H04L41/122

Virtual network layer for distributed systems
11546224 · 2023-01-03 · ·

Parameters associated with a distributed network are received. A topology of a virtual network that corresponds to the distributed network is generated in view of the received parameters. The topology of the virtual network is configured to simulate the distributed network and a simulation of the distributed network is executed using the configured virtual network.

User-defined virtual regions in a cloud provider network

Techniques are described for enabling users of a cloud provider network to define and use custom “virtual regions” comprised of selected sets of cloud provider network infrastructure locations. A cloud provider network enables users to obtain information about available infrastructure locations and to identify locations that satisfy a set of performance characteristics and other parameters. Once a set of desirable infrastructure locations have been identified, users can request the creation of a virtual region to be associated with their user account, where the request specifies a set of infrastructure locations to comprise the virtual region. Once a virtual region is created, users can cause computing resources to be launched into or otherwise associated with the virtual region in a manner similar to the use of existing regions and availability zones.

NETWORK OPERATION METHOD, APPARATUS, AND DEVICE AND STORAGE MEDIUM
20220417112 · 2022-12-29 ·

Provided are a network operation method and apparatus, a device, and a storage medium. The network operation method includes that a management node receives virtualized network function information carrying at least one dynamic network change flag, where the at least one dynamic network change flag is used for indicating whether a dynamic network change is supported; and that the management node operates on a first-type network according to the virtualized network function information.

AUTOMATIC VERIFICATION OF SAFETY FOR VIRTUALIZED NETWORKS

Described are examples for providing a system for managing configuration and policies for a virtualized wide area network (vWAN) support on a wide area network (WAN). The vWAN includes a plurality of virtual network entities associated with geographic locations including the physical computing resources of the WAN and virtual connections between the virtual network entities. The system includes a network safety component for managing configurations and policies of the vWAN on the WAN. The network safety component receives a change to a policy or configuration of the vWAN from an operator of a network connected to the vWAN. The network safety component evaluates a set of safety rules for the operator based on the change and a network state of a physical WAN underlying the vWAN. The network safety component generates an error message in response to at least one of the set of safety rules failing the evaluation.

Discovering and grouping application endpoints in a network environment

An example method for discovering and grouping application endpoints in a network environment is provided and includes discovering endpoints communicating in a network environment, calculating affinity between the discovered endpoints, and grouping the endpoints into separate endpoint groups (EPGs) according to the calculated affinity, each EPG comprising a logical grouping of similar endpoints for applying common forwarding and policy logic according to logical application boundaries. In specific embodiments, the affinity includes a weighted average of network affinity, compute affinity and user specified affinity.

Automatic formation of a virtual chassis using zero touch provisioning

A network device may obtain information concerning a virtual chassis that indicates that the network device and an additional network device are to be included in the virtual chassis. The network device may determine, based on the information concerning the virtual chassis, that the network device is connected to the additional network device, wherein the network device is connected to the additional network device via a link between a network interface of the network device and a network interface of the additional network device. The network device may cause the network interface of the network device to be converted to a virtual chassis interface and the network interface of the additional network device to be converted to a virtual chassis interface to enable the network device and the additional network device to be included in the virtual chassis to allow bootstrapping of the virtual chassis as a single logical device.

Building system with dynamic configuration of network resources for 5G networks

A building network system of a building including one or more processing circuits configured to generate virtual networks, each virtual network of the virtual networks generated for one building equipment group of building equipment groups and deploy the virtual networks on network infrastructure of the building. The one or more processing circuits are configured to generate updates to the virtual networks to address resource changes in at least one of the building equipment groups and deploy the updates to the virtual networks.

Network performance spread service

A method, a device, and a non-transitory storage medium are described in which a network performance spread service is provided. The service may include generating a dependency graph representative of a network and identifying current or prospective poor performance spread of network elements based on correlations between the network elements and performance data. The service may also include providing remedial services that address the poor performance spread in the network.

Discovery Service in a Software Defined Control System
20220404788 · 2022-12-22 ·

A software defined (SD) process control system (SDCS) includes a method executed by a discovery service for inferring information regarding a physical or logical asset of a process plant. The method includes obtaining an announcement indicative of a presence of a physical or logical asset of the process plant. The method also includes obtaining, from a context dictionary, one or more parameters retrievable from the physical or logical asset or one or more services associated with the physical or logical asset that were not indicated in the announcement. Furthermore, the method includes storing a record of the discovered physical or logical asset in a discovered item data store. The record includes an indication of the identity of the physical or logical asset and the one or more parameters or one or more services associated with the physical or logical asset that were not indicated in the announcement.

Generating User-Specific Polygraphs For Network Activity

Generating user-specific polygraphs for network activity, including: gathering information describing network activity associated with a user and generating, based on the information, a user-specific polygraph that includes one or more destinations associated with the network activity.