H04L41/122

NETWORK ENTITIES FOR SUPPORTING ANALYTICS GENERATION IN A MOBILE NETWORK
20220353145 · 2022-11-03 ·

Analytics information is generated in a new generation mobile network. A first network entity generates the analytics information, and a second network entity and a third network entity support the analytics generation. The first network entity is configured to obtain, from the second network entity or from one or more third network entities, past and/or current association information for an area of interest. Further, it is configured to provide analytics information based on the obtained association information for the area of interest. The past and/or current association information indicates one or more other network entities and/or network properties that, respectively, have been and/or are mapped to or serving the area of interest.

DYNAMIC PATH SELECTION AND DATA FLOW FORWARDING

Various techniques for dynamic path selection and data flow forwarding are disclosed. For example, various systems, processes, and computer program products for dynamic path selection and data flow forwarding are disclosed for providing dynamic path selection and data flow forwarding that can facilitate preserving/enforcing symmetry in data flows as disclosed with respect to various embodiments.

SCHEDULING METHOD APPLIED IN INDUSTRIAL HETEROGENEOUS NETWORK IN WHICH TSN AND NON-TSN ARE INTERCONNECTED

A scheduling method applied in an industrial heterogeneous network in which a TSN and a non-TSN are interconnected is provided. The TSSDN controller classifies data flows according to the delay requirements, and calculates the scheduling priorities of the data flows in the industrial heterogeneous network. The TSSDN controller adopts an improved CSPF algorithm to determine a shortest path in the heterogeneous network, and marks the scheduling priorities of the data flows which are transmitted from the subnet of the heterogeneous network and arrive at the switch for the first time. Flow table matching is performed at the SDN switch. In a case of performing flow table matching successfully, the counter is updated and the instruction included in the flow table is executed. In a case of performing flow table matching unsuccessfully, a PacketIn message is transmitted to the TSSDN controller, and the TSSDN controller performs analysis and makes a decision.

AUTOMATIC FORMATION OF A VIRTUAL CHASSIS USING ZERO TOUCH PROVISIONING
20230090356 · 2023-03-23 ·

A network device may obtain information concerning a virtual chassis that indicates that the network device and an additional network device are to be included in the virtual chassis. The network device may determine, based on the information concerning the virtual chassis, that the network device is connected to the additional network device, wherein the network device is connected to the additional network device via a link between a network interface of the network device and a network interface of the additional network device. The network device may cause the network interface of the network device to be converted to a virtual chassis interface and the network interface of the additional network device to be converted to a virtual chassis interface to enable the network device and the additional network device to be included in the virtual chassis to allow bootstrapping of the virtual chassis as a single logical device.

Network Capability Exposure Method and Device Thereof
20220353795 · 2022-11-03 ·

Disclosed is a network capability exposure method, which includes receiving a service request sent by a third-party device; determining a type of a network capability required according to the service request; determining a computing task matching the type of the network capability required; determining computing resources exposed by at least one physical device; obtaining a computing resource exposure result based on the computing task and the computing resources exposed by the at least one physical device; acquiring a network capability corresponding to the type of the network capability and the computing resource exposure result; and providing the network capability to the third-party device. Further, a network capability exposure device, a network capability exposure system and a non-transitory computer-readable storage medium are also disclosed.

FALLBACK SERVICE THROUGH A CLOUD EXCHANGE FOR NETWORK SERVICE PROVIDER CONNECTIONS

An example method includes receiving, from a customer system by a cloud exchange comprising processing circuitry, a request to communicatively couple a virtual gateway on network infrastructure of the cloud exchange to a network gateway communicatively coupled to a public network, the request including data indicating a public Internet Protocol (IP) address of the customer system, wherein the customer system is configured with a first connection communicatively coupling the customer system and the public network via a network service provider (NSP) that is separate from the cloud exchange; configuring, by the cloud exchange, a network route for a network gateway to the virtual gateway, the network gateway communicatively coupled to the public network; and providing, by the cloud exchange to the network gateway, routing information including the public IP address of the customer system to create a second connection communicatively coupling the customer system and the public network.

REINFORCEMENT LEARNING (RL) AND GRAPH NEURAL NETWORK (GNN)-BASED RESOURCE MANAGEMENT FOR WIRELESS ACCESS NETWORKS

A computing node to implement an RL management entity in an NG wireless network includes a NIC and processing circuitry coupled to the NIC. The processing circuitry is configured to generate a plurality of network measurements for a corresponding plurality of network functions. The functions are configured as a plurality of ML models forming a multi-level hierarchy. Control signaling from an ML model of the plurality is decoded, the ML model being at a predetermined level (e.g., a lowest level) in the hierarchy. The control signaling is responsive to a corresponding network measurement and at least second control signaling from a second ML model at a level that is higher than the predetermined level. A plurality of reward functions is generated for training the ML models, based on the control signaling from the MLO model at the predetermined level in the multi-level hierarchy.

SERVICE PROVISION METHOD, DEVICE, AND STORAGE MEDIUM
20220353151 · 2022-11-03 ·

Embodiments of the present disclosure provide a service provision method, a device, and a storage medium. In the embodiments of the present disclosure, a network management service user (such as a third-party server) can easily and quickly acquire a service related to a network management capability by performing capability exposure on a network management system in an operator network; further, in the process of exposing the network management capability, a permission access policy is added, so that the network management service user can only use a network management capability service with an access permission, which is favorable for reasonably exposing the network management service capability, so as to safely and efficiently provide the network management capability service, and improve the utilization efficiency of the network management capability in the operator network.

SERVICE PROVISION METHOD, DEVICE, AND STORAGE MEDIUM
20220353151 · 2022-11-03 ·

Embodiments of the present disclosure provide a service provision method, a device, and a storage medium. In the embodiments of the present disclosure, a network management service user (such as a third-party server) can easily and quickly acquire a service related to a network management capability by performing capability exposure on a network management system in an operator network; further, in the process of exposing the network management capability, a permission access policy is added, so that the network management service user can only use a network management capability service with an access permission, which is favorable for reasonably exposing the network management service capability, so as to safely and efficiently provide the network management capability service, and improve the utilization efficiency of the network management capability in the operator network.

ONBOARDING VIRTUALIZED NETWORK DEVICES TO CLOUD-BASED NETWORK ASSURANCE SYSTEM
20220346160 · 2022-10-27 ·

Techniques are described for onboarding virtualized network devices to a cloud-based WAN assurance system. For example, a virtualized network device receives, from a network device conductor that manages a plurality of network devices, a registration code for registering with the cloud-based WAN assurance system. In response to receiving the registration code and instructions, the network device sends the registration code to the cloud-based WAN assurance system. The cloud-based WAN assurance system verifies the network device based on the registration code, and assigns a distinct (e.g., unique) device identifier to the network device, and sends the distinct device identifier and a secret key to the network device. The network device uses the secret key to create a new secure connection with the cloud-based WAN assurance system, for streaming telemetry data to the WAN assurance system. The cloud-based WAN assurance system analyzes the network device telemetry data to provide WAN assurance.