H04L41/145

In-band management interface with user space datapath
11695591 · 2023-07-04 · ·

A method of utilizing the same hardware network interface card (NIC) in a gateway of a datacenter to communicate datacenter tenant packet traffic and packet traffic for a set of applications that execute in the user space of the gateway and utilize a network stack in the kernel space of the gateway. The method sends and receives packets for the datacenter tenant packet traffic through a packet datapath in the user space. The method sends incoming packets from the NIC to the set of applications through the datapath in the user space, a user-kernel transport driver connecting the kernel network stack to the datapath in the user space, and the kernel network stack. The method receives outgoing packets at the NIC from the set of applications through the kernel network stack, the user-kernel transport driver, and the data path in the user space.

System, method, and computer program for determining a network situation in a communication network

A system, method, and computer program product are provided for a determining a network situation in a communication network. In use, at least one threshold value of at least one operational parameter of a communication network is obtained, the at least one operational parameter representing at least one operational status of at least one of a computational device or a communication device. Additionally, log data of the communication network is obtained, the log data containing at least one value of the at least one operational parameter reported by at least one network entity of the communication network. The at least one value of the at least one operational parameter of the log data is compared with a corresponding threshold value of the at least one threshold value to form a detection of a network situation. Further, the detection of the network situation is reported if the at least one value of the at least one operational parameter of the log data traverses the corresponding threshold value of the at least one threshold value.

Generating candidate links and candidate paths before selecting links for an optimized optical network plan
11695631 · 2023-07-04 · ·

A device receives network data associated with a network that includes network devices interconnected by links, and receives parameters associated with determining a network plan for the network. The device generates candidate links for each potential network plan of multiple potential network plans for the network, based on the parameters and based on a criterion associated with generating the candidate links. The device generates candidate paths for each potential network plan based on the parameters, and selects a portion of the candidate links and a portion of the candidate paths. The device generates each potential network plan based on the portion of the candidate links and the portion of the candidate paths, and identifies a potential network plan, of the multiple potential network plans, that reduces resource usage associated with operating the network. The device causes the potential network plan to be implemented in the network.

Network capacity planning systems and methods
11695638 · 2023-07-04 · ·

A network capacity planning system for forecasting and scheduling of network capacity for electronic devices is provided. A server monitors usage of a network associated with the electronic devices. The server analyzes a frequency of a transmission of data packets between the electronic devices and the network, and a time duration of a network busy time based on predetermined thresholds. The server uses results of the analysis to drive a dynamic mechanism, which identifies when a bandwidth associated with the network needs to be upgraded to support the growing network bandwidth requirements. The server adjusts a network capacity value of a network routing device associated with the network to support the required bandwidth for an operation of the electronic devices.

Techniques for preventing concurrent execution of declarative infrastructure provisioners

Techniques for preventing concurrent execution of an infrastructure orchestration service are described. Worker nodes can receive instructions, or tasks, for deploying infrastructure resources and can provide heartbeat notifications to scheduler nodes, also considered a lease. A signing proxy can track the heartbeat notifications sent from the worker nodes to the scheduler node. The signing proxy can receive requests corresponding to a performance of the tasks assigned to the worker nodes. The signing proxy can determine whether the lease between each worker node and the scheduler is valid. If the lease is valid, the signing proxy may make a call to services on behalf of the worker node, and if the lease is not valid, the signing proxy may not make a call to services on behalf of the worker node. Instead, the signing proxy may cut off all outgoing network traffic, blocking access of the worker node to services.

Geographic routing based on 5G network slice availability
11696209 · 2023-07-04 · ·

Various arrangements for performing navigation based on characteristics of a cellular network are provided. A quality of experience (QoE) level required for a wireless service to be performed for a networked device may be determined. A current location and a destination for a vehicle may be determined. A wireless network coverage area map may be accessed that maps network performance characteristics for the cellular network across a geographic region. A navigation route from the current location to the destination based on the wireless network coverage area map and the determined QoE may be determined. The determined navigational route may be output to a navigation system.

Quantum computing in root cause analysis of 5G and subsequent generations of communication networks

Methods, systems, and apparatus for root cause analysis in a communication network. In one aspect, a method includes providing a quantum computer with data representing a topology of the communication network, the topology comprising a graph of vertices representing network devices and edges representing connections between network devices; receiving, from the quantum computer, data representing a first subset of network devices, wherein the first subset comprises a dominating set of vertices or a vertex cover for the graph; monitoring network devices in the first subset to generate alarm data representing triggered network device alarms; providing the alarm data to a quantum computer; receiving, from the quantum computer, data representing a second subset of network devices, wherein the second subset comprises a set cover for the alarm data and the network devices in the second subset comprise diagnosed sources of failures in the communication network.

Method and apparatus for offloading hardware to software package
11695626 · 2023-07-04 · ·

A method, performed by a server, of executing a software package in a wireless communication system includes: obtaining package usage information for each of a plurality of software packages with respect to user equipment's (UEs) accessing a plurality of base stations (BSs) connected to the server; determining a first hardware component (HC) set, including a plurality of HCs, for processing tasks operating in a first software package from among the plurality of software packages, based on the package usage information including a use for each of the plurality of HCs included in the first HC set and a respective usage amount for the plurality of HCs; generating a second software package that is allocated to the first HC set; migrating the tasks operating in the first software package to the second software package; and deleting the first software package.

Network feature tester
11696162 · 2023-07-04 · ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a network feature tester are disclosed. In one aspect, a method includes the actions of selecting computing devices that are configured to communicate with a wireless carrier network based on the computing devices having a common characteristic. The actions further include identifying a subset of the computing devices that are likely to communicate with a same base station of the wireless carrier network during a first period of time and a second period of time. The actions further include determining first monitoring data during the first period of time. The actions further include adjusting a characteristic of the same base station. The actions further include determining second monitoring data during the second period of time. The actions further include determining an effect that adjusting the characteristic has on the wireless carrier network.

Availability SLO-aware network optimization
11695651 · 2023-07-04 · ·

The subject matter described herein provides systems and techniques for a network planning and optimization tool that may allow for network capacity planning using key network failures for an arbitrary pair of network topology and demands. Performing network capacity planning with key network failures, instead of using other techniques, may avoid over-building the topology of a network. In particular, key network failures may be generated from the probabilistic failures, and the impact of these failures on a network may be computed. Expected flow availability SLO or a function thereof may be computed, using this information, and used by the tool to design a robust network. With an embedded flow availability calculation and updated risk framework, the capacitated cross-layer network topologies output by the tool may meet network demands/flows with their respective SLO type at the lowest cost.