H04L45/302

ROOT-CAUSING USER EXPERIENCE ANOMALIES TO COORDINATE REACTIVE POLICIES IN APPLICATION-AWARE ROUTING

In one embodiment, a device obtains user experience metrics for a plurality of sessions with an online application. The device detects a plurality of anomalies from among the user experience metrics. The device determines, based on a correlation between the plurality of anomalies, that a particular path entity is a root cause of the plurality of anomalies. The particular path entity comprises an egress service provider or data center of the online application. The device provides an indication of the particular path entity being the root cause of the plurality of anomalies.

ROOT-CAUSING USER EXPERIENCE ANOMALIES TO COORDINATE REACTIVE POLICIES IN APPLICATION-AWARE ROUTING

In one embodiment, a device obtains user experience metrics for a plurality of sessions with an online application. The device detects a plurality of anomalies from among the user experience metrics. The device determines, based on a correlation between the plurality of anomalies, that a particular path entity is a root cause of the plurality of anomalies. The particular path entity comprises an egress service provider or data center of the online application. The device provides an indication of the particular path entity being the root cause of the plurality of anomalies.

CONDITIONAL ROUTING DELIVERY IN A COMPROMISED NETWORK

A computer-implemented method for processing a data packet in a network node includes determining a level of deterioration of a primary path between the network node and the destination node. The determined level of deterioration is based at least on a non-congestion-related loss for a primary link associated with one or more subsequent hops of the data packet from the network node toward the destination node along the primary path. Based on the determined level of deterioration of the primary path being above a threshold, the primary path is changed to an alternate path from the network node to the destination node. The data packet is forwarded to a next network node on the alternate path.

CONDITIONAL ROUTING DELIVERY IN A COMPROMISED NETWORK

A computer-implemented method for processing a data packet in a network node includes determining a level of deterioration of a primary path between the network node and the destination node. The determined level of deterioration is based at least on a non-congestion-related loss for a primary link associated with one or more subsequent hops of the data packet from the network node toward the destination node along the primary path. Based on the determined level of deterioration of the primary path being above a threshold, the primary path is changed to an alternate path from the network node to the destination node. The data packet is forwarded to a next network node on the alternate path.

Systems, apparatuses and methods for network packet management

Methods and systems are provided for latency-oriented router. An incoming packet is received on a first interface. The type of the incoming packet is determined. Upon the detection that the incoming packet belongs to latency-critical traffic, the incoming packet is duplicated into one or more copies. Subsequently, the duplicated copies are sent to a second interface in a delayed fashion where the duplicated copies are spread over a time period. The duplicated copies are received and processed at the second interface.

Systems, apparatuses and methods for network packet management

Methods and systems are provided for latency-oriented router. An incoming packet is received on a first interface. The type of the incoming packet is determined. Upon the detection that the incoming packet belongs to latency-critical traffic, the incoming packet is duplicated into one or more copies. Subsequently, the duplicated copies are sent to a second interface in a delayed fashion where the duplicated copies are spread over a time period. The duplicated copies are received and processed at the second interface.

SYSTEMS AND METHODS FOR SELECTING TUNNELS FOR TRANSMITTING APPLICATION TRAFFIC BY AN SD-WAN APPLICATION

Systems and methods for selecting tunnels for transmitting application traffic by an SD-WAN application include a software-defined wide area network (SD-WAN) application executing on a client device establishing a connection between the SD-WAN application and one or more applications. The SD-WAN application maintains a plurality of tunnels between the SD-WAN application and respective tunnel destinations. The SD-WAN application receives application traffic from an application of the one or more applications. The SD-WAN application selects, based on the application traffic, a respective tunnel of the plurality of tunnels via which to transmit the application traffic of the application. The SD-WAN application transmits the application traffic via the selected tunnel.

Content based routing method and apparatus

Embodiments of the present disclosure provide a content based routing method and apparatus. The method may include: judging, in response to receiving a service request, whether the service request matches a preset shunt rule, the preset shunt rule including a request content and a request context; and forwarding, in response to judging that the service request matches the preset shunt rule, the service request to a service cluster corresponding to the preset shunt rule matching the preset service request.

SECURE DATA TRANSFER REQUEST ROUTING FOR PEER-TO-PEER SERVICES

A device configured to receive a data transfer initiation request from a first user and to identify a user profile that is associated with a first user identifier for the first user. The device is further configured to obtain an account number and a routing number for the first user from the user profile. The device is further configured to obtain routing instructions for a service provider based on a service provider identifier. The device is further configured to generate a data transfer request that includes the account number for the first user, the routing number for the first user, a second user identifier for a second user, a data type identifier, and a data transfer type identifier. The device is further configured to send the data transfer request to the service provider in accordance with the routing instructions for the service provider.

SYSTEMS AND METHODS FOR APPLICATION-ANONYMOUS SLICE SELECTION IN A WIRELESS NETWORK

A system described herein may maintain information associating one or more tokens to one or more network slices associated with a network. The system may receive a request, from an application executing at a User Equipment (“UE”), for communication session information, where the request includes a particular token. The system may identify a particular network slice associated with the particular token based on the information associating the one or more tokens to the one or more network slices. The system may receive communication session information, associated with the particular network slice, from the network, and may provide the communication session information to the application. The application may use the communication session information to communicate with the network via the particular network slice. The application may use such communication session information without providing an application identifier to the network.