H04L41/122

Topology-aware control information dissemination in software-defined networking environments

Example methods and systems for a network management entity to perform topology-aware control information dissemination in a software-defined networking (SDN) environment. The method may comprise obtaining group topology information specifying a network group, and a network configuration object that references the network group. The method may also comprise: processing the group topology information to identify, from multiple members of the network group, a first member that is relevant to a first host; and processing the group topology information to identify, from the multiple members, a second member that is irrelevant to the first host. The method may further comprise: generating and sending, to the first host, control information associated with a subset of the network group. The subset may include the first member but exclude the second member.

System for collecting computer network entity information employing abstract models
20220337620 · 2022-10-20 ·

An entity tracking system and method for a computer network employs proactive data collection and enrichment driven by configurable rules and workflows responsive to the discovery of new entities, changes to existing entities, and specifics about the entities' attributes. The data collection is used in conjunction with graph technologies to map interactions and relationships between various entities interacting in the computer environment and deduce interactions and relationships between the entities. The method and system provides for abstract entity types and collation nodes.

SDN network system, controller, and controlling method
11637755 · 2023-04-25 · ·

A software defined network (SDN) system, controller, and controlling method, where the SDN system includes at least one N.sup.th level controller and at least two (N+1).sup.th level controllers belonging to the N.sup.th level controller, where the (N+1).sup.th level controller is configured to receive a first message sent by a node belonging to the (N+1).sup.th level controller, and when the first message is a cross-domain message according to status information of each node that is managed by the (N+1).sup.th level controller, forward the first message to the N.sup.th level controller to which the (N+1).sup.th level controller belongs, and the N.sup.th level controller receives the first message, and perform decision processing according to status information of the (N+1).sup.th level controller that is managed by and belongs to the N.sup.th level controller and status information of boundary nodes of the (N+1).sup.th level controller belonging to the N.sup.th level controller.

Data transmission method and related apparatus
11477078 · 2022-10-18 · ·

A data transmission method includes receiving a service request sent by a terminal device. The method also includes determining, based on the service request, a target transmission path of service data corresponding to the service request and a change policy corresponding to the target transmission path. The method further includes changing, according to the change policy, a current content delivery network (CDN) to a target CDN. The target CDN includes a plurality of serving nodes corresponding to the target transmission path. The method additionally includes sending an indication message to a first serving node in the target CDN to indicate the first serving node to send the service data to the terminal device through the target transmission path; or sending an indication message to a second serving node in the target CDN to indicate the second serving node to send the service data to the terminal device.

Service providing apparatus and method

A service provision method according to one aspect of the present invention includes providing, to a user terminal (107), a catalog including: a first node type for defining a node relating to a VNW (102); a first relationship type for defining a relationship between nodes relating to the VNW (102); a second node type for defining a node relating to an LNW (104); and a second relationship type for defining a relationship between nodes relating to the LNW (104); receiving, from the user terminal (107), a service request generated in accordance with the catalog for requesting a service that uses the HNW (110); and controlling a VNW OpS (103) and an LNW OpS (105) in response to the received service request.

Gamified network security training using dedicated virtual environments simulating a deployed network topology of network security products

Systems and methods are described for providing training to attendees of a network security training session through use of gamification. A virtual environment is created containing a network topology simulating a deployed network of network security devices for which teams of the attendees are to receive training. A 3D game interface is presented on a display of a computer system of an attendee. Based on a leaderboard server's game state, a problem-solving objective for the training session is presented on the display. The virtual environment facilitates interactions by the attendee with the network security devices via real web interfaces of corresponding full-feature virtual network security appliances in connection with attempts by the attendee to complete the objectives. Upon completion of an objective, the leaderboard server's game state is updated. Based on the game state of a group of objectives a second group of problem-solving objectives is presented to the attendee.

Systems and methods to deploy cloud-native microservices for communication services on scale

A method for bundling network functions as a single microservice in a cloud environment. A service deployment manager may acquire subscriber location information associated with a subscriber or a subscriber profile associated with the subscriber. Moreover, the service deployment manager may utilize the subscriber location information or the subscriber profile to select a cloud location. For example, the cloud location may be based on load, geographical proximity, service profile, etc.

System, method and computer program for ingesting, processing, storing, and searching technology asset data
11475013 · 2022-10-18 · ·

A system, method and computer program for handling inbound events on a technology network may include ingesting an inbound event from a connector, interfacing with one of different technology systems on the technology network, extracting a data element or a technology asset from the inbound event, and searching a database storing a new or existing inventory of technology assets in the technology network with respect to the data element or the technology asset. When the technology asset is extracted, a relationship between the technology asset and a record in the database is created. When the data element is extracted, a match between the data element and a record in the database is determined. When the match equals or exceeds a first predetermined threshold, the record in the database is enriched. When the match is less than a second predetermined threshold, a new technology asset in the database is created.

Systems and methods for exposing network slices for third party applications

A system includes one or more devices. The devices are configured to: receive a message indicating that a network slice has been deployed in a network, wherein the message includes information related to the network slice; send the information to an application that provides services to User Equipment (UE) devices subscribed to the network; and initiate updates to UE route selection policies (URSPs) in the network based on the information, allowing communications from UE devices to reach the network slice.

Detecting deployment problems of containerized applications in a multiple-cluster environment
11477090 · 2022-10-18 · ·

A request to identify a status of a containerized application that includes a plurality of resources and that has been deployed to at least some clusters of a plurality of different clusters is received. A placement rule is accessed that identifies a first set of clusters of the plurality of different clusters onto which, at a point in time of the accessing, the containerized application is expected as being deployed. Application deployment information is accessed that identifies a second set of clusters onto which the containerized application has been deployed. Based on the placement rule and the application deployment information, user interface imagery is generated that includes information that identifies a set of the plurality of resources of the containerized application and that identifies whether the first set of clusters is the same as the second set of clusters. The user interface imagery is presented on a display device.