H04L45/00

CONTROL APPARATUS, CONTROL METHOD AND PROGRAM
20230007919 · 2023-01-12 ·

A control device includes an information acquisition unit that receives a source address of a packet from a node that receives the packet transmitted from a user terminal, and acquires position information about the user terminal on a basis of the source address, a determination unit that determines a hub to which the user terminal should connect, on a basis of the position information, and a control execution unit that launches an application in the hub and changes a routing such that packets transmitted from the user terminal are transmitted to the application.

METHOD AND ELECTRONIC DEVICE FOR SCHEDULING SOFTWARE UPGRADE OF NETWORK DEVICES

A method and an electronic device for scheduling software upgrade of network devices in an internet protocol (IP) based network are provided. The method includes predicting traffic directed towards at least one of the network devices, predicting at least one event to be occurred at the at least one of the network devices, determining a time period to schedule the software upgrade based on the predicted traffic and the determined at least one event, and scheduling the software upgrade in the time period.

Efficient core routing
11552884 · 2023-01-10 · ·

A method for managing traffic in a computerized system that may include routers and at least one edge device, the method may include performing traffic management operations for controlling traffic related to the routers while executing a first traffic management operations by the at least one edge device, and executing second traffic management operations by the routers.

Systems and methods for managing resources in a serverless workload

Various approaches for allocating resources to an application having multiple application components, with at least one executing one or more functions, in a serverless service architecture include identifying multiple routing paths, each routing path being associated with a same function service provided by one or more containers or serverless execution entities; determining traffic information on each routing path and/or a cost, a response time and/or a capacity associated with the container or serverless execution entity on each routing path; selecting one of the routing paths and its associated container or serverless execution entity; and causing a computational user of the application to access the container or serverless execution entity on the selected routing path and executing the function(s) thereon.

Computer-based platforms configured for automated early-stage application security monitoring and methods of use thereof

The systems and methods disclosed herein comprise computer-based platforms configured for automated early-stage application security monitoring for allowing users (e.g., application developers) to make decisions at the early stage of the application development.

Session establishment using path change
11552883 · 2023-01-10 · ·

As described herein, a router signals a source device to establish a new stateful communication session with a destination device by changing a network path used by traffic associated with the session. In one example, a router forwards traffic of a first stateful routing session established by the source device along a first path. In response to determining that that the first path should not be used, the router forwards a packet of the first session along a second path. The destination device recognizes the change in path, which causes the destination device to reject the packet, which in turn causes the source device to establish a second stateful routing session. The router forwards subsequent traffic of the second stateful routing session along the second path.

Layer three instances for a cloud-based services exchange

In general, this disclosure describes a programmable network platform for dynamically programming a cloud exchange to provide a layer three (L3) routing instance as a service to customers of the cloud exchange. In one example, a cloud exchange comprises an L3 network located within a data center and configured with an L3 routing instance for an enterprise; and for the L3 routing instance, respective first and second attachment circuits for first and second cloud service provider networks co-located within the data center, wherein the L3 routing instance stores a route to a subnet of the second cloud service provider network to cause the L3 routing instance to forward packets, received from the first cloud service provider network via the first attachment circuit, to the second cloud service provider network via the second attachment circuit.

Identifying an ingress router of a flow in inter-AS VPN option-C networks with visibility in one AS
11575596 · 2023-02-07 · ·

Systems and methods include detecting whether a monitored network has a unique configuration; responsive to the unique configuration, determining an ingress point for flow samples; and utilizing the determined ingress point for the flow samples to generate a traffic report for the monitored network. The unique configuration is an inter-Autonomous System (AS) option-C Virtual Private Network (VPN) network where control and data planes are asymmetric. The approach provides traffic projection based on the flow samples with the asymmetric flows.

Satisfying demands in data communication networks
11595294 · 2023-02-28 · ·

Systems and methods are disclosed for identifying a set of internal edges on a representation of a network that satisfy a set of demands on the network. The disclosed systems and methods perform a multi-step process of selecting the internal edges. In a first step, an initial set of internal edges can be selected using a clique graph (or in another suitable manner). In a second step, a second set of internal edges can be selected using stream graph(s) (or in another suitable manner). The second set of internal edges can be used when determining network paths that satisfy the demands. When the representation of the network has a cut of two, the disclosed systems and methods can identify a set of internal edges providing a degree of protection against link failure.

Computer network troubleshooting and diagnostics using metadata

A device is configured to detect a triggering event within a network that is associated with a communication error between a first network device and a second network device. The device is further configured to identify a first node in a computer network map corresponding with the first network device and to identify node properties for the first node. The device is further configured to identify the error correction instructions in the node properties for the first node that include an address for rerouting data traffic to a third network device. The device is further configured to apply the error correction instructions where applying the error correction instructions suspends data traffic to the second network device and reroutes data traffic to the third network device.