H04L12/859

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING GUARANTEED TRAFFIC BANDWIDTH FOR SERVICES AT INTERMEDIATE PROXY NODES
20210112012 · 2021-04-15 ·

A method for providing guaranteed minimum intermediate proxy node bandwidth for services includes configuring, at an intermediate proxy node, a guaranteed minimum bandwidth of the intermediate proxy node reserved to process messages associated with a service. The method further includes receiving a first message at the intermediate proxy node. The method further includes determining, by the intermediate proxy node, that the intermediate proxy node is in an overloaded state. The method further includes identifying, by the intermediate proxy node, the first message as being associated with the service for which the guaranteed minimum bandwidth is configured. The method further includes determining, by the intermediate proxy node, that a portion of the guaranteed minimum bandwidth for the service is available to process the first message. The method further includes routing, by the intermediate proxy node and to a producer network function (NF) that provides the service, the first message and updating a message count for the service.

Method for reporting QoS/QoE in mobile environment and device therefor
10999625 · 2021-05-04 · ·

The present disclosure relates to a method and device for reporting the quality of a mobile streaming service. A terminal device receiving a mobile streaming service through at least one communication network measures the quality of the streaming service, generates, on the basis of the measurement result, a mobile service quality indicator for monitoring QoS or QoE, and reports the generated mobile service quality indicator in real time through an MQI message, an NAM feedback message, or the like, thereby enabling network conditions to be effectively monitored even in a mobile streaming environment.

Intent-based policy generation for virtual networks

Techniques are disclosed for generating intent-based policies and applying the policies to traffic of a computer network. In one example, a policy controller for the computer network receives traffic statistics for traffic flows among a plurality of application workloads executed by a first set of computing devices. The policy controller correlates the traffic statistics into session records for the plurality of application workloads. The policy controller generates, based on the session records for the application workloads, application firewall policies for the application workloads. Each of the application firewall policies define whether traffic flows between application workloads are to be allowed or denied. The policy controller distributes the application firewall policies to a second set of one or more computing devices for application to traffic flows between instances of the application workloads.

VEHICLE COMMUNICATION CONNECTION DEVICE AND METHOD THEREOF

A vehicle communication connection device and a method thereof are provided. The method includes determining at least one class identifier (CID) level applicable to a target application, determining at least one communication interface (CI) level applicable to the target application, mapping the determined CID level and the determined CI level to a predefined CID/CI mapping table, determining a final CID level to be used for the target application, and determining a final CI level corresponding to the determined final CID level.

SYSTEM AND METHOD FOR PRIORITIZING TRANSMISSION OF TRADING DATA OVER A BANDWITDH-CONSTRAINED COMMUNICATION LINK
20210105215 · 2021-04-08 ·

A method, a processing device and a computer-readable medium are provided for prioritizing trading data transmission over bandwidth-constrained communication link. The method comprises comparing fields of records indicative of the current states of securities of interest with corresponding fields of one or more previous records for said securities. The records are associated with securities being traded or to securities whose prices are being used for trading. The method comprises calculating variations of the fields and assigning priorities to the different securities of interest, based on the calculated variations, and sending fields characterizing the current state of the securities having the highest priorities over the bandwidth-constrained communication link, up to bandwidth capacity, to a remote computing device. The remote device can thereby receive in priority trading data associated with securities having the most significant or impactful variations.

NETWORK COMPONENT SELECTION BASED ON DEVICE IDENTIFIER

Systems and methods for selectively routing a connect to a network through a control function associated with the network. The system can distinguish between control functions based on functionalities associated with the control function itself or capabilities associated with a user device. The system can select between the control functions based at least in part on an identifier associated with the user device, a subscriber account associated with the user device, or another trait of the connection. The system can select the control function based on a determination made by a control node associated with the network and may be further based on a Network Resource Function, a Domain Name System server, internal static listings of the control functions, or other resource that associates one or more identifiers with the control function. The system can obtain the identifier once the user device requests a connection with the network and provide the identifier to the control node.

CORRELATING NETWORK LEVEL AND APPLICATION LEVEL TRAFFIC
20210099394 · 2021-04-01 ·

Methods, systems, and devices supporting network and container level traffic analysis and correlation are described. An application server may receive network traffic data from a network-level data capture system and receive container-level application traffic data from a container-level data capture system. The application server may then hash the destination addresses, the time stamp information, and the data amount information from the network traffic data to create a first set of hash values and hash the destination addresses, the time stamp information, and the data amount information from the application traffic data to create a second set of hash values. The application server may then identify matching hash values from the first set of hash values and the second set of hash values and then merge into a data queue the corresponding network traffic with metadata associated with the corresponding application traffic data to create a merged data set.

LOSSLESS DATA TRAFFIC DEADLOCK MANAGEMENT SYSTEM
20210126865 · 2021-04-29 ·

A lossless data traffic deadlock management system includes a first networking device coupled to a second networking device and a third networking device. The first networking device provide a lossless data traffic flow on a first data traffic path via the second networking device and to a destination. The first networking device then receives a congestion communication from the second networking device that is indicative of a deadlock associated with the second networking device. In response, the first networking device identifies the first data traffic path as a congested route, and the identification of the first data traffic path as the congested route causes the first networking device to provide the lossless data traffic flow on a second data traffic path via the third networking device to the destination.

Tool port aliasing in a network visibility fabric

A method of operating a network visibility node is disclosed. In certain embodiments, the network visibility node has a plurality of network ports through which to communicate data with a plurality of network hosts and has a plurality of tool ports through which to communicate data with a plurality of network tools. The network visibility node accesses a port group map associated with a plurality of tool port groups of the network visibility node, where each of the tool port groups includes one or more tool ports of the network visibility node, and where the port group map contains a separate tool alias for each tool port group of the plurality of tool port groups. Each tool alias can correspond to a different type of network traffic. The network visibility node uses the port group map to ascertain a tool port group through which to communicate the plurality of packets with a particular network tool.

USING SERVICE CONTAINERS TO IMPLEMENT SERVICE CHAINS

Some embodiments of the invention provide novel methods for performing services on data messages passing through a network connecting one or more datacenters, such as software defined datacenters (SDDCs). The method of some embodiments uses service containers executing on host computers to perform different chains (e.g., ordered sequences) of services on different data message flows. For a data message of a particular data message flow that is received or generated at a host computer, the method in some embodiments uses a service classifier executing on the host computer to identify a service chain that specifies several services to perform on the data message. For each service in the identified service chain, the service classifier identifies a service container for performing the service. The service classifier then forwards the data message to a service forwarding element to forward the data message through the service containers identified for the identified service chain. The service classifier and service forwarding element are implemented in some embodiments as processes that are defined as hooks in the virtual interface endpoints (e.g., virtual Ethernet ports) of the host computer's operating system (e.g., Linux operating system) over which the service containers execute.