Telecommunications Voip Integration Vendor Management System Deployment Cloud Computing Solution Architecture Enterprise Architecture Network Architecture Pre Sales Ip Wireless Program Management Leadership It Strategy Network Design Computer Network Operations Requirements Analysis Solutions Marketing System Architecture Unified Communications Enterprise Software Unix Open Source Software Bss Systems Engineering Network Engineering It Management Service Delivery Soa Mobile Technology Data Analysis Data Modeling Oss Technical Leadership Telephony Application Architecture Lte Internet Services Network Systems Systems Analysis A/V Systems A/V Installation It Solutions Software Solutions Telecommunications Management Vpn Master Data Management Architecture
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
Closed-Loop Deployment Of Virtual Functions And Cloud Infrastructure
- Atlanta GA, US Dean Bragg - Toms River NJ, US Chuxin Chen - San Francisco CA, US John Ng - Morganville NJ, US John Oetting - Zionsville PA, US
International Classification:
H04L 12/24 H04L 29/08
Abstract:
A method includes receiving, by a processor, metadata for deploying a virtual function on a cloud network. The method may include determining, by the processor, whether deployment of the virtual function is possible without conflicting with the metadata. The method may include based on the determination that the deployment of the virtual function is possible without conflicting with the metadata, designing, by the processor, a cloud plan, or a transport plan. The method may include determining, based on the metadata, a network configuration to implement the cloud plan or the transport plan. The method may include configuring, by the processor, the cloud network using the network configuration.
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
- Atlanta GA, US Reuben Klein - East Brunswick NJ, US Dean Bragg - Toms River NJ, US John Oetting - Zionsville PA, US Frank Cariello - Red Bank NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 12/24
Abstract:
Concepts and technologies are disclosed herein for creating and using service control functions. The service control functions can detect a message via an adapter function. The message can relate to a service controlled by the service control functions. Service policies can be accessed. The service policies can include message handling policies and can be accessed to determine if a policy relating to the message exists. If a determination is made that the policy exists, the message and the policy can be analyzed to determine an action to take with respect to the message, and the action can be initiated.
Intelligent Preventative Maintenance Of Critical Applications In Cloud Environments
An intelligent preventative maintenance architecture for maintaining a plurality of cloud components operating within a cloud computing environment is disclosed. The architecture can perform a predictive failure analysis that monitors health of at least a portion of the plurality of cloud components that hosts a mission critical application. The predictive failure analysis receives sensor data that includes environmental data associated with environmental characteristics of the cloud computing environment and cloud component data associated with operational characteristics of at least a portion of the plurality of cloud components operating within the cloud computing environment. The predictive failure analysis analyzes the sensor data to detect an abnormal pattern within the sensor data, determines a root cause of the abnormal pattern, and predicts a probability of a failure of at least one cloud component of the plurality of cloud components.
Closed-Loop Deployment Of Virtual Functions And Cloud Infrastructure
- Atlanta GA, US Dean Bragg - Toms River NJ, US Chuxin Chen - San Francisco CA, US John Ng - Morganville NJ, US John Oetting - Zionsville PA, US
International Classification:
H04L 12/24 H04L 29/08
Abstract:
A method includes receiving metadata for deploying a virtual function on a cloud network. The metadata includes a recipe, policy, and template. The method includes, based on the metadata, designing a cloud plan and a transport plan for deploying the virtual function on the cloud network to meet a forecasted demand. The method includes determining a network configuration to implement the cloud plan and the network plan based on the metadata and causing the cloud network to be configured using the network configuration. The method includes instantiating the virtual function on the configured cloud network.
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
- Atlanta GA, US Reuben Klein - East Brunswick NJ, US Dean Bragg - Toms River NJ, US John Oetting - Zionsville PA, US Frank Cariello - Middletown NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 12/24 H04L 12/717 G06F 9/455 H04L 12/725
Abstract:
Concepts and technologies are disclosed herein for creating and using service control functions. The service control functions can detect a message via an adapter function. The message can relate to a service controlled by the service control functions. Service policies can be accessed. The service policies can include message handling policies and can be accessed to determine if a policy relating to the message exists. If a determination is made that the policy exists, the message and the policy can be analyzed to determine an action to take with respect to the message, and the action can be initiated.
Carol Wendell, Morris Anderson, Ernest Smith, Delores Sjogren, Roger Fries, Delbert Anderson, Bobby Freeland, Mary Olson, Mildred Hadley, Jill Nyquist, Sharon Gellerman