Patent classifications
H04L41/122
Probe-triggered full device state capture, export, and correlation
A method comprising: at a management entity configured to communicate with a network: upon detecting a performance problem on a network path in the network, generating a trigger probe having a correlation identifier, the trigger probe configured to transit the network path and, on one or more designated network nodes of the network path, trigger (i) capturing a full device state, including a control plane state and a data plane state, and (ii) exporting a report of the full device state with the correlation identifier; sending the trigger probe along the network path; receiving, from each of the one or more designated network nodes, the report that includes the correlation identifier and the full device state; and correlating each report to the performance problem based on the correlation identifier in each report, to diagnose a root cause of the performance problem using the full device state in each report.
METHOD AND APPARATUS FOR USING A NETWORK INFORMATION BASE TO CONTROL A PLURALITY OF SHARED NETWORK INFRASTRUCTURE SWITCHING ELEMENTS
A network control system that includes several controllers for managing several switching elements. Each controller includes a network information base (NIB) storage that stores data regarding the switching elements and a secondary storage for facilitating replication of at least a portion of data across the NIB storages of the different controllers. In some embodiments, the primary purpose for one or more of the secondary storage structures is to back up the data in the NIB. In these or other embodiments, one or more of the secondary storage structures serve a purpose other than backing up the data in the NIB. In some embodiments, the NIB is stored in system memory while the system operates for fast access of the NIB records. In some embodiments, one or more of the secondary storage structures are stored on disks which can be slower to access.
RETRIEVING AND PROVISIONING ENTITIES BASED ON INHERITANCE
Systems and methods are provided for deriving, based on a service for which an entity is to be selected or provisioned, a query to determine, from candidate nodes, one or more node instances within a topology that fulfill one or more criteria provided by one or more classes; and an additional criterion. The candidate nodes represent respective entities. The evaluation of the query includes determining the classes that satisfy or fulfill the one or more criteria, determining one or more second classes that match, or inherit from, the one or more classes, partially evaluating the additional criterion within respective contexts of the candidate nodes and each of the one or more second classes, based on the partial evaluation, processing the query to determine the node instances, and provisioning or presenting an entity represented by a node instance of the node instances to the service.
METHOD AND APPARATUS FOR CORE NETWORK RESPONSE TO PREDICTABLE SATELLITE BACKHAUL OUTAGES
For a communication network using a satellite-involved backhaul, the backhaul outage and restoration states are predicted based on satellite motion data. Based on such predictions, devices providing the core portion of the communication network, and nearby Internet or backhaul radio devices can schedule or take actions. Actions can include but are not necessarily limited to: powering equipment up or down, suspending communications, migrating software from servers being powered down, transmitting replies to packets to indicate an anticipated outage and optionally anticipated outage end time, marking packets with congestion indications, closing or reopening certain ports, withdrawing or reinstating routing table addresses, and transmitting outage notifications to users or devices.
Method and system for real-time modeling of communication, virtualization and transaction execution related topological aspects of monitored software applications and hardware entities
A system and method for real-time discovery and monitoring of multidimensional topology models describing structural aspects of applications and of computing infrastructure used to execute those applications is disclosed. Different types of agents are deployed to the monitored application execution infrastructure dedicated to capture specific topological aspects of the monitored system. Virtualization agents detect and monitor the virtualization structure of virtualized hardware used in the execution infrastructure, operating system agents deployed to individual operating systems monitor resource utilization, performance and communication of processes executed by the operating system and transaction agents deployed to processes participating in the execution of transactions, providing end-to-end transaction trace and monitoring data describing individual transaction executions. The monitoring and tracing data of the deployed agents contains correlation data that allows to create a topology model of the monitored system that integrates transaction execution, process execution and communication and virtualization related aspects.
DYNAMIC CONSTRUCTION OF VIRTUAL DEDICATED NETWORK SLICE BASED ON SOFTWARE-DEFINED NETWORK
Disclosed are a network control device and an operation method of the network control device for dynamically constructing an end-to-end virtual dedicated network slice based on a software-defined network (SDN) over the entire wired and wireless network section of a private network and a public network.
OPPORTUNISTIC PLACEMENT OF COMPUTE IN AN EDGE NETWORK
Various systems and methods for providing opportunistic placement of compute in an edge network are described herein. A node in an edge network may be configured to access a service level agreement related to a workload, the workload to be orchestrated for a user equipment by the node; modify a machine learning model based on the service level agreement; implement the machine learning model to identify resource requirements to execute the workload in a manner to satisfy the service level agreement; initiate resource assignments from a resource provider, the resource assignments to satisfy the resource requirements; construct a resource hierarchy from the resource assignments; initiate execution of the workload using resources from the resource hierarchy; and monitor and adapt execution of the workload based on the resource hierarchy in response to the execution of the workload.
Methods, devices, and systems for managing a federated network slice
Methods (700,800,900), devices (12,20,30,40), and systems (500,540,560,570,600) for managing a federated network slice (602) providing an extension of one or more virtual network functions (620) from a first network domain (502,608) to a second network domain (504,610). One method (700), by a second orchestration manager (20,512) of the second network domain (504,610), includes accessing (702) a first virtual network function management component (514,562) for extension of the one or more virtual network functions (620) from the first network domain (502,608) to the second network domain (504,610). The method (700) further includes initiating registration (704) of the first virtual network function management component (514,562) with a look-up service (518) to generate a first association between a first name of the first virtual network function management component and a first location of the first virtual network function management component in the second network domain (504,610). The method (700) further includes initiating transmission (706) to the first network domain (502,608) of the first name of the first virtual network function management component (514,562).
Identifying mismatches between a logical model and node implementation
Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to obtain reference concrete level rules for a node in the network, obtain implemented concrete level rules for the node from the node in the network, compare the reference concrete level rules with the implemented concrete level rules, and determining that the implemented concrete level rules are not appropriately configured based on the comparison.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR RECYCLING BACKGROUND TRAFFIC IN A TEST ENVIRONMENT
Methods, systems, and computer readable media for recycling background traffic in a test environment are disclosed. One example method occurs at a test system implemented using at least one processor, the method comprising: generating background packets usable as background traffic in a data center switching fabric used in delivering test traffic to a system under test (SUT); sending, from a first packet source of the test system and via the data center switching fabric, the background packets toward a first packet destination of the test system; receiving, by the first packet destination, at least some of the background packets; and resending, from a re-entry packet source of the test system and via the data center switching fabric, at least one received background packet toward the first packet destination or a second packet destination.