H04L61/5014

PROCESS AND SYSTEM FOR MIGRATING SATELLITE NETWORKS TO 3GPP 5G ARCHITECTURE

A satellite terminal satellite exchanges data with a 5G core network of a cellular wireless network by obtaining an internet protocol (IP) address using a router or switch and a gateway. The IP address is obtained using dynamic host configuration protocol (DHCP). The router or switch and the gateway are positioned between a satellite teleport and the core network. The data is sent as packets with the IP address being the source address of the satellite terminal. As such, a legacy satellite terminal, with addition of a DHCP client, is able to access services of the 5G core network.

PROCESS AND SYSTEM FOR MIGRATING SATELLITE NETWORKS TO 3GPP 5G ARCHITECTURE

A satellite terminal satellite exchanges data with a 5G core network of a cellular wireless network by obtaining an internet protocol (IP) address using a router or switch and a gateway. The IP address is obtained using dynamic host configuration protocol (DHCP). The router or switch and the gateway are positioned between a satellite teleport and the core network. The data is sent as packets with the IP address being the source address of the satellite terminal. As such, a legacy satellite terminal, with addition of a DHCP client, is able to access services of the 5G core network.

SECURITY POLICY ENFORCEMENT FOR RESOURCES IN BRIDGE MODE

Techniques for analyzing traffic originating from a host device in a wireless network to identify one or more virtual machines (VMs) running on the host device and connected to the network via the host device in bridge mode. When a VM is created in bridge mode behind a host device, the traffic originated by the VM will have the source Media Access Layer (MAC) address of the host device. According to techniques described herein, devices and/or components associated with the network may profile the traffic to identify an address of the VM, such as by analyzing dynamic host configuration protocol (DHCP) packets to determine the Internet Protocol (IP) address of the VM. Once the IP address and the MAC address of the VM is known, the components and/or devices may apply security policies to the VM that may be different than security policies applied to the host device.

SECURITY POLICY ENFORCEMENT FOR RESOURCES IN BRIDGE MODE

Techniques for analyzing traffic originating from a host device in a wireless network to identify one or more virtual machines (VMs) running on the host device and connected to the network via the host device in bridge mode. When a VM is created in bridge mode behind a host device, the traffic originated by the VM will have the source Media Access Layer (MAC) address of the host device. According to techniques described herein, devices and/or components associated with the network may profile the traffic to identify an address of the VM, such as by analyzing dynamic host configuration protocol (DHCP) packets to determine the Internet Protocol (IP) address of the VM. Once the IP address and the MAC address of the VM is known, the components and/or devices may apply security policies to the VM that may be different than security policies applied to the host device.

FAST PROVISIONING OF MACHINES USING NETWORK CLONING

Some embodiments of the invention provide a method for cloning a set of one or more applications implemented by a first set of machines connected through a first logical network that defines a virtual private cloud (VPC) in a set of one or more datacenters. The method detects that the first logical network does not have sufficient resources to process a set of network traffic destined for the set of one or more applications implemented by the first set of machines. Based on said detecting, the method uses a set of network configuration data that configures a set of logical forwarding elements (LFEs) of the first logical network to define a cloned, second logical network for connecting a cloned, second set of machines that implement a second set of one or more applications. The method uses the cloned, second logical network to process at least a subset of the network traffic destined to the set of applications.

FAST PROVISIONING OF MACHINES USING NETWORK CLONING

Some embodiments of the invention provide a method for cloning a set of one or more applications implemented by a first set of machines connected through a first logical network that defines a virtual private cloud (VPC) in a set of one or more datacenters. The method detects that the first logical network does not have sufficient resources to process a set of network traffic destined for the set of one or more applications implemented by the first set of machines. Based on said detecting, the method uses a set of network configuration data that configures a set of logical forwarding elements (LFEs) of the first logical network to define a cloned, second logical network for connecting a cloned, second set of machines that implement a second set of one or more applications. The method uses the cloned, second logical network to process at least a subset of the network traffic destined to the set of applications.

FAST PROVISIONING OF MACHINES USING NETWORK CLONING

Some embodiments of the invention provide a method for cloning a set of one or more applications implemented by a first set of machines connected through a first logical network that defines a virtual private cloud in a set of one or more datacenters. The method instantiates a cloned, second set of machines that is a replicated copy of the first set of machines. The method identifies a set of network configuration data that configures a set of logical forwarding elements (LFEs) of the first logical network. The method uses the identified set of network configuration data to define a cloned, second logical network to connect the cloned, second set of machines.

FAST PROVISIONING OF MACHINES USING NETWORK CLONING

Some embodiments of the invention provide a method for cloning a set of one or more applications implemented by a first set of machines connected through a first logical network that defines a virtual private cloud in a set of one or more datacenters. The method instantiates a cloned, second set of machines that is a replicated copy of the first set of machines. The method identifies a set of network configuration data that configures a set of logical forwarding elements (LFEs) of the first logical network. The method uses the identified set of network configuration data to define a cloned, second logical network to connect the cloned, second set of machines.

Establishing a session with a user plane function supporting uplink classifier functionality

A session management function sends, to a network repository function, a first message requesting discovery of a user plane function supporting an uplink classifier functionality for a packet data unit session of a wireless device. The first message comprises an uplink classifier indication parameter. based on the first message, a second message comprising an identifier of the user plane function is received from the network repository function. A third message requesting a connection for the wireless device, between the session management function and the user plane function, is sent to the user plane function.

Establishing a session with a user plane function supporting uplink classifier functionality

A session management function sends, to a network repository function, a first message requesting discovery of a user plane function supporting an uplink classifier functionality for a packet data unit session of a wireless device. The first message comprises an uplink classifier indication parameter. based on the first message, a second message comprising an identifier of the user plane function is received from the network repository function. A third message requesting a connection for the wireless device, between the session management function and the user plane function, is sent to the user plane function.