Patent application number | Description | Published |
20100203890 | METHOD AND APPARATUS FOR FACILITATING A BEACON-ASSISTED HANDOVER TO A HOME NODE-B FOR USERS ON AN ACTIVE CALL - Methods, apparatuses, and computer program products are disclosed for facilitating a beacon-assisted handover from a macro network to a femto cell during an active call. A femto cell management system assigns a unique identifier to a femto cell, which the femto cell utilizes to broadcast a beacon at a frequency different than the operating frequency of the femto cell. A wireless terminal receives a control message from the macro network directing the wireless terminal to scan particular frequencies. The wireless terminal subsequently provides a report to the macro network identifying attributes ascertained from the scan, which includes attributes associated with the beacon. The macro network then performs a handover from the macro network to the femto cell as a function of the attributes. | 08-12-2010 |
20100203891 | METHOD AND APPARATUS FOR FACILITATING A HAND-IN OF USER EQUIPMENT TO FEMTO CELLS - Aspects are disclosed for facilitating a hand-in to a femto cell. An identifier is assigned to a femto cell in which the identifier is based on a scrambling parameter and a timing parameter. A relationship between the identifier and the femto cell is then communicated. In another embodiment, a user equipment report is received, which includes attributes related to a signal broadcast by a femto cell. An identifier associated with the femto cell is ascertained from an attribute included in the report. The femto cell is then identified based on the identifier. In a further embodiment, a timing parameter is received, and a scrambling parameter is set. A signal including the scrambling parameter is then broadcast according to an offset related to the timing parameter. In yet another embodiment, a femto cell is detected during an active call. An identifier associated with the femto cell is then ascertained and reported. | 08-12-2010 |
20100203892 | SYSTEM AND METHOD FOR INTERFERENCE BEACON TRANSMISSION - Various systems and methods for interference beacon transmission are disclosed. In one embodiment, an apparatus for initiating cell reselection in a wireless communication device, such as a HNB, comprises a processor configured to determine a first frequency at which one or more wireless communication devices communicate with a first cell and a transceiver configured to transmit an interference beacon at the first frequency configured to at least partially interfere with communications at the first frequency and initiate a cell reselection process by at least one of the wireless communication devices. | 08-12-2010 |
20110287787 | LOCATION-BASED SERVICE BASED ON ACCESS POINT IDENTIFIERS - An access point transmits cell information via a physical layer channel. In some cases, the cell information sent on the physical layer channel comprises a physical layer identifier. For example, a physical layer channel may be modulated based on a cell identifier and/or a closed subscriber group identifier associated with the access point. Through the use of this cell information, an access point may be quickly identified for mobility and/or interference management operations. In addition, this cell information may be used for finger-printing operations. | 11-24-2011 |
20110294493 | MODULATING CELL INFORMATION ON A PHYSICAL CHANNEL - An access point transmits cell information via a physical layer channel. In some cases, the cell information sent on the physical layer channel comprises a physical layer identifier. For example, a physical layer channel may be modulated based on a cell identifier and/or a closed subscriber group identifier associated with the access point. Through the use of this cell information, an access point may be quickly identified for mobility and/or interference management operations. In addition, this cell information may be used for finger-printing operations. | 12-01-2011 |
20120021788 | METHOD AND APPARATUS FOR HANDOVER OF DEVICE TO MITIGATE UPLINK INTERFERENCE IN FEMTOCELL DEPLOYMENTS - Methods and apparatuses are provided for determining whether to handover a device to mitigate uplink interference while achieving acceptable uplink service quality in a wireless network. One or more parameters related to a device can be evaluated to determine whether to handover the device, such as a number of transmission power reports received from the device over a period of time, a frame error rate, setpoint, or power control commands related to the uplink of the device, a received pilot signal strength at the device, an uplink throughput or buffer size at the device, etc., from which transmit power information of the device can be inferred for determining whether the device potentially interferes with access points or devices. Based on the one or more parameters, an access point can determine whether handing over the device may mitigate such uplink interference while ensuring uplink service quality, and accordingly handover the device. | 01-26-2012 |
20120039265 | CONTROLLING ACCESS POINT TRANSMIT POWER BASED ON RECEIVED ACCESS TERMINAL MESSAGES - Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point. | 02-16-2012 |
20120046026 | CONTROLLING ACCESS POINT TRANSMIT POWER BASED ON EVENT-TRIGGERED ACCESS TERMINAL MESSAGING - Transmit power for an access point is controlled based on measurement reports received by the access point from one or more access terminals that are not currently being served by the access point. In some aspects, transmit power is controlled based on the number of received messages that correspond to a particular event. In some aspects, transmit power is controlled based on the contents of the received messages. For example, the access point may use signal strength information included in the messages to determine a level of transmit power that mitigates interference at a defined subset of reporting access terminals. | 02-23-2012 |
20120046063 | CONTROLLING ACCESS POINT TRANSMIT POWER BASED ON ACCESS TERMINAL RANKING - Transmit power for an access point is controlled based on measurement reports received by the access point from one or more access terminals that are not currently being served by the access point. In some aspects, transmit power is controlled based on the number of received messages that correspond to a particular event. In some aspects, transmit power is controlled based on the contents of the received messages. For example, the access point may use signal strength information included in the messages to determine a level of transmit power that mitigates interference at a defined subset of reporting access terminals. | 02-23-2012 |
20120142392 | MULTI-STAGE TRANSMIT POWER CONTROL SCHEME FOR ACCESS POINT - Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point. | 06-07-2012 |
20120238279 | TRANSMISSION POWER COORDINATION FOR SMALL-COVERAGE BASE STATIONS - Coordinating transmission power for small-coverage base stations deployed in a wireless communication network may comprise, for example, receiving a plurality of measurement reports corresponding to two or more base stations, determining a coordinated coverage condition for the base stations, and setting a transmission power for at least one of the base stations based on the measurement reports and the coverage condition. | 09-20-2012 |
20120252453 | POWER CONTROL FOR A NETWORK OF ACCESS POINTS - A power calibration scheme adjusts power levels of network of femtocells based on macro signals seen at different points in and around a coverage area and based on the mutual positions of the femtocells (e.g., based on femtocell signals seen at these points). The power calibration scheme thus facilitates a good balance between providing a desired level of coverage and mitigation of interference to nearby macrocells and femtocells. | 10-04-2012 |
20120252521 | ACCESS POINT TRANSMIT POWER CONTROL - A power calibration scheme adjusts power levels of network of femtocells based on macro signals seen at different points in and around a coverage area and based on the mutual positions of the femtocells (e.g., based on femtocell signals seen at these points). The power calibration scheme thus facilitates a good balance between providing a desired level of coverage and mitigation of interference to nearby macrocells and femtocells. | 10-04-2012 |
20120309394 | APPARATUS AND METHODS FOR HAND-IN TO A FEMTO NODE - Methods and apparatuses are provided for causing active hand-in of a device from a macrocell base station to a femto node, which can be an inter-frequency hand-in. The femto node can broadcast a beacon, which can be received and reported by a device to a source base station along with one or more parameters for disambiguating a target femto node. The source base station can communicate a handover message to the femto node or a related femto gateway along with the one or more parameters. The femto node or femto gateway can disambiguate the intended target femto node based in part on the one or more parameters, which can include applying one or more filters. Additionally, the femto node can broadcast multiple beacons to assist in disambiguation of the target femto node. Also, where complete disambiguation is not possible, the femto gateway can prepare multiple femto nodes for hand-in. | 12-06-2012 |
20130079003 | MAINTAINING NEIGHBOR CELL LIST - Access terminals are provisioned to conduct intra-frequency, inter-frequency, and inter-RAT measurements and report physical layer identifiers of detected cells. The provisioning may involve cycling through all or a portion of a defined superset of physical layer identifier one subset at a time. In addition, the physical layer identifiers may be prioritized to improve the search procedure. Measurement report messages (including physical layer identifiers of the detected cells) are received at an access point as a result of the provisioning. A neighbor cell list for the femtocell is maintained based on the received measurement report messages and, optionally, other information. This other information may related to, for example, one or more of: physical layer identifier information received from access terminals that register with the access point, physical layer identifier information received via network listen operations, information regarding co-located cells, or physical layer identifier information received from a network entity. | 03-28-2013 |
20130079007 | NEIGHBOR CELL LIST BASED ON HANDOVER MESSAGE - A neighbor cell list for a cell is maintained based on a received handover message that identifies at least one physical layer identifier. For example, the handover message may include measurement report messages (MRMs) generated by the access terminal being handed over. As another example, the handover message may include a neighbor cell list that is associated with the access terminal. The measurement report messages and the neighbor cell list associated with the access terminal will identify physical layer identifiers of cells in the vicinity of the source cell and, in some cases, in the vicinity of the access terminal being handed over. Upon receipt of the handover message, the neighbor cell list for the target cell is updated based on the physical layer identifiers identified by the handover message. | 03-28-2013 |
20130150035 | METHOD AND APPARATUS FOR CLASSIFYING NEIGHBORING DEVICES - Methods and apparatuses are provided that include classifying nearby devices as neighboring or non-neighboring devices. Devices can be classified based on detected registration attempts to a femto node, where the femto node can switch paging area identifiers to cause the registration attempts or otherwise, analyzing measurement reports received from the devices in a registration request, and/or the like. The femto node can mitigate interference to the devices based on the classification. | 06-13-2013 |
20130225167 | METHOD AND APPARATUS FOR EXPANDING FEMTOCELL COVERAGE FOR HIGH CAPACITY OFFLOAD - Systems and methods are provided for deploying a femto node with expanded coverage. This may be achieved, for example, by operating a femto node in an open or hybrid access mode to allow registration from both member and non-member devices, monitoring conditions on a backhaul link maintained with a wireless network over a broadband connection configured to provide internet access to the devices and to other devices operating independent of the femto node, and managing resources or mobility for each device based on whether the device is a member device or a non-member device and based on the conditions over on the backhaul link. | 08-29-2013 |
20130237227 | METHOD AND SYSTEM FOR RESOURCE ALLOCATION BASED ON FEMTOCELL LOCATION CLASSIFICATION - Disclosed are system and method for classifying an indoors location of a femtocell or femto node. In an aspect, the system and method are configured to perform, by a femto node, radio frequency (RF) measurements of one or more neighboring femtocells and macrocells; collect performance measurement reports from one or more mobile devices; classify the indoors location of the femto node based on the performed RF measurements and the collected performance measurement reports; and adjust one or more RF resources and parameters of the femto node based on the indoors location classification of the femto node. | 09-12-2013 |
20130237231 | USING ACCESS POINTS TO IDENTIFY COVERAGE HOLES - Coverage holes are identified and appropriate action taken in response thereto. The identification of a coverage hole may be based on, for example, measurements taken at an access point, measurement report messages from an access terminal, idle user registrations, active user handovers, or handover history. Upon identification of a coverage hole, action may be taken to mitigate (e.g., reduce or eliminate) the coverage hole and/or avoid the coverage hole. For example, in some embodiments, access point resources such as power, frequency and time are allocated accordingly. The action to be taken may depend on whether a coverage hole is noise-limited or interference-limited. In some embodiments, the manner in which handovers are conducted is modified upon identification of a coverage hole. The above actions may be performed entirely at an access point. | 09-12-2013 |
20130252602 | METHOD AND APPARATUS FOR DETERMINING RF PARAMETERS BASED ON NEIGHBORING ACCESS POINTS - Systems and methods are provided for a femto node to configure one or more of its RF parameters. This may be achieved, for example, by determining capabilities of one or more neighboring femto or pico nodes based in part on signals received from the one or more neighboring femto or pico nodes, comparing the determined capabilities of the one or more neighboring femto or pico nodes to one or more capabilities of the femto node, and adjusting one or more RF parameters of the femto node based on the comparison. | 09-26-2013 |
20130294264 | METHOD AND APPARATUS FOR CLASSIFYING FEMTO NODE USERS - A method, an apparatus, and a computer program product for wireless communication are provided in connection with classifying devices that communicate with a femto node for providing services thereto. In one example, a node is equipped to monitor and/or receive one or more parameters communicated by a device, assign a classification to the device related to a frequency of using the femto node based in part on the one or more parameters. In an aspect, the node is equipped to provide services to the device based on the classification. In another aspect, the node is equipped to provide the classification to one or more femto nodes, including the femto node, for providing services to the device. | 11-07-2013 |
20140073343 | CENTRALIZED MANAGEMENT FOR PILOT POLLUTION MITIGATION IN SMALL CELL NETWORKS - A small cell (e.g., femtocell) in a wireless communication may determine a set of wireless signal measurements for a plurality of small cells causing pilot cell pollution within a coverage area. The small cell may determine an adjustment of a transmission parameter of the small cells for reducing the pilot cell pollution, and transmit the adjustment to the small cells. The adjustment may include, for example, minimizing an area of overlap between at least two small cells having signal power difference below a threshold, maximizing a signal to interference and noise ratio at a location associated with at least two small cells, minimizing an area associated with at least two pilot signals within a threshold signal level, distributing traffic load to at least two of the small cells based on the set of measurements, or by minimizing the number of small cells covering a path. | 03-13-2014 |
20140106758 | METHOD AND APPARATUS FOR FACILITATING A BEACON-ASSISTED HANDOVER TO A HOME NODE-B FOR USERS ON AN ACTIVE CALL - Methods, apparatuses, and computer program products are disclosed for facilitating a beacon-assisted handover from a macro network to a femto cell during an active call. A femto cell management system assigns a unique identifier to a femto cell, which the femto cell utilizes to broadcast a beacon at a frequency different than the operating frequency of the femto cell. A wireless terminal receives a control message from the macro network directing the wireless terminal to scan particular frequencies. The wireless terminal subsequently provides a report to the macro network identifying attributes ascertained from the scan, which includes attributes associated with the beacon. The macro network then performs a handover from the macro network to the femto cell as a function of the attributes. | 04-17-2014 |
20140135004 | MULTI-STAGE TRANSMIT POWER CONTROL SCHEME FOR ACCESS POINT - Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point. | 05-15-2014 |
20140219243 | APPARATUS AND METHODS OF JOINT TRANSMIT POWER AND RESOURCE MANAGEMENT - The present disclosure presents a method and apparatus for joint power and resource management in a wireless network. For example, the disclosure presents a method for receiving reference signal received power (RSRP) measurements of one or more neighboring base stations of a base station. In addition, such an example method, may include calibrating a transmit power of the base station based at least on the received measurements, and adjusting transmit resources of the base station in response to the calibration. As such, joint power and resource management in a wireless network may be achieved. | 08-07-2014 |
20140334424 | METHODS AND APPARATUS FOR POWER MANAGEMENT IN A WIRELESS COMMUNICATION SYSTEM - Methods and apparatus for communication comprise aspects that include performing a power management procedure for configuring a subset of network entities to receive one or more of downlink signal measurements and/or one or more uplink signal measurements. The methods and apparatus further comprise aspects that include storing the one or more one or more of downlink signal measurements and/or one or more uplink signal measurements associated with the subset of network entities at a database for managing transmit power at the subset of network entities. Moreover, the methods and apparatus comprise aspects that include adjusting a transmit power value of at least one of the subset of network entities from a first transmit power value to a second transmit power value based at least in part on the one or more of downlink signal measurements and/or one or more uplink signal measurements. | 11-13-2014 |
20150117197 | METHOD AND APPARATUS FOR CALIBRATING A SMALL CELL FOR BACKHAUL MANAGEMENT - The present disclosure presents a method and an apparatus for calibrating a small cell base station for backhaul management. For example, the method may include exchanging backhaul probing messages with a probing server by initiating a plurality of probing packets at the small cell base station, wherein the exchanging is performed over a backhaul after determining that a full queue condition associated with the backhaul is satisfied, computing calibration statistics for the backhaul based on characteristics associated with the backhaul probing messages, and adjusting one or more backhaul parameters of the small cell based on the calibration statistics. As such, calibration of a small cell base station for backhaul management may be achieved. | 04-30-2015 |
20150117206 | BACKHAUL MANAGEMENT OF A SMALL CELL USING PASSIVE ESTIMATION MECHANISM - The present disclosure presents a method and an apparatus for passive estimation mechanism for backhaul management at a small cell base station. For example, the method may include determining, at the small cell base station, whether a time slot utilization of a flow at a user equipment (UE) in communication with the small cell base station is above a first threshold, wherein a plurality of time slots are associated with the flow, determining whether an average throughput of the flow is below a second threshold in response to determining that the time slot utilization is above the first threshold, and identifying that the flow is not satisfied in response to determining that the average throughput of the flow is below the second threshold. As such, passive estimation mechanism for backhaul management at a small cell base station may be achieved. | 04-30-2015 |
20150117207 | BACKHAUL MANAGEMENT OF A SMALL CELL USING A LIGHT ACTIVE ESTIMATION MECHANISM - The present disclosure presents a method and an apparatus for a light active estimation mechanism for backhaul management at a small cell base station. For example, the method may include transmitting a first data packet from the small cell base station to a network entity, receiving a second data packet from the network entity in response to the transmission, calculating a time delay between the transmitting of the first data packet and the receiving of the second data packet, and determining whether or not a backhaul of the small cell base station is congested based on the calculated time delay. As such, light active estimation mechanism for backhaul management at a small cell base station may be achieved. | 04-30-2015 |
20150119042 | OFF-LOADING USER EQUIPMENT FROM A SMALL CELL BASE STATION FOR BACKHAUL MANAGEMENT - The present disclosure presents a method and an apparatus for off-loading user equipment (UE) from a small cell base station. For example, the method may include identifying a first and a second set of UEs from a plurality of UEs at a small cell base station, prioritizing the first and the second set of UEs, and off-loading one or more UEs from the first or the second set of UEs based at least on the prioritization. As such, off-loading of UEs from a small cell base station may be achieved. | 04-30-2015 |
20150119046 | BACKHAUL MANAGEMENT OF A SMALL CELL - The present disclosure presents a method and an apparatus for backhaul management at a small cell base station. For example, the method may include receiving an indication from a radio resource management (RRM) framework of a small cell base station, wherein the indication received from the RRM framework is related to a coverage problem at a user equipment (UE), and wherein the UE is in communication with the small cell, and modifying a backhaul estimation mechanism at the small cell base station for the UE based on the indication received from the RRM framework of the small cell base station. As such, backhaul management at a small cell base station may be achieved. | 04-30-2015 |
20150119063 | MODE SELECTION AND TRANSMIT POWER MANAGEMENT FOR MULTIMODE SMALL CELLS - Described herein are techniques for mode selection and power management for multimode small cells. For example, the technique may involve taking measurements, at the access point, of a macro cell in a vicinity of the access point. The technique may involve managing power or resources of a first RAT and a second RAT based on the measurements, wherein the power of at least one of the first RAT or second RAT is associated with coverage area of the macro cell. | 04-30-2015 |
20150257061 | MAINTAINING NEIGHBOR CELL LIST - Access terminals are provisioned to conduct intra-frequency, inter-frequency, and inter-RAT measurements and report physical layer identifiers of detected cells. The provisioning may involve cycling through all or a portion of a defined superset of physical layer identifier one subset at a time. In addition, the physical layer identifiers may be prioritized to improve the search procedure. Measurement report messages (including physical layer identifiers of the detected cells) are received at an access point as a result of the provisioning. A neighbor cell list for the femtocell is maintained based on the received measurement report messages and, optionally, other information. This other information may related to, for example, one or more of: physical layer identifier information received from access terminals that register with the access point, physical layer identifier information received via network listen operations, information regarding co-located cells, or physical layer identifier information received from a network entity. | 09-10-2015 |
20150304862 | SELF-CONFIGURATION OF A PHYSICAL CELL IDENTITY (PCI) AT A CELL - The present disclosure presents a method and an apparatus for self-configuring a physical cell identify (PCI) at a cell upon detecting a PCI confusion at a neighbor cell. For example, the method may include detecting that a PCI confusion exists at a second cell based on a message (e.g., configuration update message or a X2 setup response message) received from the second cell. The first cell may initiate a timer that is selected from a first timer and a second timer, the first timer longer in duration than the second timer. The first cell then configures a new PCI for the first cell when the timer expires or maintains a current PCI for the first cell when the timer is reset prior to expiration. As such, self-configuration of PCI at a cell may be achieved. | 10-22-2015 |
20150358959 | MANAGING PERFOMANCE OF A WIRELESS NETWORK USING BACKHAUL METRICS - The present disclosure presents aspects for managing performance of a wireless network. For example, the aspects may include identifying a backhaul condition at a small cell in the wireless network wherein the backhaul condition is associated with one or more of a backhaul latency measurement, a backhaul error rate, or a backhaul jitter value at the small cell and triggering an action at the small cell in response to identifying the backhaul condition at the small cell, wherein triggering the action at the small cell includes modifying one or more resource management parameters at the small cell based on the backhaul condition. As such, performance of a wireless network may be managed. | 12-10-2015 |
20160057679 | CSON-AIDED SMALL CELL LOAD BALANCING BASED ON BACKHAUL INFORMATION - Methods and systems are disclosed for centralized self-organizing network (cSON)-aided small cell load balancing based on backhaul information. In an aspect, a cSON server receives periodic or event triggered backhaul capacity reports from each of the plurality of small cell base stations, a backhaul capacity report indicating an uplink and/or downlink capacity state of a backhaul connection over which a small cell base station of the plurality of small cell base stations is connected to a core network, determines load balancing assistance data for at least one of the plurality of small cell base stations based on the backhaul capacity reports received from each of the plurality of small cell base stations, and provides the load balancing assistance data to the at least one of the plurality of small cell base stations. | 02-25-2016 |
20160080988 | METHOD AND APPARATUS FOR FACILITATING A HAND-IN OF USER EQUIPMENT TO FEMTO CELLS - Aspects are disclosed for facilitating a hand-in to a femto cell. An identifier is assigned to a femto cell in which the identifier is based on a scrambling parameter and a timing parameter. A relationship between the identifier and the femto cell is then communicated. In another embodiment, a user equipment report is received, which includes attributes related to a signal broadcast by a femto cell. An identifier associated with the femto cell is ascertained from an attribute included in the report. The femto cell is then identified based on the identifier. In a further embodiment, a timing parameter is received, and a scrambling parameter is set. A signal including the scrambling parameter is then broadcast according to an offset related to the timing parameter. In yet another embodiment, a femto cell is detected during an active call. An identifier associated with the femto cell is then ascertained and reported. | 03-17-2016 |
Patent application number | Description | Published |
20130232463 | SYSTEM AND METHOD FOR CUSTOMIZING A DEPLOYMENT PLAN FOR A MULTI-TIER APPLICATION IN A CLOUD INFRASTRUCTURE - A deployment system enables a developer to customize a deployment plan generated according to a logical, multi-tier application blueprint for deploying multiple applications in a cloud infrastructure. Using the deployment system, the developer inserts a custom script or task in a sequence of tasks to be performed to deploy an application component in different phases (e.g., installation, configuration, start-up) on a virtual machine. The deployment system anchors the custom script to the different phases of the application component's deployment such that the customizations to the deployment plan are maintained through changes to the underlying application blueprint. | 09-05-2013 |
20130232480 | SINGLE, LOGICAL, MULTI-TIER APPLICATION BLUEPRINT USED FOR DEPLOYMENT AND MANAGEMENT OF MULTIPLE PHYSICAL APPLICATIONS IN A CLOUD ENVIRONMENT - A deployment system enables a developer to define a logical, multi-tier application blueprint that can be used to create and manage (e.g., redeploy, upgrade, backup, patch) multiple applications in a cloud infrastructure. In the application blueprint, the developer models an overall application architecture, or topology, that includes individual and clustered nodes (e.g., VMs), logical templates, cloud providers, deployment environments, software services, application-specific code, properties, and dependencies between top-tier and second-tier components. The application can be deployed according to the application blueprint, which means any needed VMs are provisioned from the cloud infrastructure, and application components and software services are installed. | 09-05-2013 |
20130232497 | EXECUTION OF A DISTRIBUTED DEPLOYMENT PLAN FOR A MULTI-TIER APPLICATION IN A CLOUD INFRASTRUCTURE - A deployment system orchestrates execution of deployment plan in coordination with nodes participating in deployment of a multi-tier application in a cloud infrastructure. The deployment system distributes local deployment plans to each node and maintains a centralized state of deployment time dependencies between tasks in different local deployment plans. Prior to execution of each task, deployment agents executing on each node communicates with the centralized deployment system to check whether any deployment time dependencies need to be resolved. Additionally, the deployment system utilizes a node task timer that triggers a heartbeat mechanism for monitoring failure of deployment agents. | 09-05-2013 |
20130232498 | SYSTEM TO GENERATE A DEPLOYMENT PLAN FOR A CLOUD INFRASTRUCTURE ACCORDING TO LOGICAL, MULTI-TIER APPLICATION BLUEPRINT - A deployment system enables a developer to generate a deployment plan according to a logical, multi-tier application blueprint defined by application architects. The deployment plan includes tasks to be executed for deploying application components on virtual computing resource provided in a cloud infrastructure. The deployment plan includes time dependencies that determine an execution order of the tasks according to dependencies between application components specified in the application blueprint. The deployment plan enables system administrators to view the application blueprint as an ordered workflow view that facilitates collaboration between system administrators and application architects. | 09-05-2013 |
20150347170 | GROUPING VIRTUAL MACHINES IN A CLOUD APPLICATION - An application is deployed to a cloud computing environment, where the application is executed using a plurality of virtual machines, including a first virtual machine, that execute on hosts in the cloud computing environment. To deploy the application, an application identifier is generated and a first virtual machine identifier is generated for the first virtual machine. The first virtual machine is then instantiated in the cloud computing environment. A second virtual machine identifier for the first virtual machine is then generated. An association among the application identifier, the first virtual machine identifier, and the second virtual machine identifier is then created. | 12-03-2015 |
20150347264 | TRACKING APPLICATION DEPLOYMENT ERRORS VIA CLOUD LOGS - A cloud computing environment consists of a cloud deployment platform and a cloud management server configured to manage a plurality of virtual machines deployed in a cloud infrastructure. When a request to deploy an application to the cloud infrastructure is received by the cloud deployment platform, application deployment errors are monitored and tracked. A unique identifier is generated for each virtual machine, and requests to instantiate the virtual machines in the cloud infrastructure are then transmitted. A log containing error records that identify the occurrence of deployment errors is monitored based on the generated virtual machine identifiers, where the deployment errors are detected by the cloud deployment platform or the cloud management server. Based on the monitoring, error messages are generated by the cloud deployment platform. | 12-03-2015 |
20150350101 | CUSTOMIZED CONFIGURATION OF CLOUD-BASED APPLICATIONS PRIOR TO DEPLOYMENT - A cloud computing environment consists of a cloud deployment platform with an application management server executing thereon, and a cloud management server configured to manage a plurality of virtual machines deployed in a cloud infrastructure. When a cloud-based application is deployed to the cloud infrastructure, a deployment plan for the cloud-based application is read, where the deployment plan comprises a first plurality of tasks to be executed in the cloud infrastructure. A determination is made that one or more custom tasks are required to be executed in the cloud infrastructure. After the determination, the one or more custom tasks are inserted into the first plurality of tasks to generate a second plurality of tasks. The second plurality of tasks is then transmitted to the cloud management server for execution in the cloud infrastructure. | 12-03-2015 |
20150379259 | DYNAMIC DATABASE AND API-ACCESSIBLE CREDENTIALS DATA STORE - A system for managing credentials for authenticating and securely communicating with trusted hosts, for example, in a cloud computing environment. The system dynamically updates credentials stored in a database and injects the updated credentials back into a runtime environment without restarting the runtime environment or applications running on the runtime environment. Embodiments of the present invention further enable credentials to be tracked and managed on a per-tenant basis, allowing each tenant that is running an application on a runtime environment to customize which hosts should be trusted. | 12-31-2015 |
20150381550 | CLOUD COMPUTING ABSTRACTION LAYER FOR INTEGRATING MOBILE PLATFORMS - A system for managing a virtualized computing system is disclosed. The system enables a user of a mobile device to efficiently track and manage computing resources via a management application that includes a graphical user interface that is designed to be operated using a conventional terminal (e.g., via a mouse and keyboard). The system may receive commands from the user of the mobile device in a first format and translate the commands into a second format that can be executed by a management application. Embodiments of the present disclosure further enable a management application to verify and securely communicate with users via existing communications services (e.g., social networking services) without expending additional resources to develop custom, secure interfaces for multiple mobile software and hardware platforms. | 12-31-2015 |