H04L47/803

Method and apparatus for updating UE policy, and computer storage medium

A method and apparatus for updating a User Equipment (UE) policy and a computer storage medium are provided. The method includes that: UE receives a first UE policy and/or first indication information from a network device; and the UE executes an operation of updating an association between an application data stream and a Protocol Data Unit (PDU) session and/or an operation of updating Wireless Local Area Network (WLAN) access selection and/or an operation of updating network slice information and/or an operation of updating a PDU session based on the first UE policy and/or the first indication information.

DEFAULT GATEWAY MANAGEMENT METHOD, GATEWAY MANAGER, SERVER, AND STORAGE MEDIUM
20230283571 · 2023-09-07 ·

Provided is a default gateway management method. The method includes that: a target attribute label of a target application container is detected in response to a default gateway application request; and in a case where the target attribute label exists and a target default gateway pool configured with the target attribute label exists in a gateway resource pool, a default gateway is allocated for the target application container from the target default gateway pool. Further provided are a gateway manager, a server, and a storage medium.

METHOD AND APPARATUS FOR FINE-GRAINED ISOLATION IN CN NSS DOMAIN OF E2E NETWORK SLICE

A method for isolation in the CN domain of a network slice includes receiving a slice isolation policy and establishing a CN NSS isolation policy based on the slice isolation policy. When the CN NSS isolation policy includes a network resource isolation policy, the network resource isolation policy is mapped to a network resource allocation policy, a part of which relating to physical resources is sent to a network function management function (NFMF) and a part relating to virtual resources is sent to a network function virtualization management and orchestration function. When the NSS isolation policy includes an application level isolation policy, the application level isolation policy is mapped to an application level policy which is sent to the NFMF.

System for optimising data communication

According to a first aspect of the invention, there is provided a system for optimising data communication between devices connected to a network, the system including: a server configured to: measure application performance metrics of the data communication between the devices; compare the application performance metrics against performance requirements; detect, in response to the application performance metrics being below the performance requirements, nodes having untapped computing resources within the network; determine operation parameters achieving service at the performance requirements; command one or more of the nodes to function at the operation parameters; and migrate at least a portion of workload associated with the data communication amongst the one or more nodes commanded to function at the operation parameters.

Method, system, storage medium and application for joint optimization of resource allocation

A method for joint optimization of resource allocation includes: obtaining network data volumes of two services; obtaining queue statuses at a time t; computing sub-channel slices; computing a local CPU speed scaling, a user association, a sub-carrier assignment, and a power allocation of service 1; computing a user association, a video quality decision, and a sub-carrier assignment of service 2; obtaining an initial sub-carrier assignment and an initial power allocation; obtaining the user association; obtaining the power allocation and the sub-carrier assignment of service 1; obtaining the video quality decision; obtaining the sub-carrier assignment of service 2; obtaining an optimal data transmission rate and the user association to obtain a data rate allocation; and obtaining an optimal CPU speed scaling, an optimal user association, an optimal sub-carrier assignment, an optimal power allocation, an optimal video quality decision and an optimal sub-channel allocation.

TRANSPARENT MOUNTING OF EXTERNAL ENDPOINTS BETWEEN PRIVATE NETWORKS

A secure private network connectivity system (SNCS) within a cloud service provider infrastructure (CSPI) is described that provides secure private network connectivity between external resources residing in a customer's on-premise environment and the customer's resources residing in the cloud. Secure access to an external resource is enabled by the SNCS by creating an external resource representation (i.e., a computing instance) for the external resource in the customer's virtual cloud network (VCN) in the cloud and creating a virtual network interface card for the external resource representation. Using the SNCS, the customer can securely access the external resource residing in their on-premise network from within their VCN by connecting to the virtual IP address assigned to the VNIC without requiring to set up elaborate site-to-site networking, without making changes to their on-premise routing configuration or without making any changes to the configuration of the external resource.

RESOURCE ALLOCATION FOR EXTENDED REALITY APPLICATIONS
20230262007 · 2023-08-17 ·

Resource allocation of network traffic comprising extended reality network traffic (e.g., using a computerized tool) is enabled. For example, a method can comprise: determining, by network equipment comprising a processor, whether network traffic via a radio access network comprises extended reality network traffic; in response to a determination that the network traffic comprises the extended reality network traffic, determining, by the network equipment, a traffic characteristic of the extended reality network traffic; based on the traffic characteristic, determining, by the network equipment, a resource allocation for the network traffic; and in response to determining the resource allocation for the network traffic, applying, by the network equipment, the resource allocation to a network node of the radio access network.

Closed loop change management for cloud-based systems

Systems and techniques are disclosed for generating a session identifier to be used when implementing changes in a complex system that facilitates identification and retrieval of data indicating the scope and impact of the changes. An execution identifier for a set of operations and a service identifier for a service performing the operations may be used as a basis for the session identifier. The session identifier may be provided to computing resources on which operations are performed and logged by the computing resources along with the results of the operations. This activity data associated with the particular set of operations can be retrieved using the session identifier to determine the scope and impact of the operations on the system.

CONTAINER-AWARE APPLICATION DEPENDENCY IDENTIFICATION

Techniques disclosed herein provide an approach for identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers. One embodiment provides a computer-implemented method that includes monitoring network traffic at one or more host computer systems, wherein OS-less containers run in at least one of the host computer systems. The method further includes monitoring network traffic at virtual bridges to which the OS-less containers are attached, and identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges. In addition, the method includes determining the application dependencies based on the identified network dependencies.

MANAGING PHYSICAL RESOURCES FOR VIRTUAL NETWORK FUNCTIONS

A method includes receiving profile information for a network. The method also includes determining a network configuration based on at least a constraint associated with at least one of a network session or a hardware capacity of a hardware platform of the network and a number of sessions that the network configured based on the network configuration can support. The method also includes configuring the network based on the network configuration.