H04L41/0896

Bandwidth part switching for dual active protocol stack handover

Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a base station may configure a bandwidth part (BWP) switching configuration of a user equipment in connection with a dual active protocol stack (DAPS) handover based at least in part on a BWP switching rule; and perform the DAPS handover. Numerous other aspects are provided.

Proactive tunnel configuration computation for on-demand SD-WAN tunnels

This disclosure describes techniques are described for proactively computing configuration information for policy-driven on-demand tunnel creation and deletion between sites in a software-defined networking in wide area network (SD-WAN) environment. In some examples, a controller device is configured to precompute configuration data for an overlay tunnel through the wide area network to connect a first site and a second site of a plurality of sites in the SD-WAN environment. The controller device is further configured to obtain, after precomputing the configuration data, an indication to configure the overlay tunnel. The controller device is also configured to send, in response to receiving the indication to configure the overlay tunnel, at least some of the configuration data to the first site to configure the first site with the overlay tunnel.

Methods, systems, and computer readable media for optimizing network bandwidth utilization through intelligent updating of network function (NF) profiles with NF repository function

A method for optimizing network bandwidth utilization through intelligent updating of network function (NF) profiles includes, at an NF repository function (NRF), receiving, from a first NF that previously communicated with a failed geo-redundant mate of the NRF as primary, an NF heart-beat request message. The method further includes locating an NF profile for the first NF in an NF profiles database maintained by the NRF. The method further includes computing an NF profile data modification detection value for the NF profile. The method further includes transmitting the NF profile data modification detection value to the first NF.

Methods, systems, and computer readable media for optimizing network bandwidth utilization through intelligent updating of network function (NF) profiles with NF repository function

A method for optimizing network bandwidth utilization through intelligent updating of network function (NF) profiles includes, at an NF repository function (NRF), receiving, from a first NF that previously communicated with a failed geo-redundant mate of the NRF as primary, an NF heart-beat request message. The method further includes locating an NF profile for the first NF in an NF profiles database maintained by the NRF. The method further includes computing an NF profile data modification detection value for the NF profile. The method further includes transmitting the NF profile data modification detection value to the first NF.

Activity-based resource allocation among virtual-computing sessions

Dynamically controlling use of a shared computing resource by virtual-computing sessions of a client computing device includes storing per-virtual-channel weights representing contributions of session virtual channels to performance, the stored weights including sets of weights for respective distinct application types. A resource allocation operation includes (i) for each session, selecting a set of weights based on a type of application using the session and applying the selected set of weights to activity state data to produce a session activity value, the activity state data representing activity states of the session virtual channels, and (ii) generating resource usage control signals based on the session activity values of the sessions, the resource usage control signals representing a target pattern of use of the shared computing resource by the sessions. An enforcement operation uses the resource usage control signals to establish the target pattern of use of the shared resource by the sessions.

Activity-based resource allocation among virtual-computing sessions

Dynamically controlling use of a shared computing resource by virtual-computing sessions of a client computing device includes storing per-virtual-channel weights representing contributions of session virtual channels to performance, the stored weights including sets of weights for respective distinct application types. A resource allocation operation includes (i) for each session, selecting a set of weights based on a type of application using the session and applying the selected set of weights to activity state data to produce a session activity value, the activity state data representing activity states of the session virtual channels, and (ii) generating resource usage control signals based on the session activity values of the sessions, the resource usage control signals representing a target pattern of use of the shared computing resource by the sessions. An enforcement operation uses the resource usage control signals to establish the target pattern of use of the shared resource by the sessions.

Information processing method, computer-readable recording medium storing information processing program, information processing apparatus, and information processing system

An information processing method executed by a computer includes: specifying one or a plurality of first physical resources on which virtual resources used by a first user operate; specifying a device connected to the first physical resource and one or a plurality of second physical resources different from the first physical resource, which is connected to the device and on which virtual resources used by a user other than the first user operate; and outputting information that indicates the first physical resource and information that indicates the second physical resource.

Auto switching for enterprise federated network slice

A method in which an enterprise switches its devices to various federated network slices across operators based on cost, time, quality, and/or availability parameters defined in flexible rules managed by the enterprise. The method includes obtaining, by a controller of an enterprise, one or more parameters of a device served by a network slice of a core network. The method further includes, based on the one or more parameters of the device and one or more rules, determining, by the controller, whether a triggering event associated with a slice reselection occurred and based on the triggering event and the one or more rules, selecting, by the controller, a federated network slice from among a plurality of network slices provided by a plurality of core networks. The method further includes the controller causing the device to switch from the network slice to the federated network slice.

Auto switching for enterprise federated network slice

A method in which an enterprise switches its devices to various federated network slices across operators based on cost, time, quality, and/or availability parameters defined in flexible rules managed by the enterprise. The method includes obtaining, by a controller of an enterprise, one or more parameters of a device served by a network slice of a core network. The method further includes, based on the one or more parameters of the device and one or more rules, determining, by the controller, whether a triggering event associated with a slice reselection occurred and based on the triggering event and the one or more rules, selecting, by the controller, a federated network slice from among a plurality of network slices provided by a plurality of core networks. The method further includes the controller causing the device to switch from the network slice to the federated network slice.

DEVICE, METHOD AND PROGRAM FOR GENERATING NETWORK TOPOLOGIES

It is an objective of the present disclosure to reduce computational complexity for obtaining a network topology configuration capable of efficiently accommodating a plurality of traffic demands assumed between nodes present in a network.

A device of the present disclosure includes: a computation traffic generation unit that creates a traffic demand matrix whose elements are values individually obtained by demands between nodes present in a target network area from a plurality of traffic demand matrices created based on predicted traffic demands between the nodes; and a network topology generation unit that generates a network topology based on the traffic demand matrix generated by the computation traffic generation unit and port information of the nodes in the network area.