Patent classifications
H04L47/2475
Application classification distribution to network devices
Some examples relate to distributing application classification entries to network devices. An example includes receiving, by a processing resource in a cloud computing system, an application classification entry for an application from respective network devices on a network. The application classification entry may comprise a given application identifier for identifying the application and control information for routing a network packet originating from the application. For the given application identifier, the processing resource may generate a consolidated set of application classification entries, based on the application classification entry received from respective network devices. The processing resource may then determine appropriate network devices to distribute the consolidated set of application classification entries.
Application classification distribution to network devices
Some examples relate to distributing application classification entries to network devices. An example includes receiving, by a processing resource in a cloud computing system, an application classification entry for an application from respective network devices on a network. The application classification entry may comprise a given application identifier for identifying the application and control information for routing a network packet originating from the application. For the given application identifier, the processing resource may generate a consolidated set of application classification entries, based on the application classification entry received from respective network devices. The processing resource may then determine appropriate network devices to distribute the consolidated set of application classification entries.
Method, apparatus and system for managing traffic data of client application
According to embodiments of the present disclosure, a method, apparatus, device and storage medium for managing traffic data of a client application is provided. The method described herein comprises: detecting a transmission of user data of a target user from the client application to a server; analyzing the traffic data of the transmission at different layers of the transmission based on types of the traffic data; and in accordance with a determination that the analysis indicates that the traffic data satisfies a data exchange constraint corresponding to the target user, transmitting the traffic data to a server in compliance with the data exchange constraint. In this way, by analyzing the traffic data at different layers of the transmission and restricting traffic data that does not satisfy the data exchange constraint, it is possible to effectively prevent user data from being transmitted to unauthorized servers via various types of traffic data.
Method, apparatus and system for managing traffic data of client application
According to embodiments of the present disclosure, a method, apparatus, device and storage medium for managing traffic data of a client application is provided. The method described herein comprises: detecting a transmission of user data of a target user from the client application to a server; analyzing the traffic data of the transmission at different layers of the transmission based on types of the traffic data; and in accordance with a determination that the analysis indicates that the traffic data satisfies a data exchange constraint corresponding to the target user, transmitting the traffic data to a server in compliance with the data exchange constraint. In this way, by analyzing the traffic data at different layers of the transmission and restricting traffic data that does not satisfy the data exchange constraint, it is possible to effectively prevent user data from being transmitted to unauthorized servers via various types of traffic data.
Managing radio-based private networks
Disclosed are various embodiments for managing radio-based private networks. In one embodiment, a cellular network comprises at least one cell that provides a radio-based private network coverage of a site of an organization. The system further comprises at least one computing device in a cloud provider network that implements one or more network functions for an associated core network of the radio-based private network.
Systems and methods for network slice selection according to application specific request
A device of a network may receive a session configuration message for an application session associated with an application of a user equipment (UE) that provided the session configuration message. The device of a network may identify, from the session configuration message, a quality of service (QoS) profile for the application session. The device of a network may determine that the application is authorized to use a network slice of the network that satisfies one or more QoS thresholds of the QoS profile. The device of a network may identify resources of the network that can be configured to satisfy the one or more QoS thresholds. The device of a network may instantiate the resources for communication of application data of the application session. Instantiating the resources may enable the UE to communicate the application data via the network slice using the resources.
Systems and methods for network slice selection according to application specific request
A device of a network may receive a session configuration message for an application session associated with an application of a user equipment (UE) that provided the session configuration message. The device of a network may identify, from the session configuration message, a quality of service (QoS) profile for the application session. The device of a network may determine that the application is authorized to use a network slice of the network that satisfies one or more QoS thresholds of the QoS profile. The device of a network may identify resources of the network that can be configured to satisfy the one or more QoS thresholds. The device of a network may instantiate the resources for communication of application data of the application session. Instantiating the resources may enable the UE to communicate the application data via the network slice using the resources.
COMBINING NETWORKING TECHNOLOGIES TO OPTIMIZE WIDE AREA NETWORK TRAFFIC
Techniques for using application network requirements and/or telemetry information from a first networking technology to enhance operation of a second networking technology and optimize wide area network traffic are described herein. The techniques may include establishing a communication network for use by applications of a scalable application service platform, the communication network including a first networking technology and a second networking technology. In this way, a request to establish a connection for use by an application may be received by the first networking technology. The request may include an indication of a threshold service level of the connection. In response to the request, the first networking technology may determine whether the second networking technology is capable of hosting the connection. If the second networking technology is capable of hosting the connection, the connection may be established such that application traffic is sent or received using the second networking technology.
Intelligent scheduling of Wi-Fi services for applications
Embodiments are directed to intelligent scheduling of Wi-Fi services for applications. An embodiment of computer-readable storage mediums includes instructions for receiving data packets from multiple connected devices at a wireless access point and identifying an application traffic flow for each data packet; assigning each data packet to a respective queue of a first set of queues based on an identified application traffic flow for each data packet; selecting data packets from the first set of queues based on priorities for each of multiple applications; generating prioritized candidate lists for selected data packets in a second set of queues, each queue being dedicated for an access category for one or more application; and scheduling data packets from the candidate lists, including selecting a transmission mode for each access category based on characteristics of the one or more applications.
SYNCHRONIZING USER DATA BETWEEN A SYNC CLIENT AND A SYNC SERVER ON A CUSTOMER COMPUTING SYSTEM
Example implementations relate to data synchronization. According to an example, a system includes a processing system to execute a workload container, the workload container including a user workload application, the user workload application including a sync client; a data storage system, coupled to the processing system, to store user data; and a sync controller to control synchronization of the user data between the sync client and a sync server executing on a customer computing system and pull a selected portion of the user data from the customer computing system to the sync client. The sync client incrementally updates the user data stored on the data storage system with the selected portion of the user data to synchronize the user data between the customer computing system and the cloud computing system.