H04L41/0894

METHOD AND APPARATUS FOR PROVIDING PLURALITY OF VIRTUAL NETWORKS FOR SINGLE APPLICATION IN MOBILE COMMUNICATION NETWORK
20230037685 · 2023-02-09 ·

The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The support of a virtual network group according to an embodiment of the present disclosure enables efficient communication of a terminal by using an external network, configured via an existing short-range communication network, or a private network between terminals based on 5G. Accordingly, a network operator or an entity in charge thereof enables terminals to interwork with equipment through communication via a virtual private network without changes in an existing communication method or a network structure, or without adding additional equipment.

ORCHESTRATION OF OVERLAY PATHS FOR WIDE AREA NETWORK VIRTUALIZATION

The present application relates to traffic routing for overlay paths in a public cloud network. A path orchestrator receives a configuration of a set of overlay paths for a wide area network virtualization from a client, each overlay path including virtual routing nodes associated with respective geographic regions and at least one policy for a link between the virtual routing nodes. The path orchestrator is configured to instantiate a plurality of virtual routers on computing resources of the public cloud network located within the respective geographic regions based on the configuration, each virtual router configured to route traffic according to the policy for each link associated with the virtual routing node corresponding to the virtual router. The path orchestrator is configured to scale the plurality of virtual routers based on traffic for the client on the set of overlay paths.

Scalable Event Driven Auto-Diagnosis System

A method for scalable event driven auto-diagnosis systems includes obtaining a data packet configured for transmission across a network from a source address to a destination address. The method includes obtaining a list of changes to the network. The method also includes analyzing, based on a network model, the data packet using a plurality of analyzers. The method includes correlating the list of changes to the network and the analysis of the data packet. The method further includes determining, based on the correlation between the list of changes to the network and the analysis of the data packet, a configuration status of the network. The method also includes reporting the configuration status to a user.

Network node memory utilization analysis

Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to query a node in the network fabric for a number of hardware level entries, stored in memory for the node, that are associated with a concrete level network rule. The network assurance appliance may identify a logical level network intent associated with the concrete level network rule, identify a logical level component of the logical level network intent, and attribute the number of hardware level entries to the logical level component.

Apparatus and method for network automation in wireless communication system

Disclosed is a 5.sup.th generation (5G) or a pre-5G communication system provided to support a higher data transmission rate than that of post-4.sup.th generation (4G) communication systems, such as long term evolution (LTE). A method of operating a network node in a wireless communication system is provided. The method includes receiving, from a plurality of first network nodes, network data, generating first recommendation operation information for a second network node based on the network data, and transmitting, to the second network node, a first analysis result message including the first recommendation operation information.

Tracking image senders on client devices
11557016 · 2023-01-17 ·

Methods and systems for tracking image senders using client devices are described herein. A computing system may receive an image containing a first watermark vector corresponding to a user account of an image sender. The computing system may convert the image to a frequency domain image that contains the first watermark vector. From the frequency domain image, the computing system may identify the first watermark vector. The computing system may compare the first watermark vector to each of a plurality of stored watermark vectors, each corresponding to a known user account, to determine a probability of a match. The computing system may determine the user account of the sender of the image by determining which of the plurality of stored watermark vectors has a highest probability of a match, and may send, to a workplace administrator platform, an indication of the user account.

Systems and methods for managing networks for improved device connectivity

A network device for maintaining a communication network is provided. The network device includes a transceiver configured for operable communication with at least one device. The network device also includes a processor including a memory configured to store computer-executable instructions. When executed by the processor the instructions cause the network device to store a plurality of network capabilities associated with a plurality of connectivity categories and a plurality of network settings, receive, from a first device, a connectivity advertisement including at least one connectivity category for the first device, retrieve a subset of the plurality of network capabilities based on the at least one connectivity category, determine one or more network settings for the network device based on the at least one connectivity category for the first device and the subset of network capabilities, and implement the one or more network setting on the network device.

IoT device identification with packet flow behavior machine learning model
11552975 · 2023-01-10 · ·

Identifying Internet of Things (IoT) devices with packet flow behavior including by using machine learning models is disclosed. Information associated with a network communication of an IoT device is received. A determination of whether the IoT device has previously been classified is made. In response to determining that the IoT device has not previously been classified, a determination is made that a probability match for the IoT device against a behavior signature exceeds a threshold. Based at least in part on the probability match, a classification of the IoT device is provided to a security appliance configured to apply a policy to the IoT device.

DYNAMIC WIRELESS NETWORK THROUGHPUT ADJUSTMENT
20230038198 · 2023-02-09 ·

Dynamic wireless network throughput adjustment is provided herein. A method can include determining, by a system comprising a processor, a sector of a communication network for which an amount of congestion present in the sector is greater than a congestion threshold; selecting, by the system from among respective network equipment operating in the sector, target network equipment for throughput adjustment based on equipment performance metrics respectively associated with the respective network equipment; and facilitating, by the system, adjusting a throughput of the target network equipment by an adjustment amount determined based on target equipment performance metrics, of the equipment performance metrics, associated with the target network equipment.

Data source driven expected network policy control
11595372 · 2023-02-28 · ·

Techniques for data source driven expected network policy control are described. A policy enforcement service receives, from a compute instance in a virtual network implemented within a service provider system, a request to access data. The policy enforcement service determines that a virtual network security condition of a policy statement is not satisfied. The policy statement was configured by a user for use in controlling access to the data. The virtual network security condition defines a condition of the virtual network that is to be met. The policy enforcement service performs one or more security actions in response to the determination that the virtual network security condition of the policy statement is not satisfied.