H04L47/20

System, method, and computer program for intelligent muting mitigation

A method for dynamically adapting a maximum bitrate (MBR) configuration of an IP Multimedia Subsystem (IMS)/Rich Communication Services (RCS) application, includes receiving a signal from a client server for an IMS/RCS application, establishing a bearer channel for an Internet multimedia communication, the channel having an initial preconfigured MBR, determining a codec used to transmit the communication, determining the bitrate used by a codec, and modifying the MBR of the channel based on the bitrate of the codec.

System, method, and computer program for intelligent muting mitigation

A method for dynamically adapting a maximum bitrate (MBR) configuration of an IP Multimedia Subsystem (IMS)/Rich Communication Services (RCS) application, includes receiving a signal from a client server for an IMS/RCS application, establishing a bearer channel for an Internet multimedia communication, the channel having an initial preconfigured MBR, determining a codec used to transmit the communication, determining the bitrate used by a codec, and modifying the MBR of the channel based on the bitrate of the codec.

TECHNIQUES FOR DYNAMIC NETWORK MANAGEMENT

Various embodiments are generally directed to techniques for dynamic network management, such as by monitoring and analyzing network parameters, such as network traffic and network configurations, to enable visualization of network state and improved situational awareness. Some embodiments are particularly directed to providing a graphical user interface (GUI) that utilizes various network parameters to map, characterize, and/or assign attributes to network traffic and resources. In many embodiments, network traffic may be monitored and/or routed based on their attributes.

TECHNIQUES FOR DYNAMIC NETWORK MANAGEMENT

Various embodiments are generally directed to techniques for dynamic network management, such as by monitoring and analyzing network parameters, such as network traffic and network configurations, to enable visualization of network state and improved situational awareness. Some embodiments are particularly directed to providing a graphical user interface (GUI) that utilizes various network parameters to map, characterize, and/or assign attributes to network traffic and resources. In many embodiments, network traffic may be monitored and/or routed based on their attributes.

Routers and methods for traffic management
11706137 · 2023-07-18 · ·

A router including a communication device, a first processor, and a second processor. The communication device is configured to receive a plurality of first packets of a connection and at least one second packet of the connection subsequent to the first packets The first processor, coupled to the communication device, and configured to analyze the first packets to determine at least part of a plurality of transport-layer parameters associated with the connection, receive a traffic control rule associated with the connection, and offload processing of the at least one second packet of the connection to a second processor after the at least part of the transport-layer parameters is determined. The second processor is configured to perform traffic control on the second packet according to the traffic control rule and the at least part of the transport-layer parameters.

Routers and methods for traffic management
11706137 · 2023-07-18 · ·

A router including a communication device, a first processor, and a second processor. The communication device is configured to receive a plurality of first packets of a connection and at least one second packet of the connection subsequent to the first packets The first processor, coupled to the communication device, and configured to analyze the first packets to determine at least part of a plurality of transport-layer parameters associated with the connection, receive a traffic control rule associated with the connection, and offload processing of the at least one second packet of the connection to a second processor after the at least part of the transport-layer parameters is determined. The second processor is configured to perform traffic control on the second packet according to the traffic control rule and the at least part of the transport-layer parameters.

POLICY-BASED FORWARDING TO A LOAD BALANCER OF A LOAD BALANCING CLUSTER

Some embodiments of the invention provide a method for forwarding data messages between a client and a server (e.g., between client and server machines and/or applications). In some embodiments, the method receives a data message that a load balancer has directed from a particular client to a particular server after selecting the particular server from a set of several candidate servers for the received data message's flow. The method stores an association between an identifier associated with the load balancer and a flow identifier associated with the message flow, and then forwards the received data message to the particular server. The method subsequently uses the load balancer identifier in the stored association to forward to the particular load balancer a data message that is sent by the particular server. The method of some embodiments is implemented by an intervening forwarding element (e.g., a router) between the load balancer set and the server set.

Proactive tunnel configuration computation for on-demand SD-WAN tunnels

This disclosure describes techniques are described for proactively computing configuration information for policy-driven on-demand tunnel creation and deletion between sites in a software-defined networking in wide area network (SD-WAN) environment. In some examples, a controller device is configured to precompute configuration data for an overlay tunnel through the wide area network to connect a first site and a second site of a plurality of sites in the SD-WAN environment. The controller device is further configured to obtain, after precomputing the configuration data, an indication to configure the overlay tunnel. The controller device is also configured to send, in response to receiving the indication to configure the overlay tunnel, at least some of the configuration data to the first site to configure the first site with the overlay tunnel.

Proactive tunnel configuration computation for on-demand SD-WAN tunnels

This disclosure describes techniques are described for proactively computing configuration information for policy-driven on-demand tunnel creation and deletion between sites in a software-defined networking in wide area network (SD-WAN) environment. In some examples, a controller device is configured to precompute configuration data for an overlay tunnel through the wide area network to connect a first site and a second site of a plurality of sites in the SD-WAN environment. The controller device is further configured to obtain, after precomputing the configuration data, an indication to configure the overlay tunnel. The controller device is also configured to send, in response to receiving the indication to configure the overlay tunnel, at least some of the configuration data to the first site to configure the first site with the overlay tunnel.

Communication of policy changes in LISP-based software defined networks

Systems, methods, and computer-readable media for communicating policy changes in a Locator/ID Separation Protocol (LISP) based network deployment include receiving, at a first routing device, a first notification from a map server, the first notification indicating a change in a policy for LISP based communication between at least a first endpoint device and at least a second endpoint device, the first endpoint device being connected to a network fabric through the first routing device and the second endpoint device being connected to the network fabric through a second routing device. The first routing device forwards a second notification to the second routing device if one or more entries of a first map cache implemented by the first routing device are affected by the policy change, the second notification indicating a set of one or more endpoints connected to the second routing device that are affected by the policy change.