Customer premises equipment virtualization

ABSTRACT

A system is described that improves network function virtualization. The system facilitates an access point, such as a customer premises equipment, to utilize functionality of another access point when providing communication service to a device at a customer premises. The other access point may be a customer premises equipment at a neighboring premises. The access point may utilize the neighboring access point in case the access point is in a power saving state. Alternatively or in addition, the access point may use the other neighboring access point based on bandwidth availability, processing capability, memory capacity, or other attributes, or a combination thereof of the neighboring access point. In yet another example, the access point may utilize the neighboring access point in case of a failure in connection between the access point and a network provider.

PRIORITY CLAIM

This application claims priority to provisional application Ser. No.62/167,565, filed May 28, 2015, which is entirely incorporated byreference.

TECHNICAL FIELD

This disclosure relates to network functionality virtualization,particularly virtualization performed by edge customer premisesequipment.

BACKGROUND

The processing power, memory capacity, available disk space, and otherresources available to processing systems have increased exponentially.Computing resources have evolved to the point where a single physicalserver may host many instances of virtual machines and virtualizedfunctions. Each virtual machine typically provides virtualizedprocessors, memory, storage, network connectivity, and other resources.At the same time, high-speed data networks have emerged and matured, andnow form part of the backbone of what has become indispensable worldwidedata connectivity, including connectivity to virtual machine hosts.Improvements in virtualization will drive the further development anddeployment of virtualization functionality. Further, rapid advances inelectronics and communication technologies, driven by immense customerdemand, have resulted in the widespread adoption of mobile communicationdevices. Many of these devices, e.g., smartphones, have sophisticatedprocessing capability and rely on clocks of different frequencies toperform different processing tasks, e.g., decoding and playback ofencoded audio files. In most of such devices, energy consumption is ofinterest, and reduced energy consumption is often a design goal.

BRIEF DESCRIPTION OF THE DRAWINGS

The examples described throughout the present document may be betterunderstood with reference to the following drawings and description. Thecomponents in the figures are not necessarily to scale. Moreover, in thefigures, like-referenced numerals designate corresponding partsthroughout the different views.

FIG. 1 shows an example of a network that includes virtual machine hostsconnected by network devices.

FIG. 2 shows a virtual machine host configured to execute virtualmachines and virtual functions.

FIG. 3 illustrates example scenarios of virtualizing network functions.

FIG. 4 illustrates an example flow chart of virtualizing a customerpremises equipment.

FIG. 5 illustrates an example operational flow diagram that may beimplemented by a head end system.

FIG. 6 illustrates an example operational flow diagram that may beimplemented by a customer premises equipment.

FIG. 7 illustrates an example operational flow diagram.

DETAILED DESCRIPTION

FIG. 1 shows an example network 100. In the network 100, networkingdevices route packets (e.g., the packet 102) from sources (e.g., thesource 104) to destinations (e.g., the destination 106) across anynumber and type of networks (e.g., the Ethernet/TCP/IP network 108). Thenetworking devices may take many different forms and may be present inany number. The network 108 may span multiple routers and switches, forinstance. Examples of network devices include switches, bridges,routers, and hubs; however other types of networking devices may also bepresent throughout the network 100. The network 108 may be a passiveoptical network (PON) that includes an optical line terminal (OLT) at anetwork service provider's central office and a number of opticalnetwork units (ONUs) near end users or customers. In an example, the PONmay be an Ethernet PON (EPON).

The network 100 is not limited to any particular implementation orgeographic scope. As just a few examples, the network 100 may representa private company-wide intranet; a wide-area distribution network forcable or satellite television, Internet access, and audio and videostreaming; or a global network (e.g., the Internet) of smallerinterconnected networks. In that respect, the data center 110 mayrepresent a highly concentrated server installation 150 with attendantnetwork switch and router connectivity 152. The data center 110 maysupport extremely high volume e-commerce, search engines, cloud storageand cloud services, streaming video or audio services, or any othertypes of functionality.

In the example in FIG. 1, the network 100 includes operators andproviders of cable or satellite television services, telephony services,and Internet services. In that regard, for instance, FIG. 1 shows thatthe network 100 may include any number of head end systems 112 operatingwith circuitry in the form of head end devices such as a cable modemtermination system (CMTS), a digital subscriber line access multiplexer(DSLAM), an optical line terminal (OLT), and/or any other network devicefor processing and distributing data. The head end systems 112 mayprovide service to any number of gateways, e.g., the gateways 114, 116,118. The gateways may represent cable modems, combined cable modems andwireless routers, or other types of entry point systems into any of awide variety of locations 180, such as homes, offices, schools, andgovernment buildings. The network 100 may include other types oftermination systems and gateways. For example, the network 100 mayinclude digital subscriber line (DSL) termination systems and DSL modemsthat function as the entry points into homes, offices, or otherlocations. The entry point systems may be referred to as edge customerpremises equipment (CPEs), as the entry point systems may be located atrespective customer premises.

At any given location, the gateway may connect to any number of any typeof node. In the example of FIG. 1, the nodes include set top boxes(STBs), e.g., the STBs 120, 122, 124. Other examples of nodes includenetwork connected smart TVs 126, audio/video receivers 128, digitalvideo recorders (DVRs) 130, streaming media players, gaming systems,computer systems, physical media (e.g., BluRay) players, and any othertype of media device.

Communication path redundancy may be provided to the nodes beingsupported by the gateways 114, 116 and 118 using a second communicationpath. Such communication path redundancy may be provided by a secondcommunication network, such as a wireless network upon which each of thenodes can communicate among themselves, and with any one of the gateways114, 116 and 118. In an example, each of the nodes and the gatewaysincludes a wireless transceiver that can communicate on a wirelessnetwork such as a Wi-Fi network. In other examples, a cellular network,Bluetooth™, TC/PIP and/or any other wired or wireless communicationprotocol/system can be used to create the second communication path thatredundantly operates with a first communication path provided via thegateways.

FIG. 2 shows a virtual machine host 200 (“host”) configured to executevirtual machines and virtual functions. Any of the devices in thenetwork 100 may be hosts, including the nodes, gateways, head endsystems, switches, servers, sources, and destinations. The hosts providean environment in which any selected functionality may run, may bereachable through the network 100, and may form all or part of a chainof functionality to accomplish any defined processing or contentdelivery task. The functionality may be virtual in the sense that, forexample, the virtual functions implement, as software instances runningon the hosts, functions that were in the past executed with dedicatedhardware.

In FIG. 2, the host 200 includes one or more communication interfaces202, system circuitry 204, input/output interfaces 206, and a display208 on which the host 200 generates a user interface 209. When thecommunication interfaces 202 support cellular connectivity, the host 200may also include a SIM card interface 210 and SIM card 212. The host 200also includes storage devices, such as hard disk drives 214 (HDDs) andsolid state disk drives 216, 218 (SDDs).

The user interface 209 and the input/output interfaces 206 may include agraphical user interface (GUI), touch sensitive display, voice or facialrecognition inputs, buttons, switches, speakers and other user interfaceelements. Additional examples of the input/output interfaces 206 includemicrophones, video and still image cameras, headset and microphoneinput/output jacks, Universal Serial Bus (USB) connectors, memory cardslots, and other types of inputs. The input/output interfaces 206 mayfurther include magnetic or optical media interfaces (e.g., a CDROM orDVD drive), serial and parallel bus interfaces, and keyboard and mouseinterfaces.

The system circuitry 204 may include any combination of hardware,software, firmware, or other logic. The system circuitry 204 may beimplemented, for example, with one or more systems on a chip (SoC),application specific integrated circuits (ASIC), discrete analog anddigital circuits, and other circuitry. The system circuitry 204 is partof the implementation of any desired functionality in the host 200. Inthat regard, the system circuitry 204 may include circuitry thatfacilitates, as just a few examples, running virtual machines, runningvirtual functions, routing packets between the virtual machines and thenetwork 100, and switching packets between the virtual machines.

As just one example, the system circuitry 204 may include one or moreprocessors 220 and memories 222. The memory 222 and storage devices 214,216 store, for example, control instructions 224 and an operating system226. The processor 220 executes the control instructions 224 and theoperating system 226 to carry out any desired functionality for the host200. The control parameters 228 provide and specify configuration andoperating options for the control instructions 224, operating system226, and other functionality of the host 200.

In some implementations, the control instructions 224 include ahypervisor 230. The hypervisor 230 provides a supervising softwareenvironment that executes one or more virtual machines (VMs), virtualswitches, virtual firewalls, virtual operating systems, virtual networkinterface cards (NICs), or any other desired virtualization components.In other implementations, the host 200 is a bare-metal virtualizationhost. That is, the host 200 need not execute a separate operating system226 on top of which the hypervisor 230 runs. Instead, the hypervisor 230may directly communicate with and control the physical hardwareresources in the host 200 without supervision or intervention through aseparate operating system.

The host 200 may execute any number of VMs 232. Each VM may execute anynumber or type of virtual functions (VFs) 234. The VFs may be softwareimplementations of any desired functionality, ranging, for instance,from highly specialized network functions to general purpose processingfunctions.

As just a few examples of network functions, the VFs may implementnetwork firewalls, messaging spam filters, and network addresstranslators. As other example of processing functions, the VFs mayimplement audio and video encoders and transcoders, digital rightsmanagement (DRM) processing, database lookups, e-commerce transactionprocessing (e.g., billing and payment), web-hosting, content management,context driven advertising, and security processing such asHigh-bandwidth Digital Content Protection (HDCP) and DigitalTransmission Content Protection (DTCP-IP) processing. Additionalexamples of VFs include audio, video, and image compression anddecompression, such as H.264, MPG, and MP4 compression anddecompression; audio and video pre- and post-processing, serverfunctionality such as video on demand servers, DVR servers; over the top(OTT) servers; secure key storage, generation, and application, and 2Dand 3D graphics rendering.

The operators and providers of cable or satellite television services,telephony services, and Internet services, that is, network serviceproviders, may provide the host 200 to a customer. For example, thenetwork service provider may provide a gateway, which may be the host200. In another example, the network provider may provide a CPE, such asan STB, which may be the host 200. Alternatively, the host 200 may becustomer owned. A network service provider may manage operation of thehost 200 irrespective of whether or not the network service provider hasprovided the host 200. In an example, the network service provider mayassign a host 200 to a particular location, such as the location 180.

In the following examples, for ease of description, virtualization isperformed by the gateways, however the virtualization may be performedby any other CPEs. The virtualization may include distribution ofprocessing, memory, or a combination thereof across the gateways.

In an example the head end system 112 may control functions virtualizedby the gateways and/or physical characteristics of the gateways. Forexample, the CMTS 112 may select one of the gateways, such as thegateway 114 to execute a VM to provide a VF as a service to othergateways. The head end system 112 may make the selection based on anetwork management policy. For example, the head end system 112 may makethe selection based on the workload of the gateway 114. For example, thehead end system 112 may identify that the gateway 114 is currently beingunderutilized. The gateway 114 may be underutilized for several reasonssuch as the number of nodes connected to the gateway 114 being below apredetermined threshold, or the nodes connected to the gateway 114 usingresources below a predetermined threshold.

In addition or alternatively, the gateway 114 may be identified andselected based on the gateway 114's geographic proximity with the othergateways seeking the VF. For example, the gateway 114 may be within apredetermined distance from the gateway 116. In another example, thegateway 114 may be selected as the candidate host to take over theoperations of the gateway 116 based on the gateway 114's virtualproximity with the gateway 116. For example, the gateway 114 and gateway116 may have successive subnet addresses. The network service provider'spolicy may prompt selection of a candidate gateway based on variousother criteria, and the above are merely exemplary.

In another example, the gateways may coordinate the VF being provided bythe gateways to each other. The gateways may coordinate the VFs based onthe network policy. The network policy may be stored such that it isaccessible by each of the gateways. For example, the network policy maybe stored at each gateway. Alternatively or in addition, the networkpolicy may be stored in a central location, such as the head end system112, that is accessible by each of the gateways. In another example, acentral server, such as the head end system 112 may control operationsof each of the gateways to coordinate the operations at each of thegateways. The network policy may be stored as a configuration, or a setof rules. Alternatively or in addition, the gateways may coordinate theVFs based on a detected pattern of usage of the respective gateways.

The gateway 114 that is selected to provide the VF as a service to theother gateways may be geographically close to the other gateways such aswithin a predetermined vicinity of the other gateways to which thegateway 114 provides the VF as a service. Alternatively or in addition,the gateway 114 may provide the VF as a service to other gateways withinthe same subscriber domain or sub-domain as the gateway 114.

In both cases, whether being controlled by the head end system or by thegateways themselves, it may be initially ensured that the gateway 114that is selected has the resources to provide the VF. For example, thegateway 114 may be selected to provide a VF once it is ensured that thegateway 114 has the requisite processing power, memory, and networkbandwidth, among other factors and a combination thereof. For example,in a one-to-may model, a more capable gateway may be used to proxy forthe other gateways which may be less capable. Thus, in an example thenetwork service provider may deploy a high-end gateway, which may costrelatively more, at the location 180 and deploy lower-end and lessercost gateways in a predetermined proximity of the location 180. Thehigher-end gateway 114 may be subsequently selected to provide the VF asa service to the other lower-end gateways in its proximity. Thus, thehigher-end gateway 114 may be a master gateway providing multiple VFs asa service to the other gateways.

In another example using a many-to-many model, the network serviceprovider may deploy multiple gateways in a locality, such as aneighborhood, the multiple gateways deployed such that they may provideVFs as a service to each other and other relatively lower-end gatewaysin the locality. In such a model, a gateway may be dynamically selectedfor a particular VF. That is the gateway selected may be changedperiodically or in response to change in circumstances. In such a casethe VF may be ported to a hypervisor of another gateway in response tochanges in circumstances. For example, say the gateway 114 is firstselected to provide a VF service to other gateways. The gateway 114 mayexecute the VM 232 to provide the corresponding VF. However, due tochange in available bandwidth at the gateway 114, the system maydynamically select the gateway 116 to provide the VF. The VM 232 may, inresponse, be ported from the hypervisor of the gateway 114 to thehypervisor of the gateway 116.

In an example, the gateway 114 may be selected to provide firewallservices to the other gateways. The gateway 114 may execute a VM 232that provides a network firewall. Thus, the VM 232 may process data thatis communicated by the devices connected via the gateway 114 such as thenode 132, the TV 126, and the STB 120. The VM 232 may be additionallyused to process data that is communicated by devices connected via thegateway 116, such as the node 134, the TV 128, and the STB 122. Thus,the gateway 116 may not execute its own firewall. Instead, the gateway116 may use the firewall services provided by the VM 232 being executedby the gateway 114. The gateway 116 may route data to and/or from thedevices connected to the gateway 116 to the gateway 114 for the firewallservices. Once the firewall processing at the gateway 114 is complete,the data is re-routed to the gateway 116 and the respective destinationdevice. The gateway 114 may ensure that the data from the gateway 116 iskept separate from data directed to the devices connected to the gateway114 itself.

The gateway 116, as a result, may use resources that would have beenused for firewall services for other purposes, such as encryption, videoencoding or any other purpose. While, the example describes gateway 116using the VF firewall services from the gateway 114, more than onegateway may use the VF services at a time. Also, although the aboveexample describes VM 232 as providing firewall services, other networkfunctionality may be provided in other examples. Additionally oralternatively, the VM 232 may provide more than one service at a time,such as firewall services and data encryption services. Further yet, inan example, the gateway 114 may execute multiple VMs, such as one VM forthe firewall services and another VM for the data encryption services.The gateway 116 may utilize some or all of the VMs being executed by thegateway 114.

In another example, data may be cached in different CPEs. For example,the gateway 116 may cache data that is sent to or received from thedevices connected to the gateway 116, such as the node 134. For example,the gateway 116 may cache media data, such as a video stream, beingaccessed by the node 134. Alternatively or in addition, the gateway 116may cache data associated with a web-browsing session of the node 134.In another example, the gateway 116 may cache data that the node 134directs to be stored in a network attached storage (NAS) device, such asa cloud-based data storage service provider, or a private NAS. In anexample, the gateway 116 may itself provide a NAS service by storing thedata on the memory 222. Other examples of data may also be cached by thegateway 116.

The gateway 116 may use a data caching VF provided by one or more othergateways. For example, the gateway 116 may route the data cachingrequests for the node 134 and the corresponding data to the gateway 114.The gateway 114 may execute the VM 232 that provides data cachingservices in this example. The gateway 114, via the VM 232, may providethe requisite data caching, by caching the data in the memory 222 of thegateway 114. The gateway 116 may request and access the cached data fromthe gateway 114 and/or the VM 232 subsequently. Thus, the gateway 116may cache more data than a cache capacity of the gateway 116 alone.Accordingly, gateway 116 may avoid removing data from the cache that maybe in demand shortly.

In other examples, the gateway 116 may be able to cache data receivedfrom a remote server at the gateway 114, instead of removing the datafrom the cache, and in turn prevent requesting the same data from theremote server again. For example, consider the case where the node 134requests data from multiple remote servers substantially simultaneously,such as by requesting data from a cloud-based data storage, an emailserver, a media streaming service, among others. The gateway 116 may, inresponse, cache data from the respective corresponding serviceproviders. The amount of data to be cached may be more than the cachecapacity of the gateway 116. In this case, the gateway 116 may cachepart of the data with the gateway 114. The latency associated withaccessing the data cached with the gateway 114 may be relatively lesserthan receiving the data from the corresponding service provider.Accordingly, when the node 134 requests the cached data forpresentation, the gateway 116 may, in response, access the cached datafrom the gateway 114, which may be more efficient, and faster, thanrequesting the data from the corresponding service provider again.

FIG. 3 illustrates example scenarios of virtualizing network functions.

The gateway 114 at customer premises 320 may facilitate communicationbetween a device, such as the node 132 communicatively connected withthe gateway 114 and network 108. The gateway 114 may communicativelyconnected with the node 132 via a first communication path, such as awired connection illustrated in FIG. 3, or via a second communicationpath, such as a wireless connection. The first and second communicationpaths can operate with any wireless or wireline communication protocol.Although the first communication path is described as a wirelinecommunication path, and the second communication path is described as awireless communication path, in other examples, the first and secondcommunication paths can be either wired or wireless, or some combinationthat results in redundant communication paths.

The gateways 114, 116, 118, and 119, may facilitate communication on thefirst and second communication paths between the devices that arelocated at the corresponding customer premises 320, 330, and 180respectively and the network 108 via the head end system 112. In anexample, the first communication path may represent a primary or defaultcommunication path, and the second communication path may represent aback up or auxiliary communication path. Alternatively, or in addition,the gateways 114, 116, 118 and 119 may elect to use the first and/or thesecond communication path based on system parameters, such as theexistence of a choice of either the first or the second communicationpath being available, communication path congestion, the volume ofinformation being communicated, or any other parameters that could beused to selectively use the first and second communication paths. Incase of the first or second communication path including EPON, forexample, the gateways 114-118 may be ONUs and the head end system 112may be an OLT.

For example, in a case where the gateway 118 loses connectivity with thehead end system 112, another gateway, such as the gateway 114, may beselected to take over operations of the gateway 118. The gateway 118 maylose connectivity for several reasons. For example, a failure at thegateway 118, a communication link between the gateway 118 and the headend system 112 being broken such as due to repair or any other reason,or the gateway 118 being in standby mode, or any other reason may causethe gateway 118 to lose communication connectivity with the head endsystem 112. The head end system 112 may identify the gateway 114 as acandidate to take over the operations of the gateway 118 and communicatewith the nodes 124, 130 . . . 136 via the second communications path,such as via a wireless communication path. Alternatively or in addition,the gateway 114 may identify itself as a candidate gateway to take overthe operations of the gateway 118.

In the above example, the gateway 114 may take over the operation of thegateway 118 by executing services provided by the gateway 118 in one ormore virtual machines 232. For example, the node 136 that iscommunicatively connected to the gateway 118 may communicate with thenetwork 108 via the second communications path and the gateway 114without any interruption in service caused by the loss in connectivityof the gateway 118. For example, the head end system 112 may route thedata destined for the node 136 to the gateway 114, which in turn, maysend the data to the node 136 over the second communication path. Uponnotification that the gateway 118 is back online, the communication ofthe node 136 may be restored via the gateway 118 and communication maybe reestablished over the first communication path. Thus, the gatewaysmay provide redundancy to protect against unavailability of one or moreof the gateways.

For example, in the above scenario, where the gateway 118 isexperiencing a failure, a network service provider control device, suchas the head end system 112, may detect a change in condition of theconnectivity of the gateway 118, such as an outage, and adaptivelyvirtualize functions onto the gateway 114, for example, to provideoutage support.

In another example, the head end system 112 may perform scheduledadaptations to control the CPEs such as the gateways. For example, thehead end system 112 may power down a first CPE, such as the gateway 116and virtualize functions of the gateway 116 onto a second CPE such asthe gateway 114, for example to reduce power consumption, to loadbalance, to control bandwidth, to maintain QoS level, or for any otherpurpose.

FIG. 4 illustrates an example flow chart of virtualizing a CPE. Forexample, the head end system 112 may identify that the gateway 116 andthe gateway 114 are in close geographic proximity such that a wirelessnetwork representing the second communication path being provided by oneor both of the gateways is available at the customer premises of theother gateway. (402). The head end system 112 may disable one of thegateways, such as the gateway 116. (450). The head end system 112 maydecide which gateway to disable based on the network policy. (410). Forexample, based on the network policy, the head end system 112 may assigndifferent weights to the gateways based on the respective capabilitiessuch as processing power, memory, radio strength, or any otherperformance capability. (412, 414). The weights, additionally oralternatively may be assigned on workload of the respective gateway, forexample, a gateway with a lower workload may be assigned a higher weightfor greater probability of being selected for disabling (or keepingenabled). (416). Based on the weights assigned, the head end system mayselect the gateway 116 as the gateway to be disabled. (410).

The gateway 114 may execute the VMs 232 to perform the operations of thegateway 116 and communicate over the second communication path. Forexample, the gateway 114 may adjust a VF that provides firewall servicesto process data destined for the node 134 of the gateway 116 in additionto the node 132 of the gateway 114 itself. The gateway 114 may provideother functionalities in a virtualized manner either through the singleVM or via multiple VMs. The head end system 112 may request the gateway114 to provide the functionality for the gateway 116.

As part of providing virtualized functionality via the gateway 114, thegateway 114 may publicize the second communication path as a newwireless network with the same service set identifier (SSID) as awireless network provided by the gateway 116. (432). The new wirelessnetwork would be configured substantially similar to the wirelessnetwork of the gateway 116, such as the password, subnet masks and otherparameters. The node 134 communicatively connected to the gateway 116would thus be able to communicatively connect to the new wirelessnetwork from the gateway 114. (434).

The head end system 112 may be notified when the gateway 114 has beenconfigured to provide virtualized network functionality to replace thegateway 116. In response, the head end system 112 may disable thegateway 116. The head end system 112 may subsequently route datadestined to the gateway 116 to the gateway 114. (450). The gateway 114in turn, via the virtualized functions and the second communicationpath, may forward the data to the node 134.

In an example, the head end system 112, after porting functionality ofthe gateway 116 to the gateway 114, may identify another gateway to portthe functionality of the gateway 114. In such a case, the anothergateway may virtualize the functionalities of both, the gateway 114 andthe gateway 116 and communicate at least partially over the secondcommunication path, while the gateways 114 and 116 are disable. Thus,the head end system 112 may save power consumption.

In another example, the head end system 112, after porting functionalityof the gateway 116 to the gateway 114, may identify a loss incommunication with the gateway 114. In such a case, as describedthroughout the present document, the head end system 112 may identifythe another gateway to port the functionality of the gateway 114 and thegateway 116. Alternatively, the head end system 112 may enable thegateway 116 and port functionality of the gateway 114 to the gateway116.

In another example, one or more of the gateways, instead of the head endsystem 112, may port the functionalities among themselves, selectivelyuse the first and second communication paths, and notify the head endsystem 112 of the changes.

FIG. 5 illustrates an example operational flow diagram that may beimplemented with the head end system 112, which may include any head enddevice, such as an IP-DSLAM, OLT and/or CMTS. The head end system 112,which may be a network device such as described throughout the presentdocument may include a network interface to receive a network flow and aflow inspection circuitry 250 to inspect the network flow and determinea first CPE that will process the network flow. (502). For example, thenetwork flow may include data packets and the flow inspection circuitry250 may identify the first CPE based on packet destination informationwithin the network flow. For example, the destination information may bein a header of the data packet. The head end system 112 may determinewhether the first CPE is active and transmit the data to the first CPEif it is active. (510, 520). Else, the flow inspection circuitry 250 mayidentify a second CPE that may host a virtualized function associatedwith the first CPE. (510, 530). The head end system 112 may direct thenetwork flow to the second CPE. (540). The flow inspection circuitry, inan example, may identify that the first CPE is disabled, and inresponse, direct the network flow to the second CPE. For example, thefirst CPE may be disabled in response to a connectivity failureassociated with the first CPE. Alternatively or in addition, the networkswitch may disable the first CPE, for example according to an energypolicy. The network switch may initialize the virtualized functions atthe second CPE in anticipation of the first CPE being disabled. Forexample, the network switch may identify the second CPE to host thevirtualized function based on the second CPE being in a pre-determinedsignal range from the first CPE, based on geographic proximity or beingwithin a subdomain. Alternatively or in addition, the network switch mayidentify the second CPE to host the virtualized function based on atopology of the network 108 that includes the network switch and thefirst and second CPE.

FIG. 6 illustrates an example operational flow diagram that may beimplemented with a CPE. The CPE, which may be an ONU such as the gateway114 may receive data from a network provider via the head end system 112and forward the data to customer devices such as the node 132 at thecustomer premises 320. (602). The head end system 112 may also providedata to another gateway 116 that is at a second premises 330. Thegateway 114 may identify processing to be performed on the data receivedfrom the network provider prior to forwarding the data to the node 132.(610). The gateway 114 may determine if the data is processed within thegateway 114 itself, and process it accordingly if that is the case.(620, 622). Alternatively, the gateway 114 may identify another CPE suchas the gateway 116 that hosts a virtual function to process the data.(630). The gateway 114, prior to forwarding the data to the node 132,may forward the data to the gateway 116 for the processing to beperformed on the data. (640). The gateway 114 may receive the processeddata from the gateway 116 and subsequently forward the processed data tothe node 132. (650). The gateway 114 may forward the processed data tothe node 132. (670). The gateway 114 and the gateway 116 may beconnected to the same network provider. The gateway 114 may notify thehead end system 112 to forward the data to the gateway 116 in responseto the gateway 114 being in a power saving state. The gateway 114 maynotify the head end system 112 to forward the data to the gateway 116 inresponse to the gateway 116 being selected to perform the identifiedprocessing on the data. The gateway 116 may be selected by the networkprovider to perform the identified processing. Alternatively, thegateway 116 may be selected by the gateway 114 to perform the identifiedprocessing. For example, the gateway 116 may be selected to perform theidentified processing based on processing speed, storage capacity,bandwidth, or a combination thereof, of the gateway 116.

FIG. 7 illustrates an example operational flow diagram. The operationsmay include receiving a request at a first CPE, such as the gateway 114from a customer device such as the node 132 at the first customerpremises 320. (702). The request may be for obtaining data from a remoteserver via a network provider, such as via the head end system 112. Forexample, the request may be to access a media stream such as a movie, asporting event, a television show, a radio show, a song, an audio book,a podcast, a document, or any other media stream. The request also maybe to access other kinds of data such as email, webpage or the like. Theoperation may further include receiving, by the gateway 114,identification of a second CPE, such as the gateway 116 from the headend system 112 in response. The head end system 112 may identify thatthe requested data is cached at the gateway 116 in response to anotherrequest for the data from a customer device such as the node 134 at thesecond customer premises 330. (710). For example, the node 134 at thesecond customer premises may be accessing the same media stream as thenode 132. Thus, the gateway 116 may have buffered the media stream. Thehead end system 112 may further determine that the latency for thegateway 114 to access the requested data from the remote server may bemore than the latency to access the data from the gateway 116. (720).Accordingly, the head end system may access the data cached by thegateway 116 at the second customer premises 330. (720, 730).Alternatively, the head end system 112 may request and receive the datafrom the remote server. (730, 740, 742). The head end system 112subsequently may forward the requested data to the gateway 114. (750).The gateway 114 may forward the received data to the node 132 at thefirst customer premises 320. (760).

In an example, the requested data may include a first part and a secondpart, where only the first part of the data is cached at the gateway116. For example, the node 134 at the second customer premises 330 mayhave paused the media stream and therefore may not have buffered theentire media stream. In this case, the gateway 114 may receive the firstpart of the data, which has been buffered, from the gateway 116, and thesecond part of the data from the remote server. The operation mayfurther include sending, by the gateway 114, the second part of the datathat was obtained from the remote server, to the gateway 116. Thus, thesecond CPE or the gateway 116 in this case is made a virtual video hostfor the first CPE or the gateway 114. Although, only the gateway 114 isdescribed to request the data in the above, multiple gateways mayrequest the data and the gateway 116 may serve as the virtual host tothe multiple gateways.

In another example, the gateway 114 may receive, a second request fromthe node 132 at the first customer premises 320 to upload a second datato the remote server. The gateway 114 may forward the second data to thegateway 116 for caching and further forwarding the second data to theremote server based. The caching may be performed at the gateway 116based on the latency to send the second data from the gateway 114 to thegateway 116 being lesser than the latency to send the second data fromthe gateway 114 to the remote server. Further, availability of memorystorage to cache the second data at the gateway 116 may be determinedprior to forwarding the data to the gateway 116. Further yet, the datamay be cached at the gateway 116 in response to the data being largerthan the available capacity at the gateway 114. For example, the datamay be a large data such as malware signatures, media files, or the likethat may not fit within a single CPE. Although, the above exampledescribes caching the data at the gateway 116, the gateway 114 may cachethe data at multiple gateways. Thus, the gateways may cooperativelycache large data.

In yet another example, the large data cached by more than one gateway,may be shared by the gateways. For example, if the large data is amalware signature, the gateways may continue to cache the malwaresignature across the multiple gateways. The gateways may access thecached malware signature in response to subsequent requests at therespective gateways.

In yet another example, the multiple gateways may implement a redundantstorage of data to ensure availability of the data during failover. Forexample, the gateway 114 may store a backup of critical information fromone or more other gateways. For example, the gateway 114 may back upconfiguration information of the gateway 116. The backed up data may beused to restore the gateway 116 upon recovery from a failure.

The methods, devices, processing, and logic described above may beimplemented in many different ways and in many different combinations ofhardware and software. For example, all or parts of the implementationsmay be circuitry that includes an instruction processor, such as aCentral Processing Unit (CPU), microcontroller, or a microprocessor; anApplication Specific Integrated Circuit (ASIC), Programmable LogicDevice (PLD), or Field Programmable Gate Array (FPGA); or circuitry thatincludes discrete logic or other circuit components, including analogcircuit components, digital circuit components or both; or anycombination thereof. The circuitry may include discrete interconnectedhardware components and/or may be combined on a single integratedcircuit die, distributed among multiple integrated circuit dies, orimplemented in a Multiple Chip Module (MCM) of multiple integratedcircuit dies in a common package, as examples.

The circuitry may further include or access instructions for executionby the circuitry. The instructions may be stored in a tangible storagemedium that is other than a transitory signal, such as a flash memory, aRandom Access Memory (RAM), a Read Only Memory (ROM), an ErasableProgrammable Read Only Memory (EPROM); or on a magnetic or optical disc,such as a Compact Disc Read Only Memory (CDROM), Hard Disk Drive (HDD),or other magnetic or optical disk; or in or on another machine-readablemedium. A product, such as a computer program product, may include astorage medium and instructions stored in or on the medium, and theinstructions when executed by the circuitry in a device may cause thedevice to implement any of the processing described above or illustratedin the drawings.

The implementations may be distributed as circuitry among multiplesystem components, such as among multiple processors and memories,optionally including multiple distributed processing systems.Parameters, databases, and other data structures may be separatelystored and managed, may be incorporated into a single memory ordatabase, may be logically and physically organized in many differentways, and may be implemented in many different ways, including as datastructures such as linked lists, hash tables, arrays, records, objects,or implicit storage mechanisms. Programs may be parts (e.g.,subroutines) of a single program, separate programs, distributed acrossseveral memories and processors, or implemented in many different ways,such as in a library, such as a shared library (e.g., a Dynamic LinkLibrary (DLL)). The DLL, for example, may store instructions thatperform any of the processing described above or illustrated in thedrawings, when executed by the circuitry.

A second action may be said to be “in response to” a first actionindependent of whether the second action results directly or indirectlyfrom the first action. The second action may occur at a substantiallylater time than the first action and still be in response to the firstaction. Similarly, the second action may be said to be in response tothe first action even if intervening actions take place between thefirst action and the second action, and even if one or more of theintervening actions directly cause the second action to be performed.For example, a second action may be in response to a first action if thefirst action sets a flag and a third action later initiates the secondaction whenever the flag is set.

To clarify the use of and to hereby provide notice to the public, thephrases “at least one of <A>, <B>, . . . and <N>” or “at least one of<A>, <B>, . . . <N>, or combinations thereof” or “<A>, <B>, . . . and/or<N>” are to be construed in the broadest sense, superseding any otherimplied definitions hereinbefore or hereinafter unless expresslyasserted to the contrary, to mean one or more elements selected from thegroup comprising A, B, . . . and N. In other words, the phrases mean anycombination of one or more of the elements A, B, . . . or N includingany one element alone or the one element in combination with one or moreof the other elements which may also include, in combination, additionalelements not listed.

Various implementations have been specifically described. However, manyother implementations are also possible.

1-20. (canceled)
 21. A first device on a first local area network, thefirst device comprising: a communication interface; and at least oneprocessor configured to perform at least one of: provide at least one ofprocessing or memory to a second device on a second local area network,based at least in part on a network management policy; or provide avirtual function to the second device using the communication interfacebased at least in part on the network management policy.
 22. The firstdevice of claim 21, wherein when the at least one processor isconfigured to provide the virtual function, the at least one processoris further configured to: receive at least part of a network flowdirected to, or intended for, the second device; perform the virtualfunction with respect to the at least part of the network flow; andafter performing the virtual function, provide the at least part of thenetwork flow to the second device.
 23. The first device of claim 22,wherein the at least part of the network flow is received from at leastone of a network switch or the second device.
 24. The first device ofclaim 22, wherein the at least part of the network flow provided to thesecond device bypasses a remote server.
 25. The first device of claim21, wherein the network management policy is accessible to the firstdevice and the second device.
 26. The first device of claim 21, whereinthe network management policy is provided by a network service provider.27. The first device of claim 26, wherein the network service providercomprises at least one of a cable or satellite television serviceprovider, a telephony service provider, or an Internet service provider.28. The first device of claim 21, wherein the first device includes atleast one of a SIM card interface or a SIM card.
 29. The first device ofclaim 21, wherein the network management policy is stored in the firstdevice and the first device is associated with a network serviceprovider.
 30. The first device of claim 21, wherein the networkmanagement policy assigns the virtual function to the first device basedat least in part on a geographic location associated with at least oneof the first device or the virtual function.
 31. The first device ofclaim 21, further comprising another communication interface, thatutilizes a different communication standard than the communicationinterface wherein the at least one processor is further configured to:provide another virtual function to a third device using the othercommunication interface based at least in part on the network managementpolicy.
 32. A method comprising: receiving, by a first device on a firstlocal area network, at least part of a network flow directed to, orintended for, a second device on a second local area network;performing, based at least in part on a network management policy, avirtual function with respect to the at least part of the network flow;and after performing the virtual function, providing the at least partof the network flow to the second device.
 33. The method of claim 32,wherein the at least part of the network flow is received via a firstcommunication interface and the at least part of the network flow isprovided to the second device via a second communication interface thatimplements a different communication standard than the firstcommunication interface.
 34. The method of claim 33, wherein the atleast part of the network flow provided to the second device bypasses aremote server.
 35. The method of claim 32, wherein the networkmanagement policy is accessible to the first device and the seconddevice.
 36. The method of claim 32, wherein the network managementpolicy is provided by a network service provider.
 37. The method ofclaim 36, wherein the network service provider comprises at least one ofa cable or satellite television service provider, a telephony serviceprovider, or an Internet service provider.
 38. The method of claim 32,wherein the first device includes at least one of a SIM card interfaceor a SIM card.
 39. The method of claim 32, wherein the networkmanagement policy assigns the virtual function to the first device basedat least in part on a geographic location associated with at least oneof the first device or the virtual function.
 40. A non-transitorymachine readable medium comprising code that, when executed by at leastone processor, causes the at least one processor to perform operations,the code comprising: code to provide, by a first device on a first localarea network, at least one of processing or memory to a second device ona second local area network, based at least in part on a networkmanagement policy.