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online non-downloadable software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable,cloud-based software featuring a virtual assistant for use in managing, monitoring, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self repair, and providing repair recommendations; providing online nondownloadable secure access service edge (SASE) software for data and network security; providing online nondownloadable software for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online non-downloadable software for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable computer programs for use in accessing and viewing computer network infrastructure and systems; providing online non-downloadable software for managing wireless access points and local area network access points; providing online non-downloadable software for use in edge analytics; platform-as-a-service (PaaS) featuring software for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software for managing machine-to-machine applications and machine-to-machine networks; providing online non-downloadable software and cloud platforms for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; fog computing services, namely, providing virtual computer systems in which computing resources and application services are distributed as a decentralized computing infrastructure; providing online non-downloadable software and cloud platforms that route and transmit data between connected devices, applications, and data platforms; providing online nondownloadable software and cloud platforms for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online nondownloadable software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online nondownloadable software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software using artificial intelligence, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software using artificial intelligence for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software using artificial intelligence for automation, visibility, operation,management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable, cloud-based software featuring a virtual assistant for use in managing, monitoring, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software using artificial intelligence for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; providing online non-downloadable secure access service edge (SASE) software using artificial intelligence for data and network security; providing online nondownloadable software using artificial intelligence for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online nondownloadable software using artificial intelligence for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable software using artificial intelligence for computer network management; providing online non-downloadable computer programs using artificial intelligence for use in accessing and viewing computer network infrastructure and systems; providing online non-downloadable software using artificial intelligence for managing wireless access points and local area network access points; providing online non-downloadable software using artificial intelligence for use in edge analytics; platform-as-a-service (PaaS) featuring software using artificial intelligence for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing machine-to-machine applications and machine-to-machine networks; providing online nondownloadable and cloud platforms using artificial intelligence for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; providing online non-downloadable software and cloud platforms using artificial intelligence that route and transmit data between connected devices, applications, and data platforms; providing online non-downloadable software and cloud platforms using artificial intelligence for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; all of the aforementioned services excluding use in the fields of laser welding apparatus, lasers for controlling engraving machines, laser marking apparatus, and accessories therefor.
In some implementations, a device may receive an indication of one or more schema parameter values associated with a network device. The device may perform a lookup, in a repository configured to store a plurality of schema parameter values associated with a plurality of schema indications, for a schema indication based on the one or more schema parameter values associated with the network device.
37 - Construction and mining; installation and repair services
Goods & Services
Installation, maintenance, and repair services in the fields of computers and in regards to computer hardware in the fields of computer networks, telecommunications, networking, communications, and network security; technical support services, namely, troubleshooting in the nature of repairing computer hardware for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, and securing of local networks, wide-area networks, wireless networks, and wired networks.
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer network switches, routers, adapters, and interface devices for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure, and for transmission of data, audio, video, or images in computer infrastructure and networking infrastructure; wireless access point (WAP) devices for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; local area network access point devices for transmission of data, audio, video, or images in computer infrastructure and networking infrastructure; gateway routers for transmission of data, audio, video, or images in computer infrastructure and networking infrastructure; wireless communication devices for data, audio, video, or image transmission for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; computer hardware containing network security functionality, namely, firewalls, data encryption, and interoperability with network security protocols; downloadable or recorded computer software for management of artificial intelligence computer networks; downloadable or recorded operating system software for router and network infrastructure management; downloadable or recorded operating system software that hosts computer software applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer software, namely, downloadable operating system programs for router management services; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software for the administration, management, and optimization of computer networks; downloadable or recorded software for developing and operating cloud computer networks and applications; downloadable or recorded computer software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable or recorded computer software for operating, optimizing, configuring, maintaining, managing, and deploying software over cloud computing networks; downloadable or recorded computer software, namely, open network application platforms for the development, deployment, testing, configuration, and automation of network applications; downloadable or recorded computer software for data security and data protection; downloadable or recorded computer software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software for computer network security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software for analyzing or reporting of network information, data and traffic; downloadable or recorded artificial intelligence and machine learning software for use in computer network management, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; downloadable or recorded computer software for interconnecting, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software for data and network security; downloadable or recorded computer software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software for implementing automation of computer networks, for testing and validating computer networks, for managing computer network traffic, and for visualizing, planning, and simulating computer network architecture; downloadable or recorded operating system software using artificial intelligence for router and network infrastructure management; downloadable or recorded operating system software using artificial intelligence that hosts computer software using artificial intelligence applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer networking software using artificial intelligence; downloadable or recorded computer software using artificial intelligence, namely, downloadable operating system programs for router management services; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software using artificial intelligence for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software using artificial intelligence for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software using artificial intelligence for the administration, management, and optimization of computer networks; downloadable or recorded software using artificial intelligence for developing and operating cloud computer networks and applications; downloadable or recorded computer software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software using artificial intelligence for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable or recorded computer software using artificial intelligence for operating, optimizing, configuring, maintaining, managing, and deploying software using artificial intelligence over cloud computing networks; downloadable or recorded computer software using artificial intelligence, namely, open network application platforms for the development, deployment, testing, configuration, and automation of network applications; downloadable or recorded computer software using artificial intelligence for data security and data protection; downloadable or recorded computer software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software using artificial intelligence for computer network security, namely, software using artificial intelligence for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software using artificial intelligence for analyzing or reporting of network information, data and traffic; downloadable or recorded computer software using artificial intelligence for interconnecting, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software using artificial intelligence for data and network security; downloadable or recorded computer software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing computer network traffic, and for visualizing, planning, and simulating computer network architecture; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, and troubleshooting of network applications, network programs, computer applications, and computer programs; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, and troubleshooting of routers, network switches, network infrastructure, and computer infrastructure; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; computer hardware and recorded or downloadable software sold as a unit for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing and management; computer hardware and recorded or downloadable software sold as a unit for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable webcasts, web seminars, case studies, audio files, and videos in the fields of interconnecting, establishing, managing, securing, troubleshooting, operating, accessing, and automation of computer hardware, computer software, artificial intelligence, machine learning, technology, peripherals, operating systems, local networks, wide-area networks, wired networks, wireless networks, computer networks, network infrastructure, network security, web browsers, electronic devices, cloud computing, and data security for cloud computing environments; videos and accompanying downloadable materials in the fields of cloud computing and data security for cloud computing environments; downloadable educational videos and accompanying downloadable training materials for use in association therewith in the fields of cloud computing and data security for cloud computing environments.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Consulting services in the fields of design and implementation of computer networks, cloud computing, data center design, storage design, data center infrastructure, computer network and network infrastructure management, computer network security, computer software, development and use of computer hardware, development and use of computer networking equipment, computer network design, storage design, network security, cloud security, network virtualization, and computer network analytics; consulting services in the field of software scripts for network automation; consulting services for developing computer systems, applications, architecture, and computer hardware, software, and firmware, namely, application development computer software programs; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer hardware for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services, namely, migration of data centers, servers, and databases between computer networks; technical support services in the fields of computer software, development, and use of computer hardware, computer networking equipment, telecommunications equipment, computer network design, storage design, cloud computing, network security, cloud security, data center design, and analytics, namely, providing live and online diagnosing of problems, service desk, and help desk services in all of the above-listed fields; design and development of computer software applications for network efficiency improvement, storage design, cloud security, and data center design; design, testing, engineering, and research services relating to computers, telecommunications technology, computer networks, computer software, computer hardware, computer programming, and network security, and advisory services regarding designing, building, testing, engineering, operating, research and development in the above-listed fields; design and development of computer networks, local networks, wide-area networks, wired networks, wireless networks, and devices for network connectivity; testing, analysis, and evaluation of computer networks for the purposes of designing, building, and operation of computer networks; technical management in the field of computer networks; technical consulting in the field of the administration of computer networks; technical management in the field of administration of computer networks for designing, building, testing, engineering, and operating computer networks; consulting services in the field of cloud computing; management of wireless networks for others; computer network assessment for testing, analysis, and evaluation and providing authentication services, namely, restricting unauthorized network access by users without credentials; providing information via a website and via computer networks in the field of computer networking; providing technical information online in the fields of local networks, wide-area networks, wireless networks, computer networks, routers, network infrastructure, network applications, network programs, computer applications, computer programs, data, network traffic, network information, cloud computer networks, cloud programs, and data centers, namely, providing information regarding hardware and software performance as part of computer networking; installation, maintenance, and repair services in regards to computer software in the fields of computer networks, telecommunications, networking, communications, and network security; technical support services, namely, troubleshooting in the nature of repairing computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, and securing of local networks, wide-area networks, wireless networks, and wired networks; computer services namely, remote and on-site management of the information technology (IT) systems of others; providing online non-downloadable software for management of artificial intelligence computer networks; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online non-downloadable software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online non-downloadable software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, and automation of network applications; providing online non-downloadable software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable, cloud-based software featuring a virtual assistant for use in managing, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software for use in computer network management, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; providing online non-downloadable secure access service edge (SASE) software for data and network security; providing online non-downloadable software for proximity tracing for infectious disease; providing online non-downloadable software for use in hierarchical and distributed network processing, computer network analytics, computer network management, data storage, computer network security, controlling computer network access, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online non-downloadable software for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable computer programs for use in accessing and viewing computer network infrastructure and systems; non-downloadable software for managing wireless access points and local area network access points; platform-as-a-service (PaaS) featuring software for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software for managing computer networks and telecommunications networks, providing data security and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software for managing machine-to-machine applications and machine-to-machine networks; providing online non-downloadable software and cloud platforms for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; fog computing services, namely, providing virtual computer systems in which computing resources and application services are distributed as a decentralized computing infrastructure; providing online non-downloadable software and cloud platforms that route and transmit data between connected devices, applications, and data platforms; providing online non-downloadable software and cloud platforms for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software for data security and for analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms for data security and for analyzing and optimizing computer networks and web application performance; providing online non-downloadable software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software for implementing automation of computer networks, for testing and validating computer networks, for managing computer network traffic, and for visualizing, planning, and simulating computer network architecture; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, analyzing, virtualizing, securing, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online non-downloadable software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online non-downloadable software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software using artificial intelligence, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, and automation of network applications; providing online non-downloadable software using artificial intelligence for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software using artificial intelligence for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online, non-downloadable artificial intelligence and machine learning software using artificial intelligence for use in computer network management, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; providing online non-downloadable secure access service edge (SASE) software using artificial intelligence for data and network security; providing online non-downloadable software using artificial intelligence for proximity tracing for infectious disease; providing online non-downloadable software using artificial intelligence for use in hierarchical and distributed network processing, computer network analytics, computer network management, data storage, computer network security, controlling computer network access, data mining, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online non-downloadable software using artificial intelligence for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable software using artificial intelligence for computer network management; providing online non-downloadable computer programs using artificial intelligence for use in accessing and viewing computer network infrastructure and systems; non-downloadable software using artificial intelligence for managing wireless access points and local area network access points; providing online non-downloadable software using artificial intelligence for use in edge analytics; platform-as-a-service (PaaS) featuring software using artificial intelligence for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing computer networks and telecommunications networks, providing data security, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing machine-to-machine applications and machine-to-machine networks; providing online non-downloadable and cloud platforms using artificial intelligence for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; providing online non-downloadable software and cloud platforms using artificial intelligence that route and transmit data between connected devices, applications, and data platforms; providing online non-downloadable software and cloud platforms using artificial intelligence for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for data security and for analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms using artificial intelligence for data security and for analyzing and optimizing computer networks and web application performance; providing online non-downloadable software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing computer network traffic, and for visualizing, planning, and simulating computer network architecture.
41 - Education, entertainment, sporting and cultural services
Goods & Services
Educational services, namely, training in the field of technology and artificial intelligence; educational services, namely, providing online conferences, training, testing, tutorials, workshops, educational courses, and distributing online course materials on managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, securing, and troubleshooting of computer hardware and software, technology, peripherals, operating systems, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, network security, web browsers, artificial intelligence, and electronic devices; educational services, namely, providing in-person conferences, training, testing, tutorials, workshops, educational courses, and distributing course materials on managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, securing, and troubleshooting of computer hardware and software, technology, peripherals, operating systems, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, network security, web browsers, artificial intelligence, and electronic devices; developing educational manuals and guides for others in the fields of computer hardware and software, peripherals, operating systems, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, network security, web browsers, artificial intelligence, and electronic devices; providing a website featuring blogs and online non-downloadable publications in the nature of e-books, compliance guides, data sheets, and reports in the fields of cloud computing and data security for cloud computing environments; providing a website featuring online non-downloadable educational webcasts, web seminars, case studies, audio files, and videos and accompanying non-downloadable training materials for use in association therewith in the fields of cloud computing and data security for cloud computing environments.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Computer network switches, routers, adapters, and interface devices; wireless access point (WAP) devices; local area network access point devices; gateway routers; wireless communication devices for data, audio, video, or image transmission; computer hardware containing network security functionality, namely, firewalls, data encryption, and interoperability with network security protocols; downloadable or recorded artificial intelligence software; downloadable or recorded operating system software; downloadable or recorded computer software for management of artificial intelligence computer networks; downloadable or recorded operating system software for router and network infrastructure management; downloadable or recorded operating system software that hosts computer software applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer networking software; downloadable or recorded computer software, namely, downloadable operating system programs for router management services; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software for the administration, management, and optimization of computer networks; downloadable or recorded software for developing and operating cloud computer networks and applications; downloadable or recorded computer software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software over cloud computing networks; downloadable or recorded computer software, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software for data security and data protection; downloadable or recorded computer software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software for computer network security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; downloadable or recorded computer software for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software for data and network security; downloadable or recorded computer software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; downloadable or recorded operating system software using artificial intelligence for router and network infrastructure management; downloadable or recorded operating system software using artificial intelligence that hosts computer software using artificial intelligence applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer networking software using artificial intelligence; downloadable or recorded computer software using artificial intelligence, namely, downloadable operating system programs for router management services; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software using artificial intelligence for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software using artificial intelligence for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software using artificial intelligence for the administration, management, and optimization of computer networks; downloadable or recorded software using artificial intelligence for developing and operating cloud computer networks and applications; downloadable or recorded computer software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software using artificial intelligence for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software using artificial intelligence over cloud computing networks; downloadable or recorded computer software using artificial intelligence, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software using artificial intelligence for data security and data protection; downloadable or recorded computer software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software using artificial intelligence for computer network security, namely, software using artificial intelligence for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software using artificial intelligence for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded computer software using artificial intelligence for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software using artificial intelligence for data and network security; downloadable or recorded computer software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of network applications, network programs, computer applications, and computer programs; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of routers, network switches, network infrastructure, and computer infrastructure; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; computer hardware and recorded or downloadable software sold as a unit for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing and management; computer hardware and recorded or downloadable software sold as a unit for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable webcasts, web seminars, case studies, audio files, and videos in the fields of interconnecting, establishing, managing, securing, monitoring, troubleshooting, operating, accessing, and automation of computer hardware, computer software, artificial intelligence, machine learning, technology, peripherals, operating systems, local networks, widearea networks, wired networks, wireless networks, computer networks, network infrastructure, network security, web browsers, electronic devices, cloud computing, and data security for cloud computing environments; videos and accompanying downloadable materials in the fields of cloud computing and data security for cloud computing environments; downloadable educational videos and accompanying downloadable training materials for use in association therewith in the fields of cloud computing and data security for cloud computing environments (1) Consulting services in the fields of design and implementation of computer networks, cloud computing, data center design, storage design, data center infrastructure, computer network and network infrastructure management, computer network security, computer software, development and use of computer hardware, development and use of computer networking equipment, computer network design, storage design, network security, cloud security, network virtualization, and computer network analytics; consulting services in the field of software scripts for network automation; consulting services for developing computer systems, applications, architecture, and computer hardware, software, and firmware, namely, application development computer software programs; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer hardware for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services, namely, migration of data centers, servers, and databases between computer networks; technical support services in the fields of computer, data, email, web, and network security, namely, monitoring of network systems for technical and computer security purposes; technical support services in the fields of computer software, development, and use of computer hardware, computer networking equipment, telecommunications equipment, computer network design, storage design, cloud computing, network security, cloud security, data center design, and analytics, namely, providing live and online diagnosing of problems, service desk, and help desk services in all of the above-listed fields; computer network design for others; computer programming; design and development of computer software applications for network efficiency improvement, storage design, cloud security, and data center design; design, testing, engineering, and research services relating to computers, telecommunications technology, computer networks, computer software, computer hardware, computer programming, and network security, and advisory services regarding designing, building, testing, engineering, operating, research and development in the above-listed fields; design and development of computer networks, local networks, wide-area networks, wired networks, wireless networks, and devices for network connectivity; testing, analysis, and evaluation of computer networks for the purposes of designing, building, and operation of computer networks; technical management in the field of computer networks; technical consulting in the field of the administration of computer networks; technical management in the field of administration of computer networks for designing, building, testing, engineering, and operating computer networks; consulting services in the field of cloud computing; computer management services, namely, the monitoring, reporting, management of, and automation of data traffic across wireless communications networks and the internet; management of wireless networks for others; computer network assessment for testing, analysis, and evaluation and providing authentication services, namely, restricting unauthorized network access by users without credentials; providing information via a website and via computer networks in the field of computer networking; providing technical information online in the fields of local networks, wide-area networks, wireless networks, computer networks, routers, network infrastructure, network applications, network programs, computer applications, computer programs, data, network traffic, network information, cloud computer networks, cloud programs, and data centers, namely, providing information regarding hardware and software performance as part of computer networking; installation, maintenance, and repair services in regards to computer software in the fields of computer networks, telecommunications, networking, communications, and network security; technical support services, namely, troubleshooting in the nature of repairing computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, and securing of local networks, wide-area networks, wireless networks, and wired networks; computer services namely, remote and on-site management of the information technology (IT) systems of others; providing online non-downloadable software for management of artificial intelligence computer networks; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online non-downloadable software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online non-downloadable software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable, cloud-based software featuring a virtual assistant for use in managing, monitoring, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self repair, and providing repair recommendations; providing online nondownloadable secure access service edge (SASE) software for data and network security; providing online nondownloadable software for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online non-downloadable software for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable computer programs for use in accessing and viewing computer network infrastructure and systems; non-downloadable software for managing wireless access points and local area network access points; providing online non-downloadable software for use in edge analytics; platform-as-a-service (PaaS) featuring software for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software for managing machine-to-machine applications and machine-to-machine networks; providing online non-downloadable software and cloud platforms for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; fog computing services, namely, providing virtual computer systems in which computing resources and application services are distributed as a decentralized computing infrastructure; providing online non-downloadable software and cloud platforms that route and transmit data between connected devices, applications, and data platforms; providing online nondownloadable software and cloud platforms for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online nondownloadable software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online nondownloadable software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software using artificial intelligence, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software using artificial intelligence for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software using artificial intelligence for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable, cloud-based software featuring a virtual assistant for use in managing, monitoring, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software using artificial intelligence for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; providing online non-downloadable secure access service edge (SASE) software using artificial intelligence for data and network security; providing online nondownloadable software using artificial intelligence for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online nondownloadable software using artificial intelligence for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable software using artificial intelligence for computer network management; providing online non-downloadable computer programs using artificial intelligence for use in accessing and viewing computer network infrastructure and systems; non-downloadable software using artificial intelligence for managing wireless access points and local area network access points; providing online non-downloadable software using artificial intelligence for use in edge analytics; platform-as-a-service (PaaS) featuring software using artificial intelligence for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing machine-to-machine applications and machine-to-machine networks; providing online nondownloadable and cloud platforms using artificial intelligence for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; providing online non-downloadable software and cloud platforms using artificial intelligence that route and transmit data between connected devices, applications, and data platforms; providing online non-downloadable software and cloud platforms using artificial intelligence for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture.
51.
SEAMLESS SUPPORT AND NODE-BY-NODE MIGRATION FOR MULTIPLE DISTRIBUTED FLOOD REDUCTION ALGORITHMS IN THE SAME NETWORK
A first network device of a first tier of a network may receive a modified link state protocol (LSP) data unit, and may determine, based on the modified LSP data unit, whether an origin of the modified LSP data unit is executing the same algorithm as the first network device. The first network device may calculate a shortest-path spanning tree (SPT), and may set metrics to one for links associated with the first network device and the plurality of other network devices based on determining that the origin of the modified LSP data unit is executing a different algorithm than the first network device. The first network device may truncate the SPT to determine a flooding group, may select a member of the flooding group to flood the modified LSP data unit, and may cause the member to provide the modified LSP data unit to a second tier network device.
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering
52.
REMEDIATION WORK SCORE FOR NETWORK TRUST APPLICATIONS
This disclosure describes techniques that include determining a trust score for a network entity; identifying at least one weakness of the network entity, based on the determined trust score; determining a set of remediation actions for addressing the at least one weakness; determining, for each remediation action of the set of remediation actions, an expected amount of work associated with the remediation action; selecting a remediation action from the set of remediation actions, based on the determining, for each remediation action, the expected amount of work associated with the remediation action; and performing an operation associated with at least a portion of the selected remediation action.
09 - Scientific and electric apparatus and instruments
37 - Construction and mining; installation and repair services
38 - Telecommunications services
40 - Treatment of materials; recycling, air and water treatment,
42 - Scientific, technological and industrial services, research and design
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
Goods & Services
(1) Computer hardware; computer network switches, routers, adapters, and interface devices; wireless access point (WAP) devices; local area network access point devices; gateway routers; wireless communication devices for data, audio, video, or image transmission; computer hardware containing network security functionality, namely, firewalls, data encryption, and interoperability with network security protocols; Downloadable computer software; recorded computer software; recorded and downloadable computer software; downloadable or recorded artificial intelligence software; downloadable or recorded operating system software; downloadable or recorded computer software for management of artificial intelligence computer networks; downloadable or recorded operating system software for router and network infrastructure management; downloadable or recorded operating system software that hosts computer software applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer networking software; downloadable or recorded computer software, namely, downloadable operating system programs for router management services; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software for the administration, management, and optimization of computer networks; downloadable or recorded software for developing and operating cloud computer networks and applications; downloadable or recorded computer software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable or recorded computer software for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software over cloud computing networks; downloadable or recorded computer software, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software for data security and data protection; downloadable or recorded computer software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software for computer network security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; downloadable or recorded computer software for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software for data and network security; downloadable or recorded computer software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; downloadable or recorded operating system software using artificial intelligence for router and network infrastructure management; downloadable or recorded operating system software using artificial intelligence that hosts computer software using artificial intelligence applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer networking software using artificial intelligence; downloadable or recorded computer software using artificial intelligence, namely, downloadable operating system programs for router management services; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software using artificial intelligence for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software using artificial intelligence for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software using artificial intelligence for the administration, management, and optimization of computer networks; downloadable or recorded software using artificial intelligence for developing and operating cloud computer networks and applications; downloadable or recorded computer software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software using artificial intelligence for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable or recorded computer software using artificial intelligence for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software using artificial intelligence over cloud computing networks; downloadable or recorded computer software using artificial intelligence, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software using artificial intelligence for data security and data protection; downloadable or recorded computer software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software using artificial intelligence for computer network security, namely, software using artificial intelligence for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software using artificial intelligence for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded computer software using artificial intelligence for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software using artificial intelligence for data and network security; downloadable or recorded computer software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; computer hardware with embedded software; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of network applications, network programs, computer applications, and computer programs; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of routers, network switches, network infrastructure, and computer infrastructure; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; computer hardware and recorded or downloadable software sold as a unit for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing and management; computer hardware and recorded or downloadable software sold as a unit for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable webcasts, web seminars, case studies, audio files, and videos in the fields of interconnecting, establishing, managing, securing, monitoring, troubleshooting, operating, accessing, and automation of computer hardware, computer software, artificial intelligence, machine learning, technology, peripherals, operating systems, local networks, wide-area networks, wired networks, wireless networks, computer networks, network infrastructure, network security, web browsers, electronic devices, cloud computing, and data security for cloud computing environments; videos and accompanying downloadable materials in the fields of cloud computing and data security for cloud computing environments; downloadable educational videos and accompanying downloadable training materials for use in association therewith in the fields of cloud computing and data security for cloud computing environments; (1) Consulting services; consulting services in the fields of design and implementation of computer networks, cloud computing, data center design, storage design, data center infrastructure, computer network and network infrastructure management, computer network security, computer software, development and use of computer hardware, development and use of computer networking equipment, computer network design, storage design, network security, cloud security, network virtualization, and computer network analytics; consulting services in the field of software scripts for network automation; consulting services for developing computer systems, applications, architecture, and computer hardware, software, and firmware, namely, application development computer software programs; technical support services; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer hardware for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services, namely, migration of data centers, servers, and databases between computer networks; technical support services in the fields of computer, data, email, web, and network security, namely, monitoring of network systems for technical and computer security purposes; technical support services in the fields of computer software, development, and use of computer hardware, computer networking equipment, telecommunications equipment, computer network design, storage design, cloud computing, network security, cloud security, data center design, and analytics, namely, providing live and online diagnosing of problems, service desk, and help desk services in all of the above-listed fields; computer network design for others; computer programming; design and development of computer software applications for network efficiency improvement, storage design, cloud security, and data center design; design, testing, engineering, and research services relating to computers, telecommunications technology, computer networks, computer software, computer hardware, computer programming, and network security, and advisory services regarding designing, building, testing, engineering, operating, research and development in the above-listed fields; design and development of computer networks, local networks, wide-area networks, wired networks, wireless networks, and devices for network connectivity; testing, analysis, and evaluation of computer networks for the purposes of designing, building, and operation of computer networks; technical management in the field of computer networks; technical consulting in the field of the administration of computer networks; technical management in the field of administration of computer networks for designing, building, testing, engineering, and operating computer networks; consulting services in the field of cloud computing; computer management services, namely, the monitoring, reporting, management of, and automation of data traffic across wireless communications networks and the internet; management of wireless networks for others; computer network assessment for testing, analysis, and evaluation and providing authentication services, namely, restricting unauthorized network access by users without credentials; providing information via a website and via computer networks in the field of computer networking; providing technical information online in the fields of local networks, wide-area networks, wireless networks, computer networks, routers, network infrastructure, network applications, network programs, computer applications, computer programs, data, network traffic, network information, cloud computer networks, cloud programs, and data centers, namely, providing information regarding hardware and software performance as part of computer networking; installation, maintenance, and repair services in regards to computer software in the fields of computer networks, telecommunications, networking, communications, and network security; technical support services, namely, troubleshooting in the nature of repairing computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, and securing of local networks, wide-area networks, wireless networks, and wired networks; Computer services; computer services namely, remote and on-site management of the information technology (IT) systems of others; software-as-a-service (SaaS) services; platform-as-a-service (PaaS) services; cloud computing services; providing online non-downloadable software for management of artificial intelligence computer networks; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online non-downloadable software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online non-downloadable software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable, cloud-based software featuring a virtual assistant for use in managing, monitoring, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; providing online non-downloadable secure access service edge (SASE) software for data and network security; providing online non-downloadable software for proximity tracing for infectious disease; providing online non-downloadable software for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online non-downloadable software for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable computer programs for use in accessing and viewing computer network infrastructure and systems; non-downloadable software for managing wireless access points and local area network access points; providing online non-downloadable software for use in edge analytics; platform-as-a-service (PaaS) featuring software for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; providing online, non-downloadable artificial intelligence software; software-as-a-service (SaaS) services featuring software for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software for managing machine-to-machine applications and machine-to-machine networks; providing online non-downloadable software and cloud platforms for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; fog computing services, namely, providing virtual computer systems in which computing resources and application services are distributed as a decentralized computing infrastructure; providing online non-downloadable software and cloud platforms that route and transmit data between connected devices, applications, and data platforms; providing online non-downloadable software and cloud platforms for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online non-downloadable software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online non-downloadable software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software using artificial intelligence, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software using artificial intelligence for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software using artificial intelligence for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable, cloud-based software featuring a virtual assistant for use in managing, monitoring, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software using artificial intelligence for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; providing online non-downloadable secure access service edge (SASE) software using artificial intelligence for data and network security; providing online non-downloadable software using artificial intelligence for proximity tracing for infectious disease; providing online non-downloadable software using artificial intelligence for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online non-downloadable software using artificial intelligence for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable software using artificial intelligence for computer network management; providing online non-downloadable computer programs using artificial intelligence for use in accessing and viewing computer network infrastructure and systems; non-downloadable software using artificial intelligence for managing wireless access points and local area network access points; providing online non-downloadable software using artificial intelligence for use in edge analytics; platform-as-a-service (PaaS) featuring software using artificial intelligence for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing machine-to-machine applications and machine-to-machine networks; providing online non-downloadable and cloud platforms using artificial intelligence for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; providing online non-downloadable software and cloud platforms using artificial intelligence that route and transmit data between connected devices, applications, and data platforms; providing online non-downloadable software and cloud platforms using artificial intelligence for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture;
In some implementations, a power balancing device may monitor a power supply module (PSM) that includes multiple power supply channels. The PSM may be part of a power supply system for a network component that includes multiple PSMs, with each of the multiple PSMs being associated with a maximum output power. The power balancing device may determine that at least one power supply channel, of the multiple power supply channels, is inoperable. The power balancing device may determine, based on determining that the at least one power supply channel is inoperable, a revised maximum output power for the PSM based on a maximum allowable input current to each power supply channel, of the multiple power supply channels. The power balancing device may cause the PSM to output a power that is less than or equal to the revised maximum output power.
A network node may receive a packet that originated from a root network node and may process the packet to determine segment identifier (SID) information associated with a point-to-multipoint transport chain. The network node may determine, based on the SID information, that the network node is a transit leaf node in the point-to-multipoint transport chain. The network node may generate, based on determining that the network node is a transit leaf node in the point-to-multipoint transport chain, a copy of the packet and may process the copy of the packet to perform one or more actions. The network node may update, based on determining that the network node is a transit leaf node in the point-to-multipoint transport chain, the SID information and may send, after updating the SID information, the packet, with the updated SID information, to another network node.
In some implementations, a first network device may receive a first message generated by an originating network device that includes a route location identifier attribute associated with an address identifier. The first network device may determine, based on the route location identifier attribute, route information associated with the address identifier.
A distribution point unit (DPU) is associated with an fixed wireless access (FWA) deployment. The DPU identifies configuration information that indicates respective correspondences between a plurality of ports of the DPU and address identifiers of a plurality of access point devices. The DPU determines that the plurality of ports of the DPU are connected to the plurality of access point devices and performs a verification operation to determine that the plurality of access point devices are connected to the plurality of ports in accordance with the configuration information. The DPU obtains, based on the configuration information, respective Internet protocol (IP) addresses associated with the plurality of access point devices. The DPU transmits, via respective connections between the plurality of ports of the DPU and the plurality of access point devices, the respective IP addresses to the plurality of access point devices.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer network switches, routers, adapters, and interface devices; wireless access point (WAP) devices; local area network access point devices; gateway routers; wireless communication devices for data, audio, video, or image transmission; computer hardware containing network security functionality, namely, firewalls, data encryption, and interoperability with network security protocols; downloadable or recorded operating system software; downloadable or recorded operating system software that hosts computer software applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer software, namely, downloadable operating system programs for router management services; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software for the administration, management, and optimization of computer networks; downloadable or recorded software for developing and operating cloud computer networks and applications; downloadable or recorded computer software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software over cloud computing networks; downloadable or recorded computer software, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software for computer network security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; downloadable or recorded computer software for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded computer software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; downloadable or recorded operating system software using artificial intelligence for router and network infrastructure management; downloadable or recorded operating system software using artificial intelligence that hosts computer software using artificial intelligence applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable or recorded computer software using artificial intelligence, namely, downloadable operating system programs for router management services; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable or recorded computer software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable or recorded computer software using artificial intelligence for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable or recorded computer software using artificial intelligence for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable or recorded software using artificial intelligence for management, control, and operation of computer and networking applications; downloadable or recorded computer networking software using artificial intelligence for the administration, management, and optimization of computer networks; downloadable or recorded software using artificial intelligence for developing and operating cloud computer networks and applications; downloadable or recorded computer software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, security orchestration and management; downloadable or recorded computer software using artificial intelligence for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable or recorded computer software using artificial intelligence for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software using artificial intelligence over cloud computing networks; downloadable or recorded computer software using artificial intelligence, namely, open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable or recorded computer software using artificial intelligence for data security and data protection; downloadable or recorded computer software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable or recorded computer software using artificial intelligence for computer network security, namely, software using artificial intelligence for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable or recorded computer software using artificial intelligence for monitoring, analyzing or reporting of network information, data and traffic; downloadable or recorded computer software using artificial intelligence for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable or recorded secure access service edge (SASE) software using artificial intelligence for data and network security; downloadable or recorded computer software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; downloadable or recorded computer software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of network applications, network programs, computer applications, and computer programs; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of routers, network switches, network infrastructure, and computer infrastructure; computer hardware and recorded or downloadable software sold as a unit for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; computer hardware and recorded or downloadable software sold as a unit for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing and management. Consulting services in the fields of design and implementation of computer networks, cloud computing, data center design, storage design, data center infrastructure, computer network and network infrastructure management, computer network security, computer software, development and use of computer hardware, development and use of computer networking equipment, computer network design, storage design, network security, cloud security, network virtualization, and computer network analytics; consulting services in the field of software scripts for network automation; consulting services for developing computer systems, applications, architecture, and computer hardware, software, and firmware, namely, application development computer software programs; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer hardware for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services, namely, troubleshooting in the nature of diagnosing problems for computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, and securing of computer networks, local networks, wide-area networks, wired networks, wireless networks, network infrastructure, routers, switches, cloud computer networks, and data centers; technical support services in the fields of computer, data, email, web, and network security, namely, monitoring of network systems for technical and computer security purposes; technical support services in the fields of computer software, development, and use of computer hardware, computer networking equipment, telecommunications equipment, computer network design, storage design, cloud computing, network security, cloud security, data center design, and analytics, namely, providing live and online diagnosing of problems, service desk, and help desk services in all of the above-listed fields; design and development of computer software applications for network efficiency improvement, storage design, cloud security, and data center design; design, testing, engineering, and research services relating to computers, telecommunications technology, computer networks, computer software, computer hardware, computer programming, and network security, and advisory services regarding designing, building, testing, engineering, operating, research and development in the above-listed fields; design and development of computer networks, local networks, wide-area networks, wired networks, wireless networks, and devices for network connectivity; testing, analysis, and evaluation of computer networks for the purposes of designing, building, and operation of computer networks; technical management in the field of computer networks; technical consulting in the field of the administration of computer networks; technical management in the field of administration of computer networks for designing, building, testing, engineering, and operating computer networks; consulting services in the field of cloud computing; computer management services, namely, the monitoring, reporting, management of, and automation of data traffic across wireless communications networks and the internet; management of wireless networks for others; computer network assessment for testing, analysis, and evaluation and providing authentication services, namely, restricting unauthorized network access by users without credentials; installation, maintenance, and repair services in regards to computer software in the fields of computer networks, telecommunications, networking, communications, and network security; technical support services, namely, troubleshooting in the nature of repairing computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, and securing of local networks, wide-area networks, wireless networks, and wired networks; providing online non-downloadable software for management of artificial intelligence computer networks; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online non-downloadable software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online non-downloadable software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable,cloud-based software featuring a virtual assistant for use in managing, monitoring, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; providing online non-downloadable software for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online non-downloadable software for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable computer programs for use in accessing and viewing computer network infrastructure and systems; providing online non-downloadable software for managing wireless access points and local area network access points; providing online non-downloadable software for use in edge analytics; platform-as-a-service (PaaS) featuring software for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software for managing machine-to-machine applications and machine-to-machine networks; providing online non-downloadable software and cloud platforms for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; fog computing services, namely, providing virtual computer systems in which computing resources and application services are distributed as a decentralized computing infrastructure; providing online non-downloadable software and cloud platforms that route and transmit data between connected devices, applications, and data platforms; providing online non-downloadable software and cloud platforms for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; providing online non-downloadable software using artificial intelligence for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; providing online non-downloadable software using artificial intelligence for managing, designing, implementing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; providing online non-downloadable software using artificial intelligence for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information for use in network routing, switching, orchestration, and management; providing online non-downloadable software using artificial intelligence for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, protection against network intrusion and viruses, encryption and authentication of data, data-loss prevention, data recovery, network security, and detection, filtering, analyzing, managing and blocking of electronic communications; providing online non-downloadable software using artificial intelligence, namely, non-downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; providing online non-downloadable software using artificial intelligence for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; providing online non-downloadable software using artificial intelligence for automation, visibility, operation, management, and control of operation of networking infrastructure, and automation, visibility, operation, management, orchestration, and control of operation of computer applications, and services within a computer networking infrastructure; providing online non-downloadable, cloud-based software featuring a virtual assistant for use in managing, monitoring, troubleshooting, and automation of computer networks through artificial intelligence and machine learning; providing online, non-downloadable artificial intelligence and machine learning software using artificial intelligence for use in computer network management, monitoring, automation, diagnostics, troubleshooting, self-repair, and providing repair recommendations; providing online non-downloadable secure access service edge (SASE) software using artificial intelligence for data and network security; providing online non-downloadable software using artificial intelligence for use in hierarchical and distributed network processing, computer network analytics, computer network monitoring, computer network management, data storage, computer network security, controlling computer network access, data mining, monitoring, analyzing, and controlling machine-to-machine communications and human-machine interaction; providing online non-downloadable software using artificial intelligence for computer network management, network infrastructure management, information technology infrastructure management, and data center infrastructure management; providing online non-downloadable software using artificial intelligence for computer network management; providing online non-downloadable computer programs using artificial intelligence for use in accessing and viewing computer network infrastructure and systems; providing online non-downloadable software using artificial intelligence for managing wireless access points and local area network access points; providing online non-downloadable software using artificial intelligence for use in edge analytics; platform-as-a-service (PaaS) featuring software using artificial intelligence for enabling business enterprises, data centers, and telecommunication service providers to deploy, manage, troubleshoot, track and upgrade network software and services; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing computer networks and telecommunications networks, providing data security, monitoring network performance, and collecting and analyzing network usage data and user, device, application and customer activity data; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked devices via wireless or wired networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for connecting, operating, and managing networked internet of things (IoT) devices; software-as-a-service (SaaS) services featuring software using artificial intelligence for managing machine-to-machine applications and machine-to-machine networks; providing online non-downloadable and cloud platforms using artificial intelligence for machine-to-machine networks for data connectivity, device management, configuration, provisioning, management, integration and control of internet of things (IoT) devices; providing online non-downloadable software and cloud platforms using artificial intelligence that route and transmit data between connected devices, applications, and data platforms; providing online non-downloadable software and cloud platforms using artificial intelligence for collecting, connecting, transmitting and analyzing machine-to-machine data from and between connected devices, applications, and computer networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; platform-as-a-service (PaaS) services featuring software using artificial intelligence for designing, planning, provisioning, operating and optimizing computer networks and telecommunications networks; software-as-a-service (SaaS) services featuring software using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; platform-as-a-service (PaaS) services featuring computer software platforms using artificial intelligence for data security and for monitoring, analyzing and optimizing computer networks and web application performance; providing online non-downloadable software using artificial intelligence for design, deployment, and operation of data center networks and of cloud-computing infrastructure; providing online non-downloadable software using artificial intelligence for implementing automation of computer networks, for testing and validating computer networks, for managing and monitoring computer network traffic, and for visualizing, planning, and simulating computer network architecture.
59.
Methods and apparatus for efficient use of link aggregation groups
A non-transitory processor-readable medium storing code representing instructions to be executed by a processor can cause the processor to receive an indication to load balance a group of sessions associated with a network node and a switch across a group of links between a gateway device and the switch at a first time. The code causes the processor to calculate at a second time, a load based on the group of sessions and associated with a first set of links in an active configuration before the first time. The code causes the processor to send a signal to cause a set of sessions from the group of sessions to re-establish themselves at a third time based on a threshold value calculated based on the load such that the set of sessions are load balanced across a second set of links in the active configuration at the third time.
H04L 47/76 - Admission controlResource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
60.
METHODS AND APPARATUS FOR PERFORMING ACCESS AND/OR FORWARDING CONTROL IN WIRELESS NETWORKS SUCH AS WLANS
Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Techniques for EVPN Host Routed Bridging (HRB) and EVPN cloud-native data center with Host Routed Bridging (HRB) are described. A host computing device of a data center includes one or more containerized user-level applications. A cloud native virtual router is configured for dynamic deployment by the data center application orchestration engine and operable in a user space of the host computing device. Processing circuitry is configured for execution of the containerized user-level applications and the cloud native virtual router. The cloud native virtual router comprises a containerized routing protocol process configured to operate as a control plane, and a data plane for the containerized router. The data plane is configured to operate an ethernet virtual private network (EVPN) encapsulation/decapsulation data path of an overlay network for communicating layer two (L2) network traffic of the containerized user applications over a switch fabric of the data center.
The disclosure describes one or more techniques for performing roaming tests for sites. For example, a device comprises a memory and one or more processors in communication with the memory and configured to obtain instructions that cause a device of a site to operate as a synthetic client device and to simulate a roaming instance; and send data associated with the roaming instance to a network management system, wherein the data is indicative of a performance of the roaming instance.
Techniques describe a network management system comprising a memory and processing circuitry configured to obtain distance measurements between at least two devices at a site, wherein the at least two devices comprise at least one reference device positioned at a known location and a target device relative to the at least one reference device positioned at an unknown location. The processing circuitry may further be configured to obtain directional information specifying a direction of one or more signals communicated between the at least one reference device and the target device. The processing circuitry may further be configured to determine, based on the distance measurements and the directional information, a plurality of possible positions of the target device relative to the at least one reference device. The processing circuitry may further be configured to determine, based on the directional information, a candidate position from the plurality of possible positions.
A first leaf provider edge device may determine that a customer edge device is multihomed behind the first leaf provider edge device and a second leaf provider edge device. The first leaf provider edge device may create, based on determining that the customer edge device is multihomed, a protection path for a network address of the customer edge device and via the second leaf provider edge device. The first leaf provider edge device may prevent traffic not received from a core network from being provided to the customer edge device via the protection path.
An example method comprises determining, by an edge services controller, based on a respective predicted resource utilization value for each of a plurality of servers, a corresponding server weight for each of the plurality of servers; the plurality of servers comprising respective network interface cards (NICs), wherein each NIC of the plurality of NICs comprises an embedded switch and a processing unit coupled to the embedded switch; determining, by the edge services controller, based on a respective predicted resource utilization value for each of a plurality of services, a corresponding application weight for each of the plurality of services; and scheduling, by the edge services controller, based on the respective server weight for a server of the plurality of servers and the respective application weight for the service, a service of the plurality of services on the server.
H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
66.
DETERMINING LOCATION BASED ON DYNAMIC PATH LOSS EXPONENT (PLE) AND INTERCEPT (INT) ESTIMATION
Methods of deriving location information of a wireless device include deriving, in the continuous domain, a location of a wireless device and at least one time and location varying path loss function parameter. The coordinates and parameter are derived based on signal strength measurements made at the wireless device, with the measured signals originating from a plurality of wireless transmitters, such as access points. The derived path loss function parameter can include one or more of a path loss exponent parameter, an intercept parameter, a receiver antenna gain parameter, transmitter antenna gain parameter, or a transmit power parameter.
H04W 4/029 - Location-based management or tracking services
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
A network device may enable local breakout for a subscriber device, and may create, for the subscriber device, a primary path to a data network via a user plane function. The network device may create, for the subscriber device, a secondary path direct to the data network and based on the local breakout being enabled, and may determine whether a connection with the user plane function is available. The network device may selectively provide traffic between the subscriber device and the data network via the primary path based on determining that the connection with the user plane function is available, or may provide the traffic between the subscriber device and the data network via the secondary path based on determining that the connection with the user plane function is unavailable.
A network device may originate a route, and may designate the route as a first colored route having a first color. The network device may advertise the first colored route to a first intermediate network device to cause the first intermediate network device to propagate the first colored route to an ingress network device over a first colored border gateway protocol session. The network device may designate the route as a second colored route having a second color, and may advertise the second colored route to a second intermediate network device to cause the second intermediate network device to propagate the second colored route to the ingress network device over a second colored border gateway protocol session.
A disaggregated broadband network gateway (DBNG) control plane system may be configured to receive a first initialization packet associated with a user device via a first user plane and a second initialization packet associated with the user device via a second user plane. The DBNG control plane system may be configured to determine, based on at least one of the first initialization packet or the second initialization packet, one or more load balancing parameters. The DBNG control plane system may be configured to cause, based on at least one of the one or more load balancing parameters, a communication session for the user device to be established via the first user plane and not via the second user plane.
An example method includes receiving, from a network device, data indicating characterizations of network traffic on a plurality of ports of the network device; determining, by processing circuitry, for each port of the plurality of ports, an indicator of a port type for the port based on the data indicating the characterizations of network traffic on the plurality of ports, wherein the port type indicates a link type of network traffic exchanged by the port; and outputting, by the processing circuitry, the indicator of the port type to an output device.
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
H04L 41/12 - Discovery or management of network topologies
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
In some implementations, a non-ingress node of one or more label-switched paths (LSPs) may identify a resource issue event. The non-ingress node may identify, based on identifying the resource issue event, one or more notification-requester stacks included in a data structure. The non-ingress node may generate one or more resource notification messages that each include a respective notification-requester stack of the one or more notification-requester stacks. The non-ingress node may send the one or more resource notification messages based on the one or more notification-requester stacks.
An access point, which is a Power over Ethernet (PoE) Powered Device (PD) measures input voltage and input current. The access point determines a power requirement of the access point based on the measured current, measured voltage, and information about power requirements of access point components or devices coupled to the access point a power requirement of the access point. The access point communicates the determined power request to a power sourcing equipment (PSE), e.g., a network switch in some embodiments, the access point further communicates one of measured input current and measured input voltage to the PSE. The PSE uses the information received from the access point, e.g., power request and power measurements to determine an amount of power to be granted to the access point. If the access point does not receive the requested power level the access point selects internal components and/or external devices to de-power.
A device may receive a configuration of a network device, where the configuration includes configuration blocks with references to high level objects. The device may receive an out-of-band configuration change from the network device, and may compare the out-of-band configuration change and the configuration to identify an impacted high level object. The device may determine an impacted reference and an impacted configuration block associated with the impacted high level object, and may determine whether to reject the out-of-band configuration change, accept the out-of-band configuration change, or merge the out-of-band configuration change with the configuration based on the impacted high level object, the impacted reference, and the impacted configuration block. The device may perform one or more actions based on determining whether to reject the out-of-band configuration change, accept the out-of-band configuration change, or merge the out-of-band configuration change with the configuration.
An initiator network device may determine that a graceful shutdown is required for the initiator network device, and may generate a route refresh packet indicating that the graceful shutdown is enabled. The initiator network device may provide the route refresh packet to a receiver network device, and may disable the graceful shutdown after providing the route refresh packet to the receiver network device. The initiator network device may generate another route refresh packet indicating that the graceful shutdown is disabled, and may provide the other route refresh packet to the receiver network device.
Techniques are described by which a routing protocol, such as border gateway protocol (BGP), is extended to control propagation and importation of information using route targets (RTs) specified as bitmasks that encode link administrative group information. For example, a network control device (e.g., controller) is configured to allocate one or more subset of resources (e.g., nodes or links) of an underlay network to each of one or more virtual networks established over the underlay network. The controller generates a bitmask encoded with link administrative group information of the one or more links. The controller then outputs, to a plurality of provider edge (PE) routers that are participating in a respective virtual network, a routing protocol message to advertise the one or more subset of resources, wherein the routing protocol message includes a route target specified as the bitmask.
A system may identify a security intent policy model associated with an initial time. The system may generate one or more delta snapshots that respectively indicate one or more incremental changes to the security intent policy model at times subsequent to the initial time. The system may determine that the system is to deploy an updated version of the security intent policy model to a device and may thereby determine a previous deployment time at which the system deployed a previous version of the security intent policy model to the device. The system may generate, based on the one or more delta snapshots and the previous deployment time, a cumulative delta snapshot, and may thereby update a low-level security intent policy model associated with the device. The system may generate, based on the low-level security intent policy model, device-level security configuration information for the device.
A network device may assign subscriber groups to logical ports of the network device, and may generate a load balanced group that includes the logical ports assigned to the subscriber groups. The network device may provide a backup logical port for the load balanced group, and may maintain the backup logical port in an oversubscribed state or a full state. The network device may identify a subscriber group failure for one of the subscriber groups, and may switch the one of the subscriber groups to the backup logical port based on the subscriber group failure.
Techniques are described for creating isolated pools of external, failover, and/or floating IP addresses. In one example, this disclosure describes a method including creating a plurality of virtual networks, creating a plurality of pools of external IP addresses, detecting a request to instantiate an object that identifies a specific pool from the plurality of pools of external IP addresses; and instantiating the object and configuring the object with an external IP address drawn from the specific pool. The pools of external IP addresses may be created and isolated on a per-namespace, per-service, or per-ingress basis.
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
A resource controller module of a network management system receives a request for an allocation of threads to perform a job associated with a job category for a tenant associated with the network management system. The resource controller module determines, based on the request, a number of available threads associated with the job category of the system at a particular time and causes, based on the request and the number of available threads associated with the job category at the particular time, a group of threads associated with the job category to be allocated to perform the job to be allocated to perform the job.
A method for use in a system including an Ethernet Virtual Private Network (EVPN) core network and a VXLAN data plane, a first gateway device GW1 and a second gateway device GW2 operating in an all-active multihoming mode to interconnect the EVPN core network and VXLAN data plane, is described. The method includes establishing, by the second gateway device GW2, a VXLAN tunnel to a remote VTEP X before traffic is sent by the remote VTEP X and received by the second gateway device GW2, but after traffic is sent by the remote VTEP X and received by the first gateway device GW1. wherein the first and second gateway devices GW1 and GW2 use an anycast IP address as a source address for VTEP X.
A cloud-based architecture includes a cloud-based network management system (NMS) that provides the management plane and one or more cloud-based NAC systems that provide NAC services, including end-point device authentication. The cloud-based NAC system may have multiple groups of authentication server instances. Each group may have multiple authentication server instances to allow the authentication service provided by the group to serve more client devices than a single authentication server instance alone. Different Groups can be configured differently to serve different tenant sets.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Techniques are disclosed for the detection of different states of a session comprising a bidirectional flow of network traffic between client devices so as to enable a network device to apply different network policies to different states of the session. In one example, a computing device identifies multiple states of a session and defines a plurality of network policies. Each network policy defines performance requirements for network traffic during each state of the session. A network device receives the plurality of network policies and determines a state of the session. The network device selects a path based on the performance requirements of the network policy associated with the determined state of the session. The network device forwards traffic associated with the session along the selected path while the session is in the determined state.
An example network provisioning system includes a provisioning portal that is configured to: receive, from a client device, a selection of a service template specifying network service attributes for a communication service, receive a selection of one or more tracking areas, receive a selection of one or more subscribers, and generate a service order based on the network service attributes for the communication service, the one or more tracking areas, and the one or more subscriber. The network provisioning system is configured to provision the communication service in accordance with the service order.
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
H04W 4/029 - Location-based management or tracking services
84.
X-OVER-Y TUNNEL SIGNALING AND CONFIGURATION, AND USE OF CONFIGURED X-OVER-Y TUNNEL(S)
Network operators can define port mappings for UDP destination ports and the encapsulated protocol/traffic type (X) in UDP. BGP may be used to notify the UDP destination port-to-traffic type mapping to an encapsulator. A generic UDP encapsulation mechanism (X-in-UDP), where UDP can be used to encapsulate packets of any user configured protocol/traffic type X (e.g., IPv4, IPv6, MPLS, etc.), is described. Primary benefits of using UDP for encapsulation are to leverage UDP port numbers for load-balancing. Generic UDP encapsulation of any protocol/traffic type using user defined port-maps provides flexibility to network operators in constructing different overlay networks. UDP encapsulation helps leverage fine-grade load balancing over Equal-Cost Multipath (ECMP).
A network management system (NMS) configured to attribute a health issue of an access point (AP) to a classifier or sub-classifier and remedy the health affecting a user's experience. The NMS obtains network data associated with an AP device of a site. The NMS also determines whether the network data satisfies one or more criteria corresponding to a classifier of a service level expectation (SLE) metric for determining a health issue of the AP device. In response to determining the network data does not satisfy the criteria associated with the classifier, NMS attributes the health issue of the AP device to the classifier. In response to attributing the health issue of the AP device to the classifier, NMS performs a remedy action based on the classifier.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
A method is described for measuring a communication latency between a first device with a first local clock and a second device with a second local clock, the devices interconnected for digital communication to a network, comprising sending an upstream communication and a downstream communication between the devices, and measuring using said local clocks an upstream send time (τ1), an upstream receive time (τ2), a downstream send time (τ3) and a downstream receive time (τ4); calculating a first measured delay (y1) as τ2−τ1 and calculating a second measured delay (y2) as τ4−τ3; providing said measured delays (y1, y2) to a recursive filter function arranged to estimate a first latency (d1) and a second latency (d2) based on said measured delays (y1, y2) and on values for the first and second latencies (d1, d2) previously estimated by said recursive filter function, and iterating. A system and a computer software product are also described.
A first network device may receive an advertisement that includes a prefix for a second network device, wherein the advertisement is destined for a third network device. The first network device may determine, based on a network topology, whether a next hop is one hop away or multiple hops away. The first network device may selectively modify the advertisement to include a first segment identifier, based on the next hop being one hop away and to generate a first modified advertisement, or may modify the advertisement to include a second segment identifier, based on the next hop being multiple hops away and to generate a second modified advertisement. The first network device may forward the first modified advertisement or the second modified advertisement toward the third network device.
Techniques are described that detect areas with insufficient radio frequency (RF) coverage in a wireless network. A network management system (NMS) determines one or more service level expectation (SLE) metrics for each client device in a wireless network. The SLE metrics are aggregated to each access point (AP) in the wireless network, and each AP is assigned an AP score based on the aggregated SLE metrics. To identify potential coverage holes, the NMS groups APs having poor AP scores. If a root cause of the poor AP scores cannot be automatically resolved and if the poor AP scores persist for a predetermined period of time, the group of APs is determined to represent a true coverage hole. The NMS may generate a notification regarding recommended corrective actions to the customer and/or IT personnel.
Techniques are described by which a network management system (NMS) receives, from a plurality of access points (APs) configured to provide a wireless network, received signal strength indicator (RSSI) values. The NMS generates, based on the RSSI values, a graph of the plurality of APs, wherein the graph of the plurality of APs includes a plurality of clusters, wherein each cluster comprises a subset of the plurality of APs that are grouped based on strength of connectivity between the subset of the plurality of APs. The NMS generates, based on the graph, an upgrade plan to upgrade the plurality of APs, wherein the upgrade plan comprises a plurality of batches, wherein each batch includes a selection of at least one AP from each of one or more of the plurality of clusters. The NMS sends the upgrade plan to an orchestrator to execute the upgrade plan.
This disclosure describes techniques for providing application assurance by validating expected packet flows for an application against a model of a network that is to transport the expected packet flows. For example, a method includes obtaining, by an application assurance system, a flow definition that describes a packet flow for an application; determining, by the application assurance system by querying a network model of a network system that transports packet flows for applications, using the flow definition, a set of network nodes and links of the network system that are expected to transport or process the packet flow for the application; obtaining, by the application assurance system, an indication that a network node or link, from the set of network nodes and links, is in an operational state that could affect performance of the application; and in response to obtaining the indication, by the application assurance system, outputting an alert.
In some implementations, an authenticator device may receive, from a browser, a request to connect to a secure service, wherein the request includes login credentials associated with a user of the browser. The authenticator device may determine that the user is an authorized user to access the secure service based on the login credentials. The authenticator device may generate an authentication cookie for the browser, wherein the authentication cookie encodes metadata information associated with the user, and wherein the metadata information includes at least an indication of user attributes of the user. The authenticator device may transmit, to the browser device, the authentication cookie.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A system includes computer-readable media configured to store an event store associated with a network. Processing circuitry, in response to a determination that an event associated with the network device has occurred stores, at a time series store, configuration information for a network device in the network and stores, at the event store, event information comprising a pointer to the configuration information and an indication of a time that the event occurred. In response to receiving a request for data corresponding to the event, the processing circuitry determines, using the event information in the event store, the pointer to the network information for the event, obtains, from the time series store, the configuration information for the event using the pointer, generates a response to the request based on the configuration information obtained from the time series store, and outputs the response to the request.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
Job management solutions often involve a controller distributing tasks to worker nodes or worker nodes in an efficient manner. In one example, this disclosure describes a method that includes receiving, by a controller, a first set of tasks; assigning, by the controller, each of the tasks in the first set of tasks to worker nodes for processing by the worker nodes; receiving, by the controller and for at least some of the tasks in the first set of tasks, feedback information; determining, by the controller and based on the feedback information, an expected amount of processing associated with each task type in the plurality of task types; receiving, by the controller, a second set of tasks; and assigning, by the controller and based on the expected amount of processing associated with each task type, each of the tasks in the second set of tasks to the worker nodes for processing.
A network management system includes a memory and processing circuitry in communication with the memory. The processing circuitry is configured to obtain connection event data. The connection event data indicates a plurality of disconnection events. The processing circuitry is also configured to generate, from the connection event data, aggregate data according to a plurality of network scope levels and detect, based on the aggregate data, one or more network anomalies. Additionally, the processing circuit is configured to determine, based on the aggregate data, whether a root cause of the one or more network anomalies is associated with each network scope level of the plurality of network scope levels and output an indication of the determined network scope level associated with the root cause or performing a remedial action to address the root cause at the determined network scope level.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
95.
GROUP BASED POLICY FOR NON-VIRTUAL EXTENSIBLE LOCAL AREA NETWORK DEPLOYMENTS
A network device may receive, from a server device, a first tag assigned to a first host device, and may generate a first filter based on the first tag. The network device may receive a second filter generated based on a second tag assigned to a second host device, and may generate a policy based on the first filter and the second filter. The network device may propagate the first filter and the second filter to one or more other network devices, and may receive a packet. The network device may derive a source tag and a destination tag associated with the packet, and may determine an action for the packet based on the policy, the source tag, and the destination tag. The network device may perform the action.
The problem of bandwidth insufficiency within an Intermediate System-to-Intermediate System (IS-IS) flood reflection (FR) cluster, and its associated problem(s) of increased signaling failures (and increased crank-bank signaling attempts, also referred to as “signaling churn”) when traffic engineered (TE) paths are computed, is avoided by signaling a more realistic “available bandwidth” advertisement on the FR TE links.
A first network device of a first data center may encode a source tenant system interface (TSI) group identifier into a tag protocol identifier and a group-based policy identifier, and may encode the tag protocol identifier and the group-based policy identifier into a virtual extensible local area network (VXLAN) packet with the source TSI group identifier, where the source TSI group identifier is not included in a header of the VXLAN packet. The first network device may provide the VXLAN packet, with the source TSI group identifier, to a second network device of a second data center, via an Ethernet virtual private network (EVPN) multiprotocol label switching (MPLS) network.
A controller device receives, from a plurality of assisted replication network devices, respective utilization information associated with the plurality of assisted replication network devices. The controller device generates, based on the respective utilization information associated with the plurality of assisted replication network devices, load balancing information for a network device associated with two or more assisted replication network devices of the plurality of assisted replication network devices, and sends, to the network device, the load balancing information. The network selects, based on the load balancing information, a particular assisted replication network device of the two or more assisted replication network devices. The network device receives a traffic flow that is to be multicast and sends the traffic flow to the particular assisted replication network device, wherein sending the traffic flow to the particular assisted replication network device permits the particular assisted replication network device to multicast the traffic flow.
This disclosure describes a network management system configured to determine, for each AP of the plurality of APs and based on received signal strength indicators (RSSIs) of each AP of the plurality of APs, one or more strong neighbors of each AP. compute an AP redundancy score for each AP of the plurality of APs indicative of a redundancy of each AP; compute, based on the AP redundancy scores, at least one of: a switch redundancy score for each network switch associated with one or more of the plurality of APs, wherein the switch redundancy score is indicative of a redundancy of each network switch, or a site redundancy score, wherein the site redundancy score is indicative of an overall redundancy of the network site; and invoke, based on the AP redundancy scores, the switch redundancy score, or the site redundancy score, one or more actions.
A machine learning system is trained to predict resource usage by cells or network slices of a mobile network. For example, a computing system obtains respective datasets for the cells or network slices. Each dataset comprises time steps and respective values for a performance metric of the corresponding one of the cells or network slices. The computing system groups, based on a clustering algorithm applied to (1) the datasets, or (2) the cells or network slices, the datasets into clusters of datasets. The computing system applies, to a subset of most-recent time steps and corresponding values of each dataset of a first cluster of the clusters, a transformation to obtain a set of time steps and corresponding standardized values with which a machine learning system is trained to generate predicted values at future time steps of the datasets of the first cluster.