Patent classifications
H04L43/08
Network Performance Monitoring Method, Network Device, and Storage Medium
This application provides a network performance monitoring method, a network device, and a storage medium, and belongs to the field of network technologies. In this application, a forwarding plane samples network performance data based on a fine-grained time periodicity, and records a quantity of network performance exceptions; and a control plane generates, based on a coarse-grained time periodicity, an alarm when the quantity of network performance exceptions recorded by the forwarding plane is greater than a threshold. On a basis of meeting a fine-grained requirement on network performance monitoring, because the control plane does not need to report all the collected network performance data, a volume of data that needs to be reported by the control plane is greatly reduced. This resolves a problem of overload of a main control CPU that is caused by massive data reporting, and reduces dependency of the network performance monitoring on performance of the main control CPU of a device. This further resolves a problem that a large quantity of bandwidth resources are occupied due to the massive data reporting, reduces dependency of the network performance monitoring on the bandwidth resources, and helps meet a requirement for deploying a large quantity of performance monitoring nodes in a live network.
IN-SITU FLOW DETECTION-BASED PACKET PROCESSING METHOD AND APPARATUS
Embodiments of this application describe an in-situ flow detection-based packet processing method. After receiving a first packet encapsulated by using a first bearer protocol, a first node may obtain, based on the first packet, a second packet encapsulated by using a second bearer protocol. A first packet header of the first packet includes first in-situ flow detection information, and a packet header of the second packet also includes the first in-situ flow detection information. It can be learned that, when re-encapsulating the first packet by using the second bearer protocol, the first node does not remove the first in-situ flow detection information, but adds the first in-situ flow detection information to the packet encapsulated by using the second bearer protocol. Therefore, even if the first bearer protocol and the second bearer protocol are deployed in a detection domain, the first in-situ flow detection information is not removed due to re-encapsulation of the packet, and may be transmitted across the entire detection domain.
IN-SITU FLOW DETECTION-BASED PACKET PROCESSING METHOD AND APPARATUS
Embodiments of this application describe an in-situ flow detection-based packet processing method. After receiving a first packet encapsulated by using a first bearer protocol, a first node may obtain, based on the first packet, a second packet encapsulated by using a second bearer protocol. A first packet header of the first packet includes first in-situ flow detection information, and a packet header of the second packet also includes the first in-situ flow detection information. It can be learned that, when re-encapsulating the first packet by using the second bearer protocol, the first node does not remove the first in-situ flow detection information, but adds the first in-situ flow detection information to the packet encapsulated by using the second bearer protocol. Therefore, even if the first bearer protocol and the second bearer protocol are deployed in a detection domain, the first in-situ flow detection information is not removed due to re-encapsulation of the packet, and may be transmitted across the entire detection domain.
AUTOMATED MONITORING OF INFRASTRUCTURE AND APPLICATION ON CLOUD
Disclosed herein are system, method, and computer program product embodiments for determining monitoring compliance for an enterprise application deployed on an application delivery platform. Existing resources, monitors and alerts are discovered with gaps in monitoring being calculated based on a comparison of monitoring objectives and the existing monitors and alerts. Gaps in monitoring are reported in a GUI reflecting effectiveness of existing monitors.
Method and apparatus for low latency transmissions
A resource assignment can be received. A first set of time-frequency resources in a subframe can be determined from the resource assignment. A second set of time-frequency resources in the subframe can be determined. The second set of time-frequency resources can be used for a second latency data transmission. The second set of time-frequency resources can overlap with at least a portion of the first set of time-frequency resources. A first latency data transmission in the subframe can be decoded based on the determined first and second set of time-frequency resources. The first latency transmission can have a longer latency than the second latency transmission.
Method and apparatus for low latency transmissions
A resource assignment can be received. A first set of time-frequency resources in a subframe can be determined from the resource assignment. A second set of time-frequency resources in the subframe can be determined. The second set of time-frequency resources can be used for a second latency data transmission. The second set of time-frequency resources can overlap with at least a portion of the first set of time-frequency resources. A first latency data transmission in the subframe can be decoded based on the determined first and second set of time-frequency resources. The first latency transmission can have a longer latency than the second latency transmission.
Apparatus and method for network automation in wireless communication system
Disclosed is a 5.sup.th generation (5G) or a pre-5G communication system provided to support a higher data transmission rate than that of post-4.sup.th generation (4G) communication systems, such as long term evolution (LTE). A method of operating a network node in a wireless communication system is provided. The method includes receiving, from a plurality of first network nodes, network data, generating first recommendation operation information for a second network node based on the network data, and transmitting, to the second network node, a first analysis result message including the first recommendation operation information.
Method and apparatus for renewing subscription for network data analysis in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The disclosure provides a method for renewing a subscription for network data collection and analysis in a wireless communication system.
Method and apparatus for renewing subscription for network data analysis in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The disclosure provides a method for renewing a subscription for network data collection and analysis in a wireless communication system.
Monitoring and managing of complex multi-role applications
A bundled application includes a plurality of entities such as logical storage volumes, application instances, pods, clusters, and computing nodes that are dependent on one another. Dependencies of the bundled application on individual entities is determined and quantified. Impact of failure of an entity may be determined using the dependencies. Dependency may be determined with reference to redundancy among entities. Usage of an entity by other entities and potential redistribution may be determined.