6 research outputs found

    REMOTE AGENT-BASED OBSERVABILITY TECHNIQUE FOR IOT APPLICATION TELEMETRY DATA COLLECTION

    Get PDF
    Techniques are presented herein that support a remote observability capability (comprising remote visibility, monitoring, and troubleshooting) for Internet of things (IoT) devices that are connected behind an IoT gateway (by agnostic network connectivity) through a dynamically deployed Enterprise Agent that is able to monitor all of the underlying state changes (through a southbound interface in an operational technology (OT) protocol agnostic manner) in IoT devices and then relay the collected telemetry data to a cloud-based facility. Aspects of the presented techniques leverage an embedded Subscriber Identity Module (eSIM)-based Java Card facility to collect telemetry data through a metrics, events, logs, and traces (MELT) framework and an OpenTelemetry (OTel) application programming interface (API) along with a wireless modem. Further aspects of the presented techniques leverage an IoT SIM Applet For Secure End-2-End Communication (SAFE) agent

    PORTABLE NETWORK NAMESPACES: TRAFFIC COLORING FOR PORTABILITY

    Get PDF
    Techniques are described herein to add a “color” marker as a namespace to packets per service/microservice/container. This causes the namespace to be used within or between the cloud(s) for additional treatments

    EMBEDDED BACKUP PATH INFORMATION FOR STATELESS SRV6 MICRO SEGMENT IDENTIFIER NODE PROTECTION

    Get PDF
    Techniques presented herein provide for the ability to improve Topology Independent Loop-Free Alternate Fast Re-route (TI-LFA) with node protection by embedding backup path information (on a per segment basis) in a stack itself. In particular, techniques herein introduce a Node protected Prefix/Adjacency Segment Identifier (NP-SID) with a new (yet simple) forwarding semantic that can be used to embed backup path information directly in a segment stack. The NP-SID is always followed by the backup node information in the segment stack and the forwarding semantic to the NP-SID will involve a lookup on the backup information only if a protected node fails. The techniques may provide a benefit of being purely stateless by not involving context tables on nodes

    MULTICAST VIRTUAL PRIVATE NETWORK PER-FLOW MONITORING FOR AN AGGREGATED TUNNEL IN A MULTIPROTOCOL LABEL SWITCHING CORE

    Get PDF
    Typically, when a service provider carries customer multicast traffic over a core network, it is often carried over a tunnel, which are often aggregated. There are many reasons for aggregated tunnel use, such as issues of scale and/or hardware limitations. While aggregated tunnels can be useful for carrying multicast traffic, it can be difficult to monitor network health when tunnels are aggregated. Techniques of this proposal provide for the ability to monitor network health by supporting per-flow counters for aggregated tunnels for both Internet Protocol (IP) version 4 and version 6 (IPv4/IPv6) traffic in a manner that is scalable and can be provided on-demand

    DECENTRALIZED PLATFORM FOR AUTONOMOUS ENERGY TRANSACTIONS IN A CONSTRAINED ENVIRONMENT USING BLOCKCHAIN

    Get PDF
    Techniques are described herein to enable any electric vehicle (or other vehicles capable of transporting and dissipating energy) to broadcast the availability of excess energy using any Vehicle-to-Vehicle (V2V) mechanism. Electric/fuel availability and other information may be propagated by leveraging peer-to-peer decentralized blockchain smart contracts that can be used in a connected electric vehicle environment

    APPLICATION-AWARE DELIVERY OF MULTICAST TRAFFIC

    Get PDF
    Techniques are presented herein that support application layer replication to optimally deliver multicast traffic over either the public Internet or a service provider network. The presented techniques encompass extensions to Border Gateway Protocol (BGP)-based signaling mechanisms that may be employed to notify network devices (such as endpoints) of the presence of an application-aware multicast capability. The presented techniques further encompass a replicator component that a controller may dynamically launch and program. Multicast traffic, that would normally travel along a conventional delivery path, may then take a unicast path to such a replicator at which point replication may be performed more efficiently within the network
    corecore