Patent classifications
H04L47/15
MULTICAST TRAFFIC MANAGEMENT IN AN OVERLAY NETWORK
The use of Network Virtualization using Overlays over Layer 3 (NVO3) is a growing trend to address networking issues in data centers that make use of virtualization and cloud computing techniques. Additional considerations may be required to support application-specific multicast traffic in such overlay networks. Systems and methods are provided for an overlay network control function node to allocate one or more overlay network edge nodes to act as a multicast gateway for each network segment. The gateway can distribute multicast traffic to other participating edge nodes in its same network segment, thus reducing network traffic.
ALLOCATING BANDWIDTH BETWEEN NETWORK COMPUTING DEVICES FOR PUSHING DATA TO A CLIENT COMPUTING DEVICE
Computer systems and methods for allocating bandwidth so that server computers can send data to a client computer without exceeding the available bandwidth between the server computers and the client computer, or the processing bandwidth or capacity of the client computer, are discussed herein. In an embodiment, a method comprises determining a first share of bandwidth that is to be available for a first computing device to send data to the client computer during a first future period of time; determining a first rate at which the first computing device is to send data to the client computer during the first future period of time; determining that the first rate is less than the first share of bandwidth that is to be available for the first computing device to send data to the client computer during the first future period of time by a first delta; receiving, from a second computing device among the plurality of network computing devices, a first request for additional rate allocation; sending, to the second computing device, a first rate allocation that is equal to or less than the first delta; sending data to the client computer during the first future period of time at a first actual rate that is less than or equal to the first rate minus the first rate allocation.
Network controller security monitor
Technologies are generally described for systems, devices and methods effective to compare network element instructions and network control instructions. In some examples, first instructions may be identified and may be related to flow of network traffic. The first instructions may be stored in a data structure of a memory of a network element. The network element may generate a first network instruction signature based on the first instructions. A network controller device may identify second instructions. In some examples, the second instructions may be related to control of the network traffic, and may be stored in a memory of the network controller device. The network controller device may generate a second network instruction signature based on the second instructions. The network controller device may compare the first network instruction signature to the second network instruction signature to produce a comparison between the first instructions and the second instructions.
NETWORK LATENCY FAIRNESS IN MULTI-USER GAMING PLATFORMS
Aspects of the present disclosure relate to wireless communications, and more particularly, to techniques that allow for enforcement of network latency fairness in multi-user gaming platforms. An example method generally includes identifying multiple user equipments (UEs) participating in a multi-user gaming platform across one or more wide area networks (WANs); and taking one or more actions to support latency fairness in delivery of information across the multiple users via the one or more WANs.
Bum traffic control method, related apparatus, and system
Embodiments of the present disclosure disclose a BUM traffic control method, a related apparatus, and a system. A traffic controller receives, through a tunnel, a BUM packet encapsulated by a network device in a target broadcast domain. The traffic controller collects, based on the received BUM packet, statistics about a BUM traffic value of a target object within a preset time period, and determines whether the BUM traffic value is greater than a preset BUM traffic threshold of the target object. If the BUM traffic value is greater than the preset BUM traffic threshold, the traffic controller controls BUM traffic of the target object, to reduce the BUM traffic of the target object. The foregoing solution can resolve a problem of BUM packet flooding caused by an increase in a quantity of hosts or an increase in a quantity of network devices in a communications network.
Multicast traceroute facility with batch query processing for multiple flows and reservation of resources for requested link metrics
In one illustrative example, a multicast traceroute facility for a plurality of interconnected router nodes which are configured to communicate IP multicast traffic amongst hosts is described. The multicast traceroute facility may be for use in processing a multicast traceroute batch query packet which indicates a batch of multicast traceroute queries of a batch query, for identifying a plurality of traced paths for a batch of IP multicast traffic flows. Each identified traced path may be associated with one or more links, each of which has a link metric that satisfies a requested link metric (e.g. a link bandwidth). Resources for satisfying the requested link metric may be reserved for a predetermined or specified time period. The batch of IP multicast traffic flows may be established via at least some of the interconnected router nodes according to the plurality of traced paths identified from the query packet processing.
Dynamic resource allocation, scheduling and signaling for variable data rate service in LTE
A method and apparatus are provided for dynamic resource allocation, scheduling and signaling for variable data real time services (RTS) in long term evolution (LTE) systems. Preferably, changes in data rate for uplink RTS traffic are reported to an evolved Node B (eNB) by a UE using layer 1, 2 or 3 signaling. The eNB dynamically allocates physical resources in response to a change in data rate by adding or removing radio blocks currently assigned to the data flow, and the eNB signals the new resource assignment to the UE. In an alternate embodiment, tables stored at the eNB and the UE describe mappings of RTS data rates to physical resources under certain channel conditions, such that the UE uses the table to locally assign physical resources according to changes in UL data rates. Additionally, a method and apparatus for high level configuration of RTS data flows is also presented.
Method, apparatus, and computer program product for providing internet protocol multicast transport
An apparatus for providing IP multicast transport may include a processor and a memory. The memory may store exécutable instructions that in response to exécution by the processor cause the apparatus to at least perform opérations including receiving a key for encapsulation of multicast data at a base station, using the key to generate a response to a message indicative of a multicast connection for a particular service received from a gateway device, the base station being joined to a same multicast tree in a multicast-broadcast zone as the gateway device, and establishing the multicast connection with the gateway device via a multicast data path comprising a multicast tunnel associated with the key. Corresponding methods and computer program products are also provided.
Method and system for core network support of access network protocols in multi-homed redundancy groups
In one embodiment, a method according to the present disclosure includes receiving a topology change advertisement at a remote core edge node and performing a network address information removal operation. The topology change advertisement is received from a core edge node that is in communication with an access network. The topology change advertisement indicates that a topology change has occurred in the access network. The network address information removal operation removes network address information stored by the remote core edge node. The network address information is used by the remote core edge node in participating in communications with the core edge node.
SEGREGATING VPN TRAFFIC BASED ON THE ORIGINATING APPLICATION
Disclosed are various examples for segregating virtual private network (VPN) traffic based on the originating client application. A tunnel endpoint receives, through a network tunnel, network traffic sent by a client application executed by a client device. The tunnel endpoint identifies characteristics of the client application or the client device. The tunnel endpoint then selects a particular virtual local area network (VLAN) from multiple VLANs based at least in part on the characteristics. The tunnel endpoint then forwards the network traffic to an internal network gateway of an organization using the particular VLAN.