H04L41/0895

METHOD AND MODULE FOR MANAGING CLASSIFICATION CONFIGURATION FOR TRAFFIC IN SOFTWARE DEFINED NETWORK
20230050350 · 2023-02-16 ·

A method and a classification configuration module for managing a classification configuration for traffic, related to a service, in a software defined network are disclosed. The classification configuration module receives the classification configuration from a service related module. The classification configuration includes a first indication indicating a traffic treatment for the traffic, and a second indication identifying the traffic to be treated according to the first indication for traffic treatment. The classification configuration module determines, based on the classification configuration, a set of traffic filters for use by a software defined network controlling module to determine a list of service functions implementing the traffic treatment for the traffic. The classification configuration module transmits information relating to the set of traffic filters to the software defined network controlling module.

SLICE AUTHENTICATION METHOD AND APPARATUS
20230048066 · 2023-02-16 ·

This application provides a slice authentication method and an apparatus. One example method includes: initiating, by a first network function (NF), slice authentication between a terminal device and an authentication server for a slice; sending, by the first NF, identification information of a first network, identification information of the slice, and identification information of the terminal device to the authentication server, wherein the first NF is an NF in the first network; and receiving, by the first NF, a slice authentication result for the slice, the identification information of the slice, and the identification information of the terminal device from the authentication server.

SIDECAR PROXY AS A SERVICE

Disclosed are embodiments for injecting sidecar proxy capabilities into non-sidecar applications, allowing such non-sidecar applications to communicate with a service mesh architecture. In an embodiment, a method comprises receiving a request to instantiate a proxy for a non-sidecar application at a service mesh gateway (SMG). The SMG then instantiates the proxy in response to the request and broadcasts network information of the non-sidecar application to a mesh controller deployed in a containerized environment. Finally, the SMG (via the proxy) transmits data over a control plane that is communicatively coupled to the mesh controller.

Hybrid clouds

Systems and methods may create and manage hybrid clouds including both standard compute nodes and edge devices. Edge devices can be enrolled in a hybrid cloud by deploying a lightweight container to the edge device.

Seamless multi-cloud routing and policy interconnectivity

Technologies for multi-cloud routing and policy interconnectivity are provided. An example method can include assigning different sets of data plane routers to data plane traffic associated with different address spaces in a cloud site of a multi-cloud fabric to yield a distributed mapping of data plane traffic and data plane routers. The method can further include providing, to an on-premises site in the multi-cloud fabric, routing entries from a control plane router on the cloud site, the routing entries reflecting the distributed mapping and identifying, for each address space, which data plane router handles data plane traffic for that address space; and when a data plane router is deployed at the cloud site, providing, to the on-premises site, updated routing information from the control plane router, the updated routing information identifying the data plane router as a next hop for data plane traffic associated with a respective address space.

System and method for optimizing network topology in a virtual computing environment
11579913 · 2023-02-14 · ·

A computer network optimization methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature selection analysis performed thereon. Provided the feature selection analysis determines that features of the components are in frequent communication and generating network latency. Provided the feature selection analysis determines that features of the components are not well defined, a similarity analysis of the features is performed. Results of the feature selection methodology are generated, and the components involved in the network traffic latency are reassigned to migrate the latency.

Systems and methods for providing network connectors

A networking system may include a first network such as a private cloud network and a second network such as a public cloud network. The first network may include a switch coupled to a computing resource. To facilitate a robust and flexible inter-network connection, the networking system may include network connector circuitry having a connector endpoint at the first network and a network connector coupling the connector endpoint to a network element at the second network. A controller for the first network may provide control signals and configuration data to the network connector circuitry to form the connection to the second network and may configure the switch to forward external network traffic to and from the connector endpoint via a switch port directly coupled to the connector endpoint.

Method and apparatus for transmitting uplink channel in unlicensed band
11582089 · 2023-02-14 · ·

Provided are a method and an apparatus for transmitting an uplink channel in an unlicensed band. The method includes configuring an interface for an uplink channel based on interlacing information determined according to subcarrier spacing (SCS) of an unlicensed band; and transmitting the uplink channel by applying the interlace.

Network control device, user terminal, communication system, network control method, and network control program

A tunnel connection is enabled between a user terminal and a service provider using a simpler network configuration. A communication system 10 includes a user terminal 20, a service provider 30, a carrier network 40 that connects the user terminal 20 and the service provider 30 to each other, and a network control device 50 that controls the carrier network 40. The network control device 50 sets respective virtual tunnel end points (VTEPs) for a POI terminal 46 that is on the carrier network 40 and that is connected to the service provider 30 and for the user terminal 20, and sets a virtual tunnel between the virtual tunnel end points. The user terminal 20 communicates with the service provider 30 via the virtual tunnel.

Technologies for providing shared memory for accelerator sleds

Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.