Patent classifications
H04L41/122
Rerouting Method and Apparatus, Electronic Device, and Computer Readable Medium
Provided is a rerouting method. The method includes: updating network slice information based on service information of an affected service, wherein the service information includes service bandwidth resources, and the network slice information is information of one or more network slices obtained by dividing a topology of an original network; obtaining a network slice index of the affected service based on the service information of the affected service and the updated network slice information, wherein the network slice index is a correspondence between the affected service and the network slice; and determining a new route for the affected service based on the affected service and the network slice index. The rerouting method has the advantages of short time consumption, high efficiency and high success rate when performing rerouting. A rerouting apparatus, an electronic device, and a computer readable medium are also provided.
IuGW architecture with RTP localization
A method for localizing a voice call is disclosed, comprising: receiving an originating leg setup message for an originating leg bearer from the first base station for a first user equipment (UE); creating a first call correlation identifier and storing the first call correlation identifier in association with the first UE; extracting a second call correlation identifier from a terminating leg setup message for a terminating leg bearer received from the core network; determining a real time protocol (RTP) localization status for the originating leg bearer and the terminating leg bearer based on matching the second call correlation identifier of the terminating leg against the stored first call correlation identifier of the originating leg; and sending transport layer assignment messages to the first base station to redirect RTP packets from the first UE to the second UE via the terminating leg bearer without the RTP packets transiting the core network.
Service chaining with physical network functions and virtualized network functions
Techniques are described in which a centralized controller, such as a software defined networking (SDN) controller, constructs a service chain that includes a physical network function (PNF) between a bare metal server (BMS) and a virtual execution element (e.g., virtual machine or container), or in some instances a remote BMS, or vice-versa. In accordance with the techniques disclosed herein, the controller may construct an inter-network service chain that includes PNFs, or a combination of PNFs and virtualized network functions (VNFs). The controller may construct an inter-network service chain to steer traffic between a BMS and a virtual execution element or remote BMS through an inter-network service chain using Virtual Extensible Local Area Network (VXLAN) as an underlying transport technology through the service chain.
Failure notification system, failure notification method, failure notification device, and failure notification program
A failure notification system includes a logical configuration provider which provides logical configurations in which a plurality of types of hardware are virtualized, a processor using logical configurations provided from the logical configuration provider, and a failure notifier which notifies the processor 3 of a failure in the logical configuration provider. A notifier includes a storage device 10 which stores hardware configuration data in which an ID of the hardware is associated with an ID of a logical configuration corresponding to the hardware, a logical configuration identifier which identifies a logical configuration corresponding to hardware from which a failure is detected from the hardware configuration data when a failure in the hardware is detected, and a notifier which notifies the processor of occurrence of a failure in the logical configuration identified by the logical configuration identifier.
Location-based virtualization workload placement
In some examples, a method includes: receiving, with a computer virtualization scheduler, network locality information for virtualization equipment; receiving, with the computer virtualization scheduler, network utilization information for virtualization equipment; and determining, with the computer virtualization scheduler and based on the received network locality information and the received network utilization information, virtualization workload placement in order to maximize available network bandwidth and minimize network latency between virtualization equipment.
Network function NF management method and NF management device
In a network function (NF) management method, a NF management device receives an NF discovery request sent by a first NF component, where the NF discovery request includes a second NF identifier that indicates a second NF. The NF management device obtains component information of a second NF component based on the second NF identifier, where the second NF component has the second NF, and the component information includes a discovery policy of the second NF component and a second NF component identifier. The NF management device determines, based on the discovery policy in the component information, that the first NF component can access the second NF component, and sends the second NF component identifier to the first NF component.
System and method for fine grained service management using SDN-NFV networks
A system and method are described that provide user-controlled Quality of Experience (QoE) in a network of resources. QoE or service parameter profiles of an SDN-NPV network are mapped to options for user selection using a QoE selector knob. The user selects the desired QoE or service parameter profile from the available options and the SDN-NPV network configuration is implemented that corresponds to the desired QoE or service parameter profile.
Discovery of database and related services
A computing system includes a database and a discovery application. The discovery application obtains credentials for accessing a server hosting a software bus application which connects a plurality of applications within a managed network. The discovery application selects, based on a pattern corresponding to the software bus application, one or more files to access, transmits, to the server, instructions to access the one or more files, and receives therefrom data identifying a plurality of attributes of the software bus application. Based on this data, the discovery application transmits, to the server, instructions to identify communicative connections established between the plurality of software applications by way of the software bus application and receives therefrom data identifying the communicative connections. Based on (i) the plurality of attributes and (ii) the communicative connections, the discovery application generates a mapping that represents the communicative connections and stores the mapping in the database.
SCALING HOST POLICY VIA DISTRIBUTION
Techniques are disclosed for processing data packets and implementing policies in a software defined network (SDN) of a virtual computing environment. At least two SDN appliances are configured to disaggregate enforcement of policies of the SDN from hosts of the virtual computing environment. The hosts are implemented on servers communicatively coupled to network interfaces of the SDN appliance. The servers host a plurality of virtual machines. The servers are communicatively coupled to network interfaces of at least two top-of-rack switches (ToRs). The SDN appliance comprises a plurality of smart network interface cards (sNICs) configured to implement functionality of the SDN appliance. The sNICs have a floating network interface configured to provide a virtual port connection to an endpoint within a virtual network of the virtual computing environment.
Automated provisioning and configuration for dynamically loaded NFV- and SDN-based networks
A network controller for a mesh network of routers in a communication system. The network controller automatically monitors the mesh network; determines to add one or more new software-based routers to the mesh network; provisions one or more programmable resources to be the one or more new software-based routers in the mesh network; and configures the one or more new software-based router to support one or more new paths through the mesh network. In some implementations, the controller automatically accesses one or more corresponding OEM libraries to retrieve one or more configuration protocols for the one or more programmable resources and uses the one or more retrieved configuration protocols to provision the one or more programmable resources using NFV and SDN technologies and configure the one or more new software-based routers. The controller may also automatically decommission one or more existing software-based routers from the network when appropriate.