Patent classifications
H04L47/2475
Edge networking devices and systems for identifying a software application
Edge networking router devices and systems for identifying a software application are described herein. One or more embodiments include an edge networking router device for identifying a software application comprising a packet collector to receive packet data in the edge networking router device and an artificial intelligence (AI) model configured to process the packet data received by the packet collector to identify the software application, wherein the artificial intelligence (AI) model is trained using a cloud entity and received from the cloud entity.
Edge networking devices and systems for identifying a software application
Edge networking router devices and systems for identifying a software application are described herein. One or more embodiments include an edge networking router device for identifying a software application comprising a packet collector to receive packet data in the edge networking router device and an artificial intelligence (AI) model configured to process the packet data received by the packet collector to identify the software application, wherein the artificial intelligence (AI) model is trained using a cloud entity and received from the cloud entity.
Routing application control and data-plane traffic in support of cloud-native applications
Techniques for using computer networking protocol extensions to route control-plane traffic and data-plane traffic associated with a common application are described herein. For instance, a traffic flow associated with an application may be established such that control-plane traffic is sent to a control-plane node associated with the application and data-plane traffic is sent to a data-plane node associated with the application. When a client device sends an authentication request to connect to the application, the control-plane node may send an indication of a hostname to be used by the client device to send data-plane traffic to the data-node. As such, when a packet including the hostname corresponding with the data-plane node is received, the packet may be forwarded to the data-plane node.
Routing application control and data-plane traffic in support of cloud-native applications
Techniques for using computer networking protocol extensions to route control-plane traffic and data-plane traffic associated with a common application are described herein. For instance, a traffic flow associated with an application may be established such that control-plane traffic is sent to a control-plane node associated with the application and data-plane traffic is sent to a data-plane node associated with the application. When a client device sends an authentication request to connect to the application, the control-plane node may send an indication of a hostname to be used by the client device to send data-plane traffic to the data-node. As such, when a packet including the hostname corresponding with the data-plane node is received, the packet may be forwarded to the data-plane node.
ISOLATING VIRTUAL DESKTOP APPLICATIONS FOR POLICY ENFORCEMENT
Some embodiments provide a method of enforcing a set of access policies on traffic exchanged between remote clients and virtual desktop applications. This method receives and stores access policies that define access to different virtual desktop applications by remote clients. To a set of one or more access gateways remote, the method forwards client requests to launch virtual desktop applications. The method analyzes responses provided by the gateway set to virtual desktop requests, and based on this analysis, creates records that identify the virtual applications that will be launched. The method passes the gateway responses back to the remote clients, and upon receiving traffic to the identified virtual applications from the remote clients, (1) uses the created records to identify the virtual applications associated with the received traffic and (2) applies the access policies associated with the identified virtual applications to the received traffic.
ISOLATING VIRTUAL DESKTOP APPLICATIONS FOR POLICY ENFORCEMENT
Some embodiments provide a method of enforcing a set of access policies on traffic exchanged between remote clients and virtual desktop applications. This method receives and stores access policies that define access to different virtual desktop applications by remote clients. To a set of one or more access gateways remote, the method forwards client requests to launch virtual desktop applications. The method analyzes responses provided by the gateway set to virtual desktop requests, and based on this analysis, creates records that identify the virtual applications that will be launched. The method passes the gateway responses back to the remote clients, and upon receiving traffic to the identified virtual applications from the remote clients, (1) uses the created records to identify the virtual applications associated with the received traffic and (2) applies the access policies associated with the identified virtual applications to the received traffic.
DETERMINING HOW TO SERVICE REQUESTS BASED ON SEVERAL INDICATORS
A method for execution by a dispersed storage (DST) processing module includes receiving a data request. An estimated performance level is determined for each of a set of data access approaches, and one data access approach is selected. A data response that includes direction information is issued to the requesting entity when the selected approach includes directing the requesting entity to access an alternate DS processing module. The data object is recovered and a data response is issued to the requesting entity when the selected approach includes accessing the set of DS units directly. A redirect request is issued to the alternate DS processing module when the selected approach includes redirecting the data request, and the alternate DS processing module obtains and issues the data object. A data response is issued to the requesting entity when the alternate DS processing module issues the data object via a redirect response.
Orchestrating Network Usage Under the Threat of Unexpected Bandwidth Shortages
A method for orchestrating use of a communications network for conveying a plurality of data streams transmitted by a plurality of applications includes attributing levels of importance to individual or groups of data streams, determining based at least in part on the levels of importance and on network capacity requirements of the data streams an ordered list of data streams to be curtailed or stopped in case of a shortage of bandwidth in the communications network, providing the list to a management entity that monitors available bandwidth, compares available bandwidth to a combined bandwidth requirement and, in response to determining that the available bandwidth is, or is imminent to become, less than the combined bandwidth requirement, curtails or stops data streams in the order given by the list so as to bring the combined bandwidth requirement back to or below the available bandwidth.
SYSTEM AND METHOD FOR TRACKING DOMAIN NAMES FOR THE PURPOSES OF NETWORK MANAGEMENT
A method includes intercepting a first data packet being transmitted from a domain name system (DNS) server to a first client device, the first data packet being a DNS response, extracting a first internet protocol (IP) address and a first hostname from the first data packet, and storing the first IP address and the first hostname in a first entry of an identification table.
COMMUNICATION METHOD AND COMMUNICATION APPARATUS
The present disclosure relates to communication methods and communication apparatuses. In one example method, a first data analytics network element receives first information of an application from a first network element, where the first information includes at least one of first application description information or an application status that correspond/corresponds to the application. The first application description information includes an application identifier and first IP information that correspond to the application, and the application status includes a foreground state or a background state of the application. The first data analytics network element determines second information based on the first information. The first data analytics network element sends the second information to a second network element.