H04L41/0895

Conflict resolution in network virtualization scenarios

There are provided measures for conflict resolution in a network virtualization scenario, wherein a virtualized network function is utilized by a first virtualized network service managed by a first network component and a second virtualized network service managed by a second network component. The measures comprise requesting, by the first network component, an alteration of the virtualized network function, transmitting information indicative of the alteration of the virtualized network function to the second network component, and determining when the alteration of the virtualized network function impacts the second virtualized network service.

System and method for license management of virtual appliances in a computing system

System and computer-implemented method for license management of virtual appliances in a computing system uses an activated virtual appliance in the computing system to forward an activation license from a license server on behalf of an unactivated virtual appliance in the computing system.

Causality determination of upgrade regressions via comparisons of telemetry data

Disclosed herein is a system for automating the causality detection process when upgrades are deployed to different resources that provide a service. The resources can include physical and/or virtual resources (e.g., processing, storage, and/or networking resources) that are divided into different, geographically dispersed, resource units. To determine whether a root cause of a problem is associated with an upgrade event that has recently been deployed, a system is configured to use telemetry data to compute an upgrade-to-upgrade score that represents differences between two different upgrade events that are deployed to the same resource unit. The system is further configured to use telemetry data to compute an upgrade unit-to-unit score that represents differences between the same upgrade event being deployed to two different resource units. The scores can be used to output an alert, for an analyst, that signals whether a recently deployed upgrade event is the cause of a problem.

Network scale emulator

Systems, methods, and computer-readable media for scaling a source network. A system may be configured to receive a network configuration for a source network, wherein the source network comprising a plurality of nodes, receive and a scale target for a scaled network, and identify, based on the scale target, one or more selected nodes in the plurality of nodes in the source network for implementing in the scaled network. The system may further be configured to reconfigure data plane parameters and control plane parameters for each node in the one or more selected nodes.

Security mechanisms for data plane extensions of provider network services
11569997 · 2023-01-31 · ·

A connectivity enablement device includes one or more processors, one or more memories and a hardware input port. The memories store program instructions that when executed examine a token obtained from a token transfer device inserted into the port, and cause one or more messages to be transmitted to a virtualized computing service. The messages indicate (a) the connectivity enablement device, (b) the token transfer device, (c) the token's source and (d) a server. An indication that the server has been configured within an isolated virtual network is obtained at the connectivity enablement device.

Dynamic content delivery network selection using DNS

Techniques for dynamic content delivery network (CDN) selection using the domain name service (DNS) protocol are described. A DNS resolver utilizes a network identifier provided within a DNS query seeking to resolve a domain to select between different CDNs. The selection can be based on an analysis of network metric summary data corresponding to the CDNs from the perspective of an approximate location of the requesting client, as determined via the network identifier as a proxy. The selection process and involved network metric types can be configured by the user associated with the domain via a selection policy. Network metrics can be provided by the user or collected based on reported data generated by remote clients through provided metric-generating code, and thereafter transformed into network metric summary data that is used for resolution.

VNF INSTANTIATION METHOD AND APPARATUS
20230024067 · 2023-01-26 ·

This application provides a VNF instantiation method and apparatus, applied to various NFV systems, to implement an existing VNFD model—defined VNF. The method includes: An NFVO obtains a VNFD, where the VNFD is for instantiating a VNF, the VNFD includes first indication information and resource requirement information of a first internal network, and the first indication information indicates that the resource requirement information of the first internal network is externally visible. Then, the NFVO sends an external network instantiation request to a VIM, where the external network instantiation request is used by the VIM to instantiate, based on the resource requirement information of the first internal network, an external network connected to the VNF. Then, the NFVO sends a VNF instantiation request to a VNFM. The VNF instantiation request is used by the VNFM to instantiate the VNF based on the VNFD.

VNF INSTANTIATION METHOD AND APPARATUS
20230024067 · 2023-01-26 ·

This application provides a VNF instantiation method and apparatus, applied to various NFV systems, to implement an existing VNFD model—defined VNF. The method includes: An NFVO obtains a VNFD, where the VNFD is for instantiating a VNF, the VNFD includes first indication information and resource requirement information of a first internal network, and the first indication information indicates that the resource requirement information of the first internal network is externally visible. Then, the NFVO sends an external network instantiation request to a VIM, where the external network instantiation request is used by the VIM to instantiate, based on the resource requirement information of the first internal network, an external network connected to the VNF. Then, the NFVO sends a VNF instantiation request to a VNFM. The VNF instantiation request is used by the VNFM to instantiate the VNF based on the VNFD.

SYSTEMS AND METHODS FOR DETECTION OF DEGRADATION OF A VIRTUAL DESKTOP ENVIRONMENT

Described embodiments provide systems and methods for detection of the degradation of a virtual desktop environment. A computing device may receive data from a plurality of client devices. The computing device may identify a subset of client devices from the plurality of client devices with at least one characteristic in common based on the received data. The computing device may determine a ratio of the identified subset of client devices, the ratio being a comparison of client devices of the subset with a value above a first threshold to a total number of client devices of the subset, and the value being indicative of a characteristic of performance for that client device. The computing device may identify a cause of an anomaly in the performance of the application based on the ratio exceeding a second threshold.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING UPDATED NETWORK SLICE INFORMATION TO A NETWORK SLICE SELECTION FUNCTION (NSSF)
20230025799 · 2023-01-26 ·

A method for providing updated network slice information to a network slice selection function (NSSF includes registering, by a network slice management function (NSMF) with a network function (NF) repository function (NRF), an NF profile corresponding to the NSMF and subscribing, by the NSMF with the NRF, for status updates corresponding to NF instances belonging to network slice instances created by the NSMF. The method further includes receiving, by the NSMF from the NRF, a notification message including one or more network traffic load level updates related to at least one of the NF instances, processing the one or more network traffic load level updates to generate network slice instance configuration information for at least one of the network slice instances, and providing, by the NSMF, the network slice instance configuration information to a NSSF managing the at least one of the network slice instances.