H04L41/40

NETWORK SLICE SELECTION METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM

A network slice selection method includes, in response to an update in configuration information of a user of a media service, determining first information indicating updated configuration information of the user of the media service. The first information indicates an updated selection of a first network slice from at least two network slices. The method further includes transmitting, by the media service, the first information to an entity of a 5G Core network.

SLICE AUTHENTICATION METHOD AND APPARATUS
20230048066 · 2023-02-16 ·

This application provides a slice authentication method and an apparatus. One example method includes: initiating, by a first network function (NF), slice authentication between a terminal device and an authentication server for a slice; sending, by the first NF, identification information of a first network, identification information of the slice, and identification information of the terminal device to the authentication server, wherein the first NF is an NF in the first network; and receiving, by the first NF, a slice authentication result for the slice, the identification information of the slice, and the identification information of the terminal device from the authentication server.

SYSTEMS AND METHODS FOR PERFORMANCE-AWARE CONTROLLER NODE SELECTION IN HIGH AVAILABILITY CONTAINERIZED ENVIRONMENT

Embodiments described herein provide for an election procedure, in a high availability (“HA”) environment, for a backup controller to assume operations performed by a master controller in the event that the master controller becomes unreachable. The master controller may be associated with (e.g., provisioned on) the same set of hardware as one or more worker nodes, and may control operation of the one or more worker nodes. The election procedure may be performed based on performance metrics, location, or efficiency metrics associated with candidate backup controllers (e.g., cloud-based backup controllers), including performance of communications between particular backup controllers and the one or more worker nodes.

METHODS AND SYSTEMS FOR AF CONTROL OF NETWORK SLICE QUOTA

The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Embodiments herein disclose methods and systems of how an application function can request the Fifth Generation (5G) core network to perform a specific action, when a network slice quota reaches a maximum limit or when the behavior of the UE(s) falls outside the expected communication behavior.

Network monitoring system, network monitoring method, and program

In the present disclosure, a network monitoring system is provided including an IP network monitoring unit (610) that monitors an IP network to which an IP device is connected; and a non-IP device monitoring unit (630) that monitors a non-IP device. It is possible to monitor both the IP network and the non-IP device in a system that includes the IP network including the IP device and the non-IP device.

Hybrid clouds

Systems and methods may create and manage hybrid clouds including both standard compute nodes and edge devices. Edge devices can be enrolled in a hybrid cloud by deploying a lightweight container to the edge device.

Service chaining of virtual network functions in a cloud computing system

An example method of provisioning a network service in a cloud computing system includes: defining, at an orchestrator, the network service to include a plurality of network functions; defining, at the orchestrator, network connectivity among the plurality of network functions; identifying a plurality of vendor device managers (VDMs) configured to provision virtual network functions that implement the plurality of network functions; and instructing, by the orchestrator, the VDMs to deploy the virtual network functions having the defined network connectivity.

Service chaining of virtual network functions in a cloud computing system

An example method of provisioning a network service in a cloud computing system includes: defining, at an orchestrator, the network service to include a plurality of network functions; defining, at the orchestrator, network connectivity among the plurality of network functions; identifying a plurality of vendor device managers (VDMs) configured to provision virtual network functions that implement the plurality of network functions; and instructing, by the orchestrator, the VDMs to deploy the virtual network functions having the defined network connectivity.

State transitions for a set of services

Examples herein relate to developing an orchestration plan. Examples disclose the development of a representation of a set of services wherein each service relates to other services via different types of relationships. The examples apply a set of dependency rules for each type of relationship at each service within the set of services such that the application of the set of dependency rules creates inter-service dependencies between state transitions of the set of services. Based on the creation of the inter-service dependencies, the orchestration plan is developed which includes a sequenced order of the state transitions for the set of services.

Real-time scalable virtual session and network analytics

Provided herein are systems and methods for providing insights or metrics in connection with provisioning applications and/or desktop sessions to end-users. Network devices (e.g., appliances, intermediary devices, gateways, proxy devices or middle-boxes) can gather insights such as network-level statistics. Additional insights (e.g., metadata and metrics) associated with virtual applications and virtual desktops can be gathered to provide administrators with comprehensive end-to-end real-time and/or historical reports of performance and end-user experience (UX) insights. Insights relating to an application or desktop session can be used to determine and/or improve the overall health of the infrastructure of the session, Citrix Virtual Apps and Desktops, the applications (e.g., remote desktop application) being delivered using the infrastructure, and/or the corresponding user experience.