H04L45/306

METHOD AND DEVICE FOR FORWARDING PRIORITY TAG ACROSS NETWORK SEGMENTS
20230021886 · 2023-01-26 ·

The present disclosure provides a method and device for forwarding a priority tag across network segments. The method includes the following steps: performing networking by using a Virtual Local Area Network (VLAN) interface to form a network; enabling a VLAN Class Of Service (COS) and differentiated service code point in a priority tag of a message transmitted in the network to correspond to each other; in response to layer-3 forwarding of the message, using the differentiated service code point priority tag for the message, and copying a VLAN COS value of the message at an entry of a switch to a VLAN COS value of the message at an exit; and in response to subsequent layer-2 forwarding of the message, using the VLAN COS priority tag for the message to distinguish a priority of the message.

METHOD AND APPARATUS FOR SELECTING USER PLANE FUNCTION

The present application relates to a method and apparatus for selecting user plane function. One embodiment of the subject disclosure provides a method for selecting User Plane Function (UPF), comprising: getting, by a Session Management Function (SMF), application information in a Protocol Data Unit (PDU) session during a PDU Session Establishment procedure or during Domain Name System (DNS) Query processing; and selecting, by the SMF, the UPF based on the application information.

COMMUNICATION METHOD AND APPARATUS
20230026697 · 2023-01-26 ·

This application discloses a communication method and apparatus. A first AMF device receives a first request message, where the first request message includes an identifier of a first network slice that a terminal requests to access and an identifier of a tracking area in which the terminal is located. When the first AMF device determines that the tracking area supports the first network slice, the first AMF device sends a response message, where the response message includes a first radio access selection priority index corresponding to the first network slice. The first radio access selection priority index is for selection of an access network device that supports the first network slice at the terminal. Even if an access network device currently accessed by the terminal does not support the first network slice, the terminal may re-access the access network device that supports the first network slice.

SYSTEMS AND METHODS FOR SELECTING TUNNELS FOR TRANSMITTING APPLICATION TRAFFIC BY AN SD-WAN APPLICATION

Systems and methods for selecting tunnels for transmitting application traffic by an SD-WAN application include a software-defined wide area network (SD-WAN) application executing on a client device establishing a connection between the SD-WAN application and one or more applications. The SD-WAN application maintains a plurality of tunnels between the SD-WAN application and respective tunnel destinations. The SD-WAN application receives application traffic from an application of the one or more applications. The SD-WAN application selects, based on the application traffic, a respective tunnel of the plurality of tunnels via which to transmit the application traffic of the application. The SD-WAN application transmits the application traffic via the selected tunnel.

Content based routing method and apparatus

Embodiments of the present disclosure provide a content based routing method and apparatus. The method may include: judging, in response to receiving a service request, whether the service request matches a preset shunt rule, the preset shunt rule including a request content and a request context; and forwarding, in response to judging that the service request matches the preset shunt rule, the service request to a service cluster corresponding to the preset shunt rule matching the preset service request.

SYSTEMS AND METHODS FOR APPLICATION-ANONYMOUS SLICE SELECTION IN A WIRELESS NETWORK

A system described herein may maintain information associating one or more tokens to one or more network slices associated with a network. The system may receive a request, from an application executing at a User Equipment (“UE”), for communication session information, where the request includes a particular token. The system may identify a particular network slice associated with the particular token based on the information associating the one or more tokens to the one or more network slices. The system may receive communication session information, associated with the particular network slice, from the network, and may provide the communication session information to the application. The application may use the communication session information to communicate with the network via the particular network slice. The application may use such communication session information without providing an application identifier to the network.

Secure application for accessing web resources

Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for providing a remote cloud browsing session. A remote cloud browsing session may receive a request for Internet content from a user device, access the Internet content from an Internet content source, and transmit second Internet content to the user device based on the requested Internet content.

Datapath for multiple tenants

A novel design of a gateway that handles traffic in and out of a network by using a datapath pipeline is provided. The datapath pipeline includes multiple stages for performing various data-plane packet-processing operations at the edge of the network. The processing stages include centralized routing stages and distributed routing stages. The processing stages can include service-providing stages such as NAT and firewall. The gateway caches the result previous packet operations and reapplies the result to subsequent packets that meet certain criteria. For packets that do not have applicable or valid result from previous packet processing operations, the gateway datapath daemon executes the pipelined packet processing stages and records a set of data from each stage of the pipeline and synthesizes those data into a cache entry for subsequent packets.

Distributing service function chain data and service function instance data in a network

In some examples, a computing device comprises a first service function instance to apply a service function and a service function forwarder to: receive a first layer 3 routing protocol route advertisement that includes service function instance data for a second service function instance, the service function instance data indicating a service function type and a service identifier for the service function instance; receive a second layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items; and send, to the second service function instance and based at least on determining a service function item of the one or more service function items indicates the second service function instance, a packet classified to the service function chain.

System and method for monitoring network connection quality by executing computer-executable instructions stored on a non-transitory computer-readable medium

A system and method for monitoring network connection quality utilizes software installed on a user computer to monitor a first network connection to a target server used for a desired activity and a second network connection to a benchmark server. Various network quality metrics are recorded and compared for each of the connections and displayed on a visual display so that the user may easily and accurately judge the health of the connection to the target server.