Abstract: Examples described herein relate to apparatuses and methods for a Content Distribution Network (CDN) node of a CDN to facilitate communication among two or more clients, including but not limited to determining, by the CDN node, that the two or more clients are connected to the CDN node for accessing content data originating from an origin server, receiving, by the CDN node, a message from a first client of the two or more clients, the message is to be routed to at least one second client of the two or more clients, and sending, by the CDN node, the message to the at least one second client without routing the message to the origin server.
Abstract: Examples described herein relate to apparatuses and methods for managing caching for a content delivery system, which may include receiving a content request indicating that the caching agent is requesting content data for a client, filling the content data in a first cache storage of the business logic agent, providing the cached content data to the caching agent, and while a second cache storage of the caching agent is being filled with the content data, maintaining the cached content data in response to receiving additional content requests from the caching agent. The additional content requests may indicate that the caching agent is requesting the same content data for additional clients.
Abstract: A computer-implemented method in a content delivery network (CDN), wherein the CDN delivers content on behalf of at least one content provider. The CDN includes a rendezvous system that selects CDN servers for clients. In response to a request by a rendezvous mechanism in the rendezvous system, a first given function is evaluated. Based on the outcome of the evaluating, the rendezvous mechanism uses either a first table or a second table. The first table was generated by a first table generation mechanism for use by said rendezvous mechanism to select CDN servers for clients, and the second table was generated by a second table generation mechanism for use by the rendezvous mechanism to select CDN servers for clients.
Abstract: Aspects of the present disclosure involve systems and methods for a collaboration conferencing system to track a total number of concurrently utilized ports across any number of conferencing bridges of the network for a particular customer and one or more billing actions may occur based on this tracking. This may result in an alternate billing option for the customer's use of the system. Further, a telecommunications network administrator may provide access to the collaboration conferencing system based on a total number of concurrently utilized ports rather than on a per conference or per minute basis. With the information of the number of purchased ports by the customer, the administrator may more accurately predict an available capacity for the collaboration conferencing system needed to support all of the users of the system and the potential collaboration conferences.
May 19, 2020
Date of Patent:
October 5, 2021
Level 3 Communications, LLC
Andrew J. Broadworth, Robert F. Nance, Gregory T. Ellison
Abstract: An apparatus is provided for control of a plurality of forwarding switches using a network controller. The network controller executes a routing configuration application that analyzes interconnections between the forwarding switches to identify a topology of the network, determine label switched paths (LSPs) between the forwarding switches, and transmits the next hop routes to the forwarding switches. The forwarding switches use the next hop routes to route packets through the network according to a multiprotocol label switching (MPLS) protocol. Each LSP includes one or more next hop routes defining a forwarding address associated with one forwarding switch to an adjacent forwarding switch.
Abstract: Systems and methods for managing network devices include performing clustering operations for network devices based on attributes of the network devices. By comparing the results of subsequent clustering operations, changes in network device attributes can be readily identified and any network devices for which attributes have changed may be subject to further investigation or remedial action (e.g., blocking traffic to/from the network device). Clustering may also be used to conduct an inventory of network devices by identifying groups of network devices that have similar attributes.
Abstract: Novel tools and techniques are provided for implementing prevention of foreign initiated fraudulent or unauthorized use of calling service. In various embodiments, a computing system might receive, from a first user device associated with an originating party, a request to access a first account of a calling system and an access code. Based on a determination that the received access code is valid, the computing system might determine whether the first user device associated with the originating party is located in a foreign country. If so, the computing system might determine whether a database contains a configurable flag indicating that international access is not allowed for the first account. If so, the computing system might initiate one or more first actions. If not, the computing system might provide the first user device with access to the first account of the calling system.
Abstract: Aspects of the present disclosure involve systems and methods for a service activation system in a telecommunications network that utilizes one or more generic container files for building the configuration file to instantiate the service on the network. A request for service from a network may be received from an order entry system that includes specific information about the requested service. A collection of generic configuration files may be selected based on the information included in the service order and arranged to build a configuration file to be executed on the network. The service activation system may also include a component or group of components to verify a received service order and alter the service order with default information or data where applicable. The configuration file may also be executed on the network through one or more drivers communicating with the affected devices to configure the one or more network devices.
Abstract: Disclosed herein are system, method, and computer program product embodiments for providing an API description of an external network service and using the API to integrate the external service into a network. An embodiment operates by receiving, from a service provider, a description of an application programming interface (API), transmitting a call to the service provider using the API for creating a new instance of a service and transmitting to the service provider a traffic flow upon which the service will be applied.
Abstract: A computer-implemented method on a device in a content delivery (CD) network. The device has hardware including storage with at least one first class of storage and at least one second class of storage, the first class of storage being faster than the second class of storage. A first portion of the first class of storage is allocated for log data, and a second portion of the second class of storage is allocated for log data. The method includes obtaining log event data from at least one component or service on the device that is to be delivered to a component or service on a distinct device. Each log event data item has a priority. If a connection to an external location is lost, at least some of the log event data items are selectively stored in the storage, wherein the storing is based on priority of the log event data items. Otherwise, if the connection is not lost, at least some of the log event data items are sent to the at least one external location.
Abstract: This disclosure describes systems, methods, and devices related to the distribution of routes in a telecommunications network. A networking device may receive a plurality of routing information from the plurality of edge devices of a telecommunications network, each of the plurality of routing information comprising a local preferred route for a corresponding edge device. The networking device may generate a plurality of routing tables, each of the plurality of routing tables associated with a corresponding edge device of the plurality of edge devices and comprising the local preferred route for the corresponding edge device. The networking device may update the local preferred route of a first routing table of the plurality of routing tables with the local preferred route of a second routing table of the plurality of routing tables.
Abstract: A route viewing system includes a computing system that receives information associated with one or more routes through a network, and identifies the routes that are associated with at least one illicit user computer used by an illicit user. The computing system then obtains a source location of a source address of the routes and a destination location of a destination address of the routes, and displays the routes on a geographical display at the source location of the source address and the destination location of the destination address of each of the routes.
June 7, 2021
September 23, 2021
Level 3 Communications, LLC
Michael Benjamin, Skyler J. Bingham, John S. Reynolds
Abstract: Systems, methods, and non-transitory computer-readable storage media which have instructions stored for execution on a processor, for automating the commissioning of a transport network element within a network. A system configured according to this disclosure can be an Automated Commissioning Tool which can initiate communications with a network element on the network. The Automated Commissioning Tool can then retrieve updated firmware corresponding to the network element and configure the network element to have the updated firmware. Finally, the Automated Commissioning Tool can determine, from a network plan, a first port on the network element which is to be connected via a cross-connect to a second port on the network element and establish the cross-connect on the network element. At this point the network element may be commissioned to operate as a transport network element within the network.
Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for providing a failover system and method for one or more collaboration conference web adapters. In general, the system and method allow for the movement of traffic or other communication packets associated with a collaboration conference from one adapter located in a first data center to another adapter located in a second data center. In one embodiment, the failover may occur in response to the detection or determination of a failure or loss of an operational state at an adapter of the system. In another embodiment, the failover may occur in response to a selection from an operations center to move the traffic to the selected adapter or second data center.
Abstract: A computer-implemented method in a content delivery (CD) network includes determining at least one pseudo client IP address using first log information and second log information. The first log information being from a rendezvous service in the content delivery (CD) network, and includes at least one resolver IP address associated with at least one first request made at the rendezvous service. The second log information is from at least one probe service in the CD network, and includes at least one client IP address associated with at least one second request to the at least one probe service. The method also includes making an association between (i) the at least one pseudo client IP address and (ii) the at least one resolver IP address; and then, responsive to a name resolution request, the name resolution request including the at least one resolver IP address, the rendezvous service using the at least one pseudo client IP address instead of the resolver IP address to resolve the name.
November 28, 2018
Date of Patent:
September 14, 2021
Level 3 Communications, LLC
Laurence R. Lipstone, William Crowder, Andrew Swart, Christopher Newton, Lewis Robert Varney
Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for managing the distribution of content and/or communications from a telecommunications or computer network to an end user of the network. In general, the system receives a request for content from a user of the network and analyzes the request to determine an estimated geographic region and/or an access network associated with the requesting device. Based on the determined geographic region or access network, a networking device returns a specific anycast IP address from which the content may be received. In this manner, the content providing network may utilize multiple anycast IP addresses within the network to provide content to one or more end users of the network. The specific anycast IP address is provided to an end user device to obtain the requested content.
Abstract: Examples of the present disclosure relate to hostname pre-localization. In examples, a service uses a content distribution network (CDN) to provide at least a part of the computing functionality associated with the service. A pre-localized hostname may be used to direct the client computing device to a specific edge server of the CDN that is associated with the computing functionality. In examples, a service receives an initiation request from a client computing device for the computing functionality provided by the CDN. The service generates a pre-localization request comprising pre-localization information and provides the pre-localization request to the CDN. Accordingly, the CDN generates a pre-localized hostname associated with an edge server based on the pre-localization information. The pre-localized hostname is provided to the service, which is then provided to the client computing device, thereby directing the client computing device to the specific edge server of the CDN.
Abstract: Examples described herein relate to systems and methods for containing a faulty stimulus. A computer-implemented method may include listing in a suspect list every received stimulus including the faulty stimulus, and implicitly testing the stimuli by respectively acting upon those stimuli by a software application. Responsive to successfully acting upon each of the stimuli besides the faulty stimulus, each non-faulty stimulus is deleted from the suspect list and, responsive to such deletion, made available to a downstream node. Responsive to acting upon the faulty stimulus, the software application crashes which leaves the faulty stimulus listed in the suspect list. The software application then restarts and deems the faulty stimulus as being faulty based upon the faulty stimulus still being listed in the suspect list after the restart.
Abstract: Implementations described and claimed herein provide systems and methods for mitigating network threats. In one implementation, a provider edge device of a telecommunications network is configured to accept distributed denial of service mitigation rule propagation from a customer edge device of a customer network in communication with the provider edge device. A distributed denial of service mitigation rule for the customer network is received at the provider edge device from the customer edge device. The distributed denial of service mitigation rule includes one or more routing parameters and a mitigation action. The distributed denial of service mitigation rule is implemented locally on the provider edge device of the telecommunications network. A broadcasting of the distributed denial of service mitigation rule in the telecommunications network is prevented beyond the provider edge device.
Abstract: In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term and short-term trends based at least in part on the tuple. The long-term and short-term trends are compared to determine whether a potential network anomaly exists. If a potential network anomaly does exist, the method initiates a heavy hitter detection algorithm. The method forms a low-complexity intermediate stage of processing that enables a high-complexity heavy hitter detection algorithm to execute when heavy hitters are likely to be detected.