Patent classifications
H04L12/725
Flow-based adaptive private network with multiple WAN-paths
Systems and techniques are described which improve performance, reliability, and predictability of networks without having costly hardware upgrades or replacement of existing network equipment. An adaptive communication controller provides WAN performance and utilization measurements to another network node over multiple parallel communication paths across disparate asymmetric networks which vary in behavior frequently over time. An egress processor module receives communication path quality reports and tagged path packet data and generates accurate arrival times, send times, sequence numbers and unutilized byte counts for the tagged packets. A control module generates path quality reports describing performance of the multiple parallel communication paths based on the received information and generates heartbeat packets for transmission on the multiple parallel communication paths if no other tagged data has been received in a predetermined period of time to ensure performance is continually monitored. An ingress processor module transmits the generated path quality reports and heartbeat packets.
Cloud-based anonymous routing
A system and computer-implemented method for cloud-based anonymous traffic routing is disclosed. The method may include receiving, from a client application by a router, network traffic identified for a destination. The method may include determining, for a set of internal cloud nodes distinct from both the client application and the destination, a set of internet protocol (IP) addresses including a first IP address for a first internal cloud node of the set of internal cloud nodes. The method may also include establishing an anonymity algorithm for cloud-based anonymous traffic routing, the anonymity algorithm configured to use the set of IP addresses. The method may also include routing, based on the anonymity algorithm, the network traffic to the first internal cloud node using the first IP address. The method may also include routing the network traffic from the set of internal cloud nodes to the destination identified by the client application.
System and method for customizing the identification of application or content type
Expertise, for performing classification of a type of network traffic, can be encapsulated in a module. A set of modules, as currently available to a traffic controller, can be referred to as a collection. Programming language constructs are introduced that facilitate the writing of modules customized to identify network traffic that is peculiar to a particular user, or to a relatively small group of users. An example programming language, based on Tcl, is introduced. A key aspect is event-driven programming, and the “when” command construct is introduced. Three important event types, that can trigger a “when” command, are CLIENT_DATA, SERVER_DATA, and RULE_INIT. Another key aspect is an ability to keep state information between events. Constructs for intra-session, intra-module, and global state are introduced. A module can be blocked from executing more than once for a session. Successful execution of a module can be specified by a “match” statement.
System and method for delay management for traffic engineering
A method for engineering traffic in a communications system includes determining a set of delay constraints associated with a traffic flow over the communications system, and excluding non-convex constraints from the set of delay constraints, thereby producing a set of convex constraints. The method also includes selecting a path solution for the traffic flow in accordance with the set of convex constraints, and sending information regarding the path solution to nodes in the communications system.
Resilient peer-to-peer application message routing
Example embodiments relate to a method of, and device for facilitating, resilient peer-to-peer application message routing. The method comprises storing a network routing table comprising destination addresses of applications hosted on peer nodes of a network, and providing the peer nodes with a copy of the routing table via which routing table an application message from any one of the peer nodes is routed to a destination address designating a destination application hosted by a destination peer node. Further, the method comprises providing, when the destination application hosted by the destination peer node is inactivated, all peer nodes with a copy of an updated routing table taking into account the inactivation of said application, wherein a further application message addressed from any one of the peer nodes to the destination address associated with the inactivated application is routed via the updated routing table, to an alternative destination application having the same destination address as the inactivated application.
Systems and methods for scheduling of data packets based on delay tolerance of applications
A base station, system, method, and computer program product are disclosed for transmitting data packets received by the base station. According to one aspect, the base station includes a first buffer configured to store data packets received by the base station, a second buffer configured to store data packets that are scheduled for transmission by the base station, and a computer processor, operatively coupled to the first buffer and the second buffer. The computer processor is configured to inspect a data packet to determine an application type of the data packet, determine a delay tolerance associated with the data packet based on the determined application type, determine a channel condition of a communication session with the user device, move the data packet from the first buffer to the second buffer based on the determined delay tolerance and the determined channel condition, and transmit data packets stored in the second buffer.
Adaptive network function chaining
Disclosed herein are system, method, and computer program product embodiments for dynamically applying network functions to traffic flows based on heuristics, policy conditions and client-specified conditions. A network monitors a network traffic flow to determine whether the network traffic flow meets a first criterion of a first rule. The criterion specifies that when the first criterion is met a network function be used to analyze or process the network traffic flow. When the network traffic flow is determined to meet the first criterion, the network determines a first route through the network to a network function provider that provides the network function and configures one or more routers along the first route to forward the network traffic flow to the network function provider for analysis or processing.
Methods and apparatus for determining a path in a communications network
A method for determining a path in an optical network, implemented by one or more controllers associated with a control layer, includes receiving a path request specifying start and end points, an associated bandwidth, and a longevity parameter providing an anticipated length during which the path is required; determining a route in the optical network through a routing algorithm executed by the controller, wherein the routing algorithm utilizes the start and end points, the associated bandwidth, and the longevity parameter to determine the path; and provisioning the path through a plurality of switches along the route.
Method and apparatus for considering routing information in the determination of an access network to be utilized
A method, apparatus and computer program product are provided to allow a plurality of access networks to be utilized in a coordinated manner in accordance with the routing policies defined by the network operator as well as other routing information including, for example, IETF routing and router information. In the context of a method, information, such as ANDSF information, defining the routing policies of the network operator may be received from a mobile terminal. The method also includes at least a portion of the information defining one or more routing policies of the network operator within an IP connectivity stack along with other routing information that is not based on the routing policies of the network operator. And, the method considers both the one or more routing policies defined by the network operator and the other routing information in determining utilization of a plurality of access networks.
Network storage systems having clustered RAIDs for improved redundancy and load balancing
A clustered network-based storage system includes a host server, multiple high availability system controller pairs, and multiple storage devices across multiple arrays. Two independent storage array subsystems each include a quorum drive copy and are each controlled by a HA pair, with remote volume mirroring links coupling the separate HA pairs. The host server includes a virtualization agent that identifies and prioritizes communication paths, and also determines capacity across all system nodes. A system storage management agent determines an overall storage profile across the system. The virtualization agent, storage management agent, quorum drive copies and remote volume mirroring link all operate to provide increased redundancy, load sharing, or both between the separate first and second arrays of storage devices.