Patent classifications
H04L41/0897
CONTROLLING PLACEMENT OF WORKLOADS OF AN APPLICATION WITHIN AN APPLICATION ENVIRONMENT
A technique is directed toward controlling placement of workloads of an application within an application environment. The technique involves, while a first placement of workloads of the application is in a first deployment of resources within the application environment, generating a set of resource deployment changes that accommodates a predicted change in demand on the application. The technique further involves adjusting the first deployment of resources within the application environment to form a second deployment of resources within the application environment, the second deployment of resources being different from the first deployment of resources. The technique further involves providing a second placement of workloads of the application in the second deployment of resources to accommodate the predicted change in demand on the application, the second placement of workloads being different from the first placement of workloads.
Edge controller with network performance parameter support
A method includes receiving a plurality of configurations comprising a first configuration for provisioning a first set of network services at a first resource of an edge device and a second configuration for provisioning a second set of network services at the first resource, a first configuration group identifier identifying a configuration group for the first configuration, and a first network performance parameter for the configuration group. The method further includes determining a performance factor for the first resource providing the first set of network services to one or more client devices. The method further includes, in response to determining that the performance factor does not satisfy the first network performance parameter for the configuration group and that the first configuration group identifier identifies the configuration group for the first configuration, moving the first configuration from the first resource to a second resource of the edge device.
CONTROLLING PARALLEL DATA PROCESSING FOR SERVICE FUNCTION CHAINS
Systems and methods are disclosed for parallelizing service function chains. A method comprises receiving a sequential service function chain comprising a plurality of network functions, receiving a plurality of operations, determining at least two network functions are capable of being parallelized, aggregating operations of the plurality of operations associated with the at least two network functions into a network function segment, determining whether another network function is capable of being parallelized with the network function segment, based on the determining: aggregating an operation associated with the another network function into the network function segment when the another network function is capable of being parallelized with the network function segment, or pushing the network function segment as a completed segment of a hybrid service function chain when the another network function is not capable of being parallelized with the network function segment, and implementing the hybrid service function chain.
METHOD AND APPARATUS FOR MANAGING RESOURCE THROUGH SERVICE DEMAND INFORMATION ANALYSIS IN WIRELESS COMMUNICATION SYSTEM
The present disclosure relates to a 5th generation (5G) or pre-5G communication system for supporting a higher data transmission rate than that of a beyond-4th generation (4G) communication system such as Long-Term Evolution (LTE). According to the present disclosure, a method for operating a network data analytics function (NWDAF) in a wireless communication system comprises the steps of receiving information used for service analysis, receiving service analysis request information related to service use in order to perform the service analysis, generating service analysis information including service prediction information on the basis of the service analysis request information, and transmitting the service analysis information.
METHOD AND SYSTEM FOR NETWORK FUNCTION MIGRATION PROCEDURES FOR A SIGNALING CONTROL PLANE
Systems and methods are provided to migrate a set of network functions between control planes of network slices and include a network slice A that includes a first set of a plurality of network functions in a control plane associated with a legacy vendor; a network slice B that includes a second set of the plurality of network functions in the control plane associated with a new vendor wherein the second set of the plurality of network functions includes a subset of the first set of the plurality of network functions in the control plane of network slice A; and a migration management unit to manage a gradual staged transfer of a subset of the plurality of network functions originally contained in the control plane of the network slice A to the control plane of network slice B wherein the gradual transfer is a migration of the plurality of network functions in a set of multiple stages to create the subset of the plurality of network functions in the control plane of slice B wherein each gradual staged transfer includes the migration of a reduced subset of the plurality of network functions contained in the control plane of the network slice A reconfigured to the control plane of the network slice B.
Defragmentation of licensed resources in a provider network
Techniques for automated defragmentation of licensed resources in a provider network are described. A defragmentation service in a provider network can detect the existence of intra-host fragmentation and/or inter-host fragmentation among host computing devices belonging to a host resource group of hosts dedicated to particular users. The defragmentation service can cause instances to be migrated to new locations within the host resource group to reduce or eliminate the fragmentation, allowing for hosts to beneficially be removed from the host resource group. The defragmentation service may determine which instances to be moved based on considerations involving software licenses associated with the host computing devices.
DYNAMIC NETWORK SLICING MANAGEMENT IN A MESH NETWORK
The present disclosure describes solutions for dynamic network slicing including provisions to create, modify, and/or delete network slices in a de-centralized communication network including a plurality of central/regional/edge/far-edge locations across hybrid and multi-cloud environment referred to as edge server or edge location for providing service to the users. Network slicing enables multiple isolated and independent virtual (logical) networks to exist together. A plurality of virtual networks, i.e., slices, may be created using resources of the same physical network infrastructure.
Method for providing network orchestration for industrial communication system
A method for providing network orchestration for industrial communication system with multiple network slices, comprising:—calculating centralities of nodes in the industrial communication system;—grouping nodes with similar centralities of nodes into clusters;—selecting cluster head for each cluster that is responsible for the resources allocation for the members of the cluster; and—calculating centrality metric for cluster centralities, so as to orchestrate the industrial communication system.
Method for providing network orchestration for industrial communication system
A method for providing network orchestration for industrial communication system with multiple network slices, comprising:—calculating centralities of nodes in the industrial communication system;—grouping nodes with similar centralities of nodes into clusters;—selecting cluster head for each cluster that is responsible for the resources allocation for the members of the cluster; and—calculating centrality metric for cluster centralities, so as to orchestrate the industrial communication system.
TECHNIQUES FOR ACCESSING LOGICAL NETWORKS VIA A VIRTUALIZED GATEWAY
Disclosed are various embodiments for receiving, via a network, a request from a client to establish a network tunnel over the network. A credential is received from the client in order to establish the network tunnel. The client is authenticated based upon the credential. The client negotiates, via the network, to establish the network tunnel.