H04L47/728

SECURE CLUSTER PAIRING FOR BUSINESS CONTINUITY AND DISASTER RECOVERY

Techniques are disclosed for providing backup protection. A first subnet is established for replication in a first cluster that includes a plurality of host devices. Each of the host devices includes a respective controller virtual machine, which together form a virtual local area network for replication. Each of the controller virtual machines is assigned an Ethernet interface. A replication Internet Protocol address is assigned to each of the Ethernet interfaces of the controller virtual machines. Route tables and firewall rules of the controller virtual machines are modified to allow communications between nodes of the first subnet. The first subnet is configured with information related to a second subnet for replication in a second cluster. A dedicated communication channel is generated for replication between the first cluster and the second cluster based on the configuring.

Traffic Availability in a Cellular Communication Network
20210360486 · 2021-11-18 ·

According to a first aspect, it is provided a method performed in a network node of a cellular communication network. The method comprises the steps of: obtaining an indicator to secure a traffic availability for a connection, wherein the traffic availability is related to how likely the connection will remain operable; determining whether the network node can secure resources to support the traffic availability; allocating resources for the connection when resources can support the traffic availability; and transmitting a positive response when the network node can secure resources to support the traffic availability. Corresponding network nodes, wireless nodes, computer programs and computer program products are also provided.

POLICY CONTROL FOR REDUNDANT TRANSMISSIONS

Disclosed herein is a SMF (106) that receives a session request message transmitted by a User Equipment, UE (102), the session request message comprising a DNN and S-NSSAI pair; and after receiving the session request message, the SMF transmits towards a PCF (110), a policy create message that includes one or more of: i) the DNN and S-NSSAI pair from the session request message, ii) information indicating that a user plane for a PDU session for the DNN and S-NSSAI pair is redundancy capable, and iii) subscription information for the UE that indicates that the subscriber is allowed to have redundant transmissions. Also disclosed is a method in a PCF (108) that receives a policy control request comprising a UE identifier that identifies a UE (102); and after receiving the policy control request, obtains from a data repository (112) policy information associated with the UE (102), wherein the policy information includes a list of allowed services; and determines whether any of the allowed services require redundant transmissions;

Signaling IP path tunnels for traffic engineering

In general, techniques are described for signaling IP path tunnels for traffic engineering using constraints in an IP network. For example, network devices, e.g., routers, of an IP network may compute an IP path using constraint information and establish the IP path using, for example, Resource Reservation Protocol, to signal the IP path without using MPLS. As one example, the egress router generates a path reservation signaling message that includes an egress IP address that is assigned for use by the routers on the IP path to send traffic of the data flow by encapsulating the traffic with the egress IP address and forwarding toward the egress router. As each router in the IP path receives the path reservation signaling message, the router configures a forwarding state to forward traffic encapsulated with the egress IP address to a next hop along the IP path toward the egress router.

Signaling IP path tunnels for traffic engineering

In general, techniques are described for signaling IP path tunnels for traffic engineering using constraints in an IP network. For example, network devices, e.g., routers, of an IP network may compute an IP path using constraint information and establish the IP path using, for example, Resource Reservation Protocol, to signal the IP path without using MPLS. As one example, the egress router generates a path reservation signaling message that includes an egress IP address that is assigned for use by the routers on the IP path to send traffic of the data flow by encapsulating the traffic with the egress IP address and forwarding toward the egress router. As each router in the IP path receives the path reservation signaling message, the router configures a forwarding state to forward traffic encapsulated with the egress IP address to a next hop along the IP path toward the egress router.

Tunnel provisioning with link aggregation
11418437 · 2022-08-16 · ·

A method for processing data packets in a communication network includes establishing a path for a flow of the data packets through the communication network. At a node along the path having a plurality of aggregated ports, a port is selected from among the plurality to serve as part of the path. A label is chosen responsively to the selected port. The label is attached to the data packets in the flow at a point on the path upstream from the node. Upon receiving the data packets at the node, the data packets are switched through the selected port responsively to the label.

System and method for intersection communication
11390282 · 2022-07-19 · ·

A computer-implemented method for intersection communication includes detecting a first vehicle behind a host vehicle and in a same lane as the host vehicle and determining a rear distance between a rear end of the host vehicle and a front end of the first vehicle. The method also includes transmitting a backup request to the first vehicle based on the rear distance and a wait time period between the stop state and a go state controlled by a traffic signal device. Further, the method includes controlling the host vehicle to perform a backup maneuver with respect to an intersection based on the rear distance and the wait time period.

Priority-based transport connection control

Described embodiments provide systems and methods for priority-based transport connection control. A first packet engine can read connection information of existing connections of a second packet engine written to a shared memory region by the second packet engine. The first packet engine can establish one or more virtual connections according to the connection information of existing connections of the second packet engine. Each of the first packet engine and the second packet engine can receive mirrored traffic data. The first packet engine can receive a first packet and determine that the first packet is associated with a virtual connection corresponding to an existing connection of the second packet engine. The first packet engine can drop the first packet responsive to the determination that the first packet is associated with the virtual connection.

Segment Routing Traffic Engineering (SR-TE) with awareness of local protection
20220086078 · 2022-03-17 ·

Systems and methods for Segment Routing Traffic Engineering (SR-TE) with awareness of local protection include the advertisement of local protection information in effect at each SR capable node via Interior Gateway Protocol (IGP), Border Gateway Protocol Link-State advertisement (BGP-LS), telemetry, etc. This information can include identity (IP address) of protected elements (link/node), type of protection (node, link, SRLG), a SID list for the backup path, whether protection is active, etc. This information can also be advertised via Path Computation Element Protocol (PCEP) as well. The information can also include a Binding SID (BSID) in the advertisement for local backup paths. Further, the present disclosure can enable a new SR OAM message (probe) to instruct a node to activate/deactivate a specific backup path in the forwarding plane for testing purposes.

Tunnel provisioning with link aggregation
11838205 · 2023-12-05 · ·

A method for processing data packets in a communication network includes establishing a path for a flow of the data packets through the communication network. At a node along the path having a plurality of aggregated ports, a port is selected from among the plurality to serve as part of the path. A label is chosen responsively to the selected port. The label is attached to the data packets in the flow at a point on the path upstream from the node. Upon receiving the data packets at the node, the data packets are switched through the selected port responsively to the label.