H04L45/026

Method for Configuring Service Node, Service Node Pool Registrars, and System
20230054562 · 2023-02-23 ·

A method for configuring a service node, a service node pool registrar, and a system are provided. In certain embodiments, the method includes receiving a service node query request sent by a management configuration device. The service node query request includes a service requirement. The service requirement is from a user or caused by a network change. The method further includes searching a service node database, to obtain service node information that matches the service node query request. The method further includes sending the matching service node information to the management configuration device, causing the management configuration device to perform network and service configuration on the matching service node according to network topology information that has been obtained and the matching service node information.

Managing outage detections and reporting

Systems and methods are disclosed for detecting node outages in a mesh network. A tracking node in the mesh network detects a set of signals originating from a tracked node in the mesh network. The set of signals includes beacons or communication messages transmitted by the tracked node. The tracking node determines that a threshold number of the beacon intervals have passed since receiving the most recent signal from the tracked node. The tracking node performs outage validation based on data received from another node in the mesh network and updates the status of the tracked node. Based on the updated status, the tracking node outputs a ping to the tracked node requesting a response to the ping. When the response to the ping is not received from the tracked node, the tracking node transmits an outage alarm message to a next topologically higher layer of the mesh network.

Adaptive private network (APN) bandwidth enhancements

Techniques are described to automatically activate and deactivate standby backup paths in response to changing bandwidth requirements in an adaptive private network (APN). The APN includes one or more regular active wide area network (WAN) links in an active mode and an on-demand WAN link in a standby mode. The on-demand WAN link is activated to supplement the conduit bandwidth when an available bandwidth of the conduit falls below a pre-specified trigger bandwidth threshold and the conduit bandwidth usage exceeds a usage threshold of a bandwidth of the conduit that is being supplied by the active paths (BWc). The on-demand WAN link is deactivated to standby mode when an available bandwidth of the conduit is above the pre-specified trigger bandwidth threshold and the conduit bandwidth usage drops below the usage threshold of BWc techniques for adaptive and active bandwidth testing of WAN links in an APN are also described.

Transparent session migration between user plane functions

Systems, devices, and techniques described herein relate to migrating a communication session from a path including a stressed user plane function (UPF) to a path including a replacement UPF. A communication session may traverse a first path including the first UPF. After establishing the communication session, the first UPF may be determined to be stressed. In response, the communication session can be proactively migrated to a second path including a second UPF. According to various implementations, the existing communication session can be maintained during the migration, thereby substantially eliminating interruptions caused by the stressed first UPF.

Transparent Session Migration Between User Plane Functions

Systems, devices, and techniques described herein relate to migrating a communication session from a path including a stressed user plane function (UPF) to a path including a replacement UPF. A communication session may traverse a first path including the first UPF. After establishing the communication session, the first UPF may be determined to be stressed. In response, the communication session can be proactively migrated to a second path including a second UPF. According to various implementations, the existing communication session can be maintained during the migration, thereby substantially eliminating interruptions caused by the stressed first UPF.

ULTRA-RELIABLE AND LOW LATENCY COMMUNICATIONS LOCAL BREAKOUT METHOD AND SYSTEM FOR NEXT GENERATION RADIO ACCESS NETWORK
20220345361 · 2022-10-27 ·

An ultra-reliable and low latency communications local breakout (URLLC-LBO) method and a URLLC-LBO method for a next generation radio access network (NG-RAN) are provided. The method includes: configuring a core network to establish a packet data unit (PDU) session between first user equipment (UE) and the core network; configuring the first UE to establish a URLLC service; configuring a near real-time RAN intelligent controller (near-RT RIC) to establish an F1-LBO routing process to set an LBO dedicated radio bearer (DRB) for the local URLLC service; configuring an F1-LBO virtual network function (VNF) module according to a traffic rule by the F1-LBO routing process, to establish a routing table through the F1-LBO VNF module, in which the routing table defines a relationship between a first location and a second location of the LBO DRB.

Container routing algorithm using OSPF

Systems and methods for establishing routing information between software containers or other virtualized environments within a network, and providing inter-container routing between the software services operating on the network, are disclosed herein. The system utilizes an existing routing protocol such as Open Shortest Path First (OSPF) and establishes an overlay network that provides end-to-end connectivity between services of a customer operating in an Infrastructure as a Service (IaaS) network, while maintaining isolation from the traffic of other customers of the IaaS network. The system uses OSPF to learn aspects of the routes between containers in the network, and further builds a customer-specific overlay network based on IP-to-IP encapsulation of the OSPF messages.

NODE CONFIGURATION AND SELF-HEALING FOR AD HOC NETWORKS
20230105352 · 2023-04-06 ·

A network includes at least one node to communicate with at least one other node via a wireless network protocol. The node includes a network configuration module to periodically switch a current node function of the node between an intermediate node function and a leaf node function. The switch of the current node function enables automatic reconfiguration of the wireless network based on detected communications between the at least one node and at least one intermediate node or at least one leaf node via the wireless network protocol.

Simulation-based cross-cloud connectivity checks

Example methods and systems are provided for simulation-based cross-cloud connectivity checks. One example method may include injecting a connectivity check packet in a first cloud environment, and obtaining first report information associated with a first stage of forwarding the connectivity check packet from one or more first observation points in the first cloud environment. The method may also comprise: based on configuration information associated with one or more second observation points in the second cloud environment, simulating a second stage of forwarding the connectivity check packet towards a second virtualized computing instance via the one or more second observation points. The method may further comprise: generating second report information associated with the simulated second stage to identify a connectivity status between a first virtualized computing instance and the second virtualized computing instance based on the first report information and the second report information.

Transport protocol for latency sensitive applications

The described technology is generally directed towards a transport protocol for latency sensitive applications. The disclosed transport protocol is “semi-reliable” in that it allows for specification of an importance of data being transmitted, thereby allowing important data to be sent reliably, while other data can be dropped if necessary, e.g., under bad network conditions. A deadline can be specified for such other data, and if the other data cannot be sent prior to the deadline, it can be dropped. Furthermore, the disclosed transport protocol can allow for early discovery of network jitter. A client device can send regular acknowledgments which identify most recently received data packets as well as a number of “heartbeat transmissions” received at the client device. A server device can use the acknowledgments to discover and respond to jitter.