Patent classifications
H04L47/785
METHOD OF NETWORK SLICE RESOURCE ALLOCATION AND VISUALIZATION
The disclosure provides a method and a device for efficiently operating network slicing. According to the disclosure, a method of operating a first node configured to manage a network slice of a communication system includes: transmitting a service level agreement (SLA) range for each network slice subnet and a message requesting a resource according to the SLA range to a second node configured to manage the network slice subnet, receiving SLA arrangement flavor mapping relationship information in the network slice subnet unit from the second node, and identifying the SLA arrangement flavor mapping relationship in a network slice unit based on the received SLA arrangement flavor mapping relationship information in a network slice subnet unit.
PACKET TRANSMISSION METHOD AND APPARATUS, AND NETWORK DEVICE
The application discloses a packet transmission method, an apparatus, and a network device. In an embodiment, a first network device obtains identification information corresponding to a service flow, and reserves a forwarding resource based on the identification information. The forwarding resource is used by the first network device to forward the service flow to a second network device. The first network device further sends a packet including the identification information to the second network device, and the second network device reserves a corresponding forwarding resource based on the identification information in the packet. Network devices perform resource reservation hop by hop by sending the packet including the identification information, and do not need to perform resource reservation based on a transmission path that is pre-calculated and planned, so that load of the network device or a controller is reduced, and resource reservation flexibility is improved.
ENFORCEMENT OF MAXIMUM NUMBER OF ADMITTED TERMINALS PER NETWORK SLICE
There are provided measures for enforcement of maximum number of admitted terminals per network slice. Such measures exemplarily comprise receiving a packet data connection related request concerning a network slice being configured with a maximum number of terminals to be admitted to said network slice, maintaining a counter indicative of a number of terminals admitted to said network slice based on said packet data connection related request, and transmitting a response to said packet data connection related request.
SHARED STORAGE MODEL FOR HIGH AVAILABILITY WITHIN CLOUD ENVIRONMENTS
Techniques are provided for a high availability solution (e.g., a network attached storage (NAS) solution) with address preservation during switchover. A first virtual machine is deployed into a first domain and a second virtual machine is deployed into a second domain of a computing environment. The first and second virtual machines are configured as a node pair for providing clients with access to data stored within an aggregate comprising one or more storage structures within shared storage of the computing environment. A load balancer is utilized to manage logical interfaces used by clients to access the virtual machines. During switchover, the load balancer preserves an IP address used to mount and access a data share of the aggregate used by a client.
Method to support redundancy switching of virtual MAC cores
Systems and methods to support switching of virtual cores.
Efficient buffer utilization for network data units
Approaches, techniques, and mechanisms are disclosed for efficiently buffering data units within a network device. A traffic manager or other network device component receives Transport Data Units (“TDUs”), which are sub-portions of Protocol Data Units (“PDUs”). Rather than buffer an entire TDU together, the component divides the TDU into multiple Storage Data Units (“SDUs”) that can fit in SDU buffer entries within physical memory banks. A TDU-to-SDU Mapping (“TSM”) memory stores TSM lists that indicate which SDU entries store SDUs for a given TDU. Physical memory banks in which the SDUs are stored may be grouped together into logical SDU banks that are accessed together as if a single bank. The TSM memory may include a number of distinct TSM banks, with each logical SDU bank having a corresponding TSM bank. Techniques for maintaining inter-packet and intra-packet linking data compatible with such buffers are also disclosed.
CROSS-DOMAIN CLOCK SYNCHRONIZATION METHOD, DEVICE AND SYSTEM AND COMPUTER STORAGE MEDIUM
A cross-domain clock synchronization method, device and system and a computer storage medium, which are applied to a cross-domain synchronization network. A Path Calculate Element (PCE) exchanges a clock synchronization type with a controller participating in clock synchronization path calculation to match the clock synchronization type supported by the PCE and the controller; the PCE acquires physical topological information of the cross-domain synchronization network; the PCE acquires synchronization information of synchronization nodes of the cross-domain synchronization network and/or hop number information between the synchronization nodes; the PCE calculates a clock synchronization path of the cross-domain synchronization network according to the physical topological information as well as the synchronization information and/or the hop number information; and the PCE sends the clock synchronization path to the controller according to the physical topological information to enable the controller to send a clock synchronization instruction to synchronization nodes on the clock synchronization path.
Method and devices for domain name bandwidth adjustment
The present disclosure provides a method and related devices for domain name bandwidth adjustment. The method includes: receiving domain name bandwidth information reported by each on-site bandwidth management server and based on the domain name bandwidth information, determining a target domain name having the domain name bandwidth exceeding a specified bandwidth threshold; determining a to-be-adjusted bandwidth corresponding to the target domain name, and allocating the to-be-adjusted bandwidth among a plurality of sites; determining a bandwidth control threshold of the target domain name for the corresponding site; and generating a flow control instruction containing the bandwidth control threshold, and sending the generated flow control instruction to the on-site bandwidth management server at the corresponding site, where the on-site bandwidth management server adjusts the domain name bandwidth of the target domain name in each node server at the site.
Method and devices for domain name bandwidth adjustment
The present disclosure provides a method and related devices for domain name bandwidth adjustment. The method includes: receiving domain name bandwidth information reported by each on-site bandwidth management server and based on the domain name bandwidth information, determining a target domain name having the domain name bandwidth exceeding a specified bandwidth threshold; determining a to-be-adjusted bandwidth corresponding to the target domain name, and allocating the to-be-adjusted bandwidth among a plurality of sites; determining a bandwidth control threshold of the target domain name for the corresponding site; and generating a flow control instruction containing the bandwidth control threshold, and sending the generated flow control instruction to the on-site bandwidth management server at the corresponding site, where the on-site bandwidth management server adjusts the domain name bandwidth of the target domain name in each node server at the site.
Homogenizing tooling for a heterogeneous cloud environment
A method, system and computer-usable medium are disclosed for controlling access to a node deployed in a cloud environment. A new node, based upon a common image, is created in a cloud computing environment. A unique set of randomized system parameters are then generated for the new node, which is then mapped to a set of generic system parameters. A request to access the new node is intercepted, which contains the generic system parameters. The intercepted access request is then parsed to extract the set of generic system parameters, which are then replaced with the unique set of randomized system parameters associated with the target node to generate a modified access request. The modified access request is then forwarded to the target node.