Patent classifications
H04L12/46
Unified data repository (UDR) messaging in a wireless communication network
In a wireless communication network, a Unified Data Repository (UDR) is served by a UDR Message Function (UMF). The UMF receives a UDR message that relates to a User Equipment (UE) for delivery to a network function. The UMF writes the current UDR message to a UDR message queue for the UE. The UMF determines when the UDR message queue stores multiple UDR messages that relate to the UE. When the current UDR message is the only message in the message queue for the UE, the UMF transfers the current UDR message to the destination network function. When the message queue for the UE stores multiple UDR messages for the UE, the UMF stops message transfer from the queue and prioritizes the UDR messages in the message queue. The UMF restarts message transfer from the queue and transfers the UDR messages to the network functions based on the prioritization. The UDR message queue stores the UDR messages under control of the UMF.
Customer data handling in a proxy infrastructure
Systems and methods herein provide for a proxy infrastructure. In the proxy infrastructure, a network element (e.g., a supernode) is connected with a plurality of exit nodes. At one of a plurality of messenger units of the proxy infrastructure, a proxy protocol request is received directly from a client computing device. The proxy protocol request specifies a request and a target. In response the proxy protocol request, a selection is made between one between one of the plurality of exit nodes. A message with the request is sent from the messenger to the supernode connected with the selected exit node. Finally, the message is sent from the supernode to the selected exit node to forward the request to the target.
Identifying an ingress router of a flow in inter-AS VPN option-C networks with visibility in one AS
Systems and methods include detecting whether a monitored network has a unique configuration; responsive to the unique configuration, determining an ingress point for flow samples; and utilizing the determined ingress point for the flow samples to generate a traffic report for the monitored network. The unique configuration is an inter-Autonomous System (AS) option-C Virtual Private Network (VPN) network where control and data planes are asymmetric. The approach provides traffic projection based on the flow samples with the asymmetric flows.
Switch fabric for a data center network having virtual machines
A fabric for container virtual machines (CM) has cross fabric spine switches coupled to spine switches, each spine switch coupled to has a leaf switches, each leaf switch coupled to servers hosting CVM processes. Each of the leaf switches has an uplink port coupled to a spine switch leaf port configured in a mesh. The spine switches have a plurality of uplink ports for coupling to a plurality of cross fabric spine (CFS) ports into a mesh. The cross fabric spine switches keep a CF-NHCIB table of entries containing capabilities, and also a CF-FIB slice table which maintains entries for assignment of CVMs to new spine switches, such as GTID range, MAC Range, IP range associated with a spine port and spine address (MAC and/or IP) for transferring packets through the fabric.
Dynamic service chaining and late binding
A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.
Systems and methods for securely using cloud services on on-premises data
The present disclosure relates to systems and methods for providing cloud-based services securely to on-premises networks or other infrastructure. More particularly, the present disclosure relates to systems and methods for enriching first-party data (e.g., data collected directly by an on-premises server) stored within on-premises networks by enabling the on-premises networks to retrieve and process third-party data stored on cloud-based networks. As a technical benefit, cloud-based services can be performed on the first-party data within the on-premises networks.
Composable edge device platforms
Techniques discussed herein relate to providing composable edge devices. In some embodiments, a user request specifying a set of services to be executed at a cloud-computing edge device may be received by a computing device operated by a cloud computing provider. A manifest may be generated in accordance with the user request. The manifest may specify a configuration for the cloud-computing edge device. Another request can be received specifying the same or a different set of services to be executed at another edge device. Another manifest which specifies the configuration for that edge device may be generated and subsequently used to provision the request set of services on that device. In this manner, manifests can be used to compose the platform to be utilized at any given edge device.
Multi-VPN multi link traffic routing
A system, method, and computer-readable medium for performing a traffic routing operation. The traffic routing operation includes: establishing a plurality of virtual private network (VPN) connections within an information handling system; obtaining a configuration policy for each of the plurality of VPN connections, the configuration policy for each of the plurality of VPN connections comprising an indication of at least one type of supported link of a plurality of links; configuring a plurality of queues for packets being communicated via the plurality of virtual private network connections, the plurality of queues being greater than the plurality of VPN connections; creating a tunnel indication for each of the plurality of VPN connections; mapping the tunnel indication for each of the plurality of VP connections to a respective queue of the plurality of queues; and, mapping each queue of the plurality of queues to a link of a particular VPN connection.
TECHNIQUE FOR DETERMINING WHETHER TO REESTABLISH FAST REROUTED PRIMARY TUNNELS BASED ON BACKUP TUNNEL PATH QUALITY FEEDBACK
In one embodiment, a primary tunnel is established from a head-end node to a destination along a path including one or more protected network elements for which a fast reroute path is available to pass traffic around the one or more network elements in the event of their failure. A first path quality measures path quality prior to failure of the one or more protected network elements. A second path quality measures path quality subsequent to failure of the one or more protected network elements, while the fast reroute path is being used to pass traffic of the primary tunnel. A determination is made whether to reestablish the primary tunnel over a new path that does not include the one or more failed protected network elements, or to continue to utilize the path with the fast reroute path, in response to a difference between the first path quality and the second path quality.
Elasticity in a Virtualised Network
A method (400) for providing support for elasticity within a domain of a multi-domain network. The method comprises receiving (401) information for a requested virtual link forming part of an end-to-end path across the multi-domain network; wherein the information of the virtual link comprises a service parameter and an elasticity parameter. The method further comprises selecting (402) a physical path (150) corresponding to the virtual link on which to send traffic. The physical path is selected based on a service parameter and an elasticity parameter of the physical path.