H04L2212/00

Distributing service function chain data and service function instance data in a network

In some examples, a computing device comprises a first service function instance to apply a service function and a service function forwarder to: receive a first layer 3 routing protocol route advertisement that includes service function instance data for a second service function instance, the service function instance data indicating a service function type and a service identifier for the service function instance; receive a second layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items; and send, to the second service function instance and based at least on determining a service function item of the one or more service function items indicates the second service function instance, a packet classified to the service function chain.

GAP and GATT adaptation protocol over internet protocol

In a second group of embodiments, an electronic device that provides a virtual Bluetooth gateway is described. During operation, the electronic device may receive a first packet associated with a second electronic device and that has an Internet Protocol (IP)-compatible format (such as a JavaScript Object Notation or JSON format). Then, the electronic device may de-encapsulate a second packet from the first packet, where the second packet is compatible with a Bluetooth communication protocol. Next, the electronic may provide the second packet. Note that the electronic device may not include a physical Bluetooth radio, such as dedicated hardware for a physical Bluetooth radio. Instead, the electronic device may include a virtual Bluetooth device that communicates with the second electronic device via the virtual Bluetooth gateway. This virtual Bluetooth device may have the capabilities of a physical Bluetooth radio (without the dedicated hardware).

Datapath load distribution for a RIC
11704148 · 2023-07-18 · ·

To provide a low latency near RT RIC, some embodiments separate the RIC's functions into several different components that operate on different machines (e.g., execute on VMs or Pods) operating on the same host computer or different host computers. Some embodiments also provide high speed interfaces between these machines. Some or all of these interfaces operate in non-blocking, lockless manner in order to ensure that critical near RT RIC operations (e.g., datapath processes) are not delayed due to multiple requests causing one or more components to stall. In addition, each of these RIC components also has an internal architecture that is designed to operate in a non-blocking manner so that no one process of a component can block the operation of another process of the component. All of these low latency features allow the near RT RIC to serve as a high speed IO between the E2 nodes and the xApps.

DATA TRANSMISSION METHOD AND APPARATUS
20230016351 · 2023-01-19 · ·

A data transmission method and an apparatus are provided, to resolve a problem that network communication between a communications apparatus and an external network device cannot be ensured. A network protocol stack is deployed on both a wireless communications unit and a service processing unit, and the wireless communications unit is responsible for distribution. This can ensure processing of a network service and a throughput of a wireless network when a processing capability of the wireless communications unit is weak. The network protocol stack is deployed on the wireless communications unit. When the service processing unit is powered off, the wireless communications unit can still communicate with an external device, for example, remote wakeup.

Segment identifiers that support end-to-end segment routing with color extended community and border gateway protocol virtual private network option b

A first network device may receive an advertisement that includes a prefix for a second network device, wherein the advertisement is destined for a third network device. The first network device may determine, based on a network topology, whether a next hop is one hop away or multiple hops away. The first network device may selectively modify the advertisement to include a first segment identifier, based on the next hop being one hop away and to generate a first modified advertisement, or may modify the advertisement to include a second segment identifier, based on the next hop being multiple hops away and to generate a second modified advertisement. The first network device may forward the first modified advertisement or the second modified advertisement toward the third network device.

Uplink-aware monitoring of logical overlay tunnels

Example methods and systems for uplink-aware logical overlay tunnel monitoring are described. In one example, a first computer system may establish a logical overlay tunnel with a second computer system. The first computer system may generate and send, over the logical overlay tunnel via the first uplink, a first encapsulated monitoring packet identifying the first uplink. Based on a first reply, first performance metric information associated with the first uplink may be determined. The first computer system may generate and send, over the logical overlay tunnel via the second uplink, a second encapsulated monitoring packet identifying the second uplink. Based on a second reply, second performance metric information associated with the second uplink may be determined. Based on the first performance metric information and the second performance metric information, the first uplink or the second uplink may be selected to send encapsulated data packet(s) over the logical overlay tunnel.

Packet transmission method and device, and computer storage medium
11700148 · 2023-07-11 · ·

Provided are a packet transmission method and device and a computer storage medium. The method includes: a FlexE shim receives an Ethernet packet forwarded by a switching module and sent by a processor, the FlexE shim being located between a PHY layer and a MAC layer, and the switching module including a data link layer and a network layer; and the FlexE shim converts the Ethernet packet into a PPP packet, codes the PPP packet, and then inserts the PPP packet into a FlexE overhead of a target FlexE port for transmission.

METHODS AND SYSTEMS FOR TRANSMITTING SESSION-BASED PACKETS

The present invention discloses methods and systems for sending and receiving IP packets between network nodes through a tunnel. The tunnel is created according to a session. When the IP packet is a first of the IP packets in sequence of a session, establish a tunnel and send the IP packet through the tunnel of the session. When the IP packet is not the first of the IP packets in sequence of a session, sending the IP packet through the tunnel of the session.

Allocation of tokens for network packets based on application type
11700150 · 2023-07-11 · ·

Described herein are systems, methods, and software to manage the deployment and use of application identifier tokens in a distributed firewall environment. In one implementation, a computing environment generates tokens associated with application types executing on virtual nodes in the computing environment. After generating the tokens, the computing environment provides at least one token of the tokens to each of the virtual nodes based on at least one application type executing on the virtual node. When a communication is identified in the virtual node associated with an application, the virtual node may encapsulate the communication and a corresponding token in a packet and forward the packet via a virtual network interface associated with the virtual node.

Dynamic user private networks of a shared virtual network

In one embodiment, dynamic user private networks are virtually segmented within a shared virtual network. A network control system maintains the dynamic logical segmentation of the shared virtual network. User entities (e.g., user devices and/or services) are communicatively coupled to respective personal virtual networks via endpoints of access devices. Each of these endpoints is associated with a corresponding user private network. Responsive in real-time to automated processing of a received electronic particular user request, the network control system automatically modifies the dynamic logical segmentation of the shared virtual network to move a particular user entity on the shared virtual network to newly being on the first dynamic user private network without being disconnected from the shared virtual network. One embodiment uses different user private network identifiers (UPN-IDs) associated with endpoints and received packets to identify their respective user private network.