Patent classifications
H04L47/746
System for automated cross-network monitoring of computing hardware and software resources
A system is provided for automated cross-network monitoring of computing hardware and software status. In particular, the system may track the status of various computing resources using process automation-based operations to simulate calls made by users to the various resources that the users are authorized to access. Based on said operations, the system may assess whether the authorized pathways to the resources and/or their respective components are properly functioning by capturing information regarding the resource, its associated components, and the current status of the resource. The results of these operations may be aggregated to provide an overview of which resources and/or systems are functioning and which are not. In this way, the system may provide a detailed view of the statuses of the individual resources and components within an entity's complex computing network.
Predictive routing using machine learning in SD-WANs
In one embodiment, a supervisory service for a software-defined wide area network (SD-WAN) obtains telemetry data from one or more edge devices in the SD-WAN. The service trains, using the telemetry data as training data, a machine learning-based model to predict tunnel failures in the SD-WAN. The service receives feedback from the one or more edge devices regarding failure predictions made by the trained machine learning-based model. The service retrains the machine learning-based model, based on the received feedback.
REREGISTRATION DURING NETWORK SLICE FAILURE
A control system enables re-registration of user equipment (UE) on an alternative network in the event of a partial failure of a network (VPLMN) for wireless communication. An access and mobility management function (AMF) manages the communication to user equipment (UE) via network slices (1,2,3). A slice priority management function (SPM) receives data indicative of a change in the network's ability to maintain the instantiated network slices and determines to reduce services via affected network slices. Before said slice reduction, the access and mobility management function is informed and sends a slice reduction message to the user equipment. In the UE an alternate network selection function (ANSF) receives the slice reduction message and selects an alternate network based on the user information (USIM) and the slice reduction information, and triggers registration on the selected alternate network for transferring at least part of the affected services to a network slice of the selected alternate network.
ENHANCED PFCP ASSOCIATION PROCEDURE FOR SESSION RESTORATION
Systems and methods are disclosed for providing an enhanced Packet Forwarding Control Protocol (PFCP) association procedure for session restoration. In this regard, a method performed by a PFCP node comprises deleting one or more PFCP sessions of the PFCP node that are associated with a failed PFCP entity or with a failed PFCP path. The method further comprises sending, to a PFCP peer node, a node level message to request that the PFCP peer node delete a corresponding one or more PFCP sessions of the PFCP peer node that are associated with the failed PFCP entity or with the failed PFCP path, wherein the node level message comprises an indication of the corresponding one or more PFCP sessions. Some embodiments provide that the node level message comprises a PFCP Association Setup Request including sessions retention information to indicate whether to retain PFCP sessions associated with the PFCP Association Setup Request.
SWITCH-BASED WORKLOAD DISTRIBUTION FOR VIRTUALIZED RANS
Aspects of the present disclosure relate to allocating workloads to vRANs via programmable switches at far-edge cloud datacenters. Traditionally, traffic allocation is handled by dedicated servers running load-balancing software. However, rerouting RAN traffic to such servers increases both energy and capital costs, degrades end-to-end performance, and requires additional physical space, all of which are undesirable or even infeasible for a RAN far-edge datacenter. Since switches are located in the path of data traffic, workflow policies can be designed to inspect packet headers of incoming traffic, evaluate real-time network information, determine available vRAN instances, and update the packet headers to steer the incoming traffic for processing. As network conditions change, the workflow policies enable the switch to dynamically redirect workloads to alternative vRANs for processing. As a result, RAN processing efficiency and fault tolerance are improved—even with changing network conditions and spikes in data traffic.
Systems and methods for managing streams of packets via intermediary devices
Virtual application and desktop delivery may be optimized by supplying application metadata and user intent to the device between a client and a server hosting resources for the delivery. The data packets used to deliver the virtual application or desktop may be also tagged with references to the application. By supplying the metadata and tagging packets with the metadata, an intermediary network device may provide streams of data packets at the target QoS. In addition, the device may apply network resource allocation rules (e.g., firewalls and QoS configuration) for redirected content retrieved by the client out of band relative to a virtual channel such as the Internet. The network resource allocation rules may differ for different types of resources accessed. The device may also control a delivery agent on the server to modify communication sessions established through the virtual channels based on network conditions.
SHARED STORAGE MODEL FOR HIGH AVAILABILITY WITHIN CLOUD ENVIRONMENTS
Techniques are provided for a high availability solution (e.g., a network attached storage (NAS) solution) with address preservation during switchover. A first virtual machine is deployed into a first domain and a second virtual machine is deployed into a second domain of a computing environment. The first and second virtual machines are configured as a node pair for providing clients with access to data stored within an aggregate comprising one or more storage structures within shared storage of the computing environment. A load balancer is utilized to manage logical interfaces used by clients to access the virtual machines. During switchover, the load balancer preserves an IP address used to mount and access a data share of the aggregate used by a client.
Monitoring a Communication System That is Used for Control and/or Surveillance of an Industrial Process
A computer-implemented method for monitoring a communication system includes identifying a set of signals that need to be transmitted over the communication system for proper functioning of the control and/or surveillance; for each signal from the identified set of signals, identifying one or more resources of the communication system that are needed for transmission of this signal; obtaining information that is indicative of the operational state of the identified resources; and evaluating, from the obtained information, at least one remedial activity which, when performed on at least one resource, and/or on the control and/or surveillance, is likely to improve, and/or to restore, the reliability of the control and/or surveillance.
FALLBACK SERVICE THROUGH A CLOUD EXCHANGE FOR NETWORK SERVICE PROVIDER CONNECTIONS
An example method includes receiving, from a customer system by a cloud exchange comprising processing circuitry, a request to communicatively couple a virtual gateway on network infrastructure of the cloud exchange to a network gateway communicatively coupled to a public network, the request including data indicating a public Internet Protocol (IP) address of the customer system, wherein the customer system is configured with a first connection communicatively coupling the customer system and the public network via a network service provider (NSP) that is separate from the cloud exchange; configuring, by the cloud exchange, a network route for a network gateway to the virtual gateway, the network gateway communicatively coupled to the public network; and providing, by the cloud exchange to the network gateway, routing information including the public IP address of the customer system to create a second connection communicatively coupling the customer system and the public network.
Injecting analytics into Network Repository Function (NRF) for automated management of 5G core
Systems and methods for managing 5G networks are provided. A method for injecting analytics into a Network Repository Function (NRF) for managing a 5G slice, according to one implementation, includes a first step of obtaining parameters associated with User Plane (UP) traffic and Control Plane (CP) traffic from a Service-Based Architecture (SBA) of a 5G network. The method also includes the step of performing analytics on the obtained parameters to monitor Network Functions (NFs) associated with the 5G network. In addition, the method includes the step of providing results of the analytics to an NRF to control NFs stored in a repository associated with the NRF.