TECHNIQUES FOR DYNAMIC CONNECTIVITY BETWEEN COMPUTING ENTITIES

    公开(公告)号:US20240348477A1

    公开(公告)日:2024-10-17

    申请号:US18300762

    申请日:2023-04-14

    IPC分类号: H04L12/46 H04L9/40

    摘要: Various embodiments are generally directed to techniques for dynamic connectivity between computing entities. Some embodiments are particularly directed to an exchange controller that dynamically establishes and destroys dedicated connections between different computing entities in an on-demand manner that restrict unnecessary network connectivity. In several embodiments, a private network may connect the exchange controller to a first set of one or more computing entities, such as applications in a private cloud. In several such embodiments, the exchange controller may utilize virtual private networks (VPNs) to establish secure communication between the first set of one or more computing entities and a second set of one or more computing entities external to the private network, such as a server or database located in an external cloud.

    Method and system for implementing bare metal inspection process, device, and storage medium

    公开(公告)号:US12113848B2

    公开(公告)日:2024-10-08

    申请号:US18281689

    申请日:2022-01-27

    摘要: The present disclosure provides a method for implementing a bare metal inspection process, a system, a device and a medium. The method includes: installing an Openstack at a control node, installing a network interface card at a bare metal node, and installing an operating system in the network interface card, so that the network interface card generates a first bare metal port at the bare metal node, and in the operating system, generates a second bare metal port corresponding to the first bare metal port; establishing a communication channel between the Openstack and the operating system, and deploying a proxy component on the operating system; creating a first inspection port on the Openstack, creating a second inspection port based on the proxy component, and binding the second inspection port to the second bare metal port.

    Role information propagation in access switches

    公开(公告)号:US12107754B2

    公开(公告)日:2024-10-01

    申请号:US17712342

    申请日:2022-04-04

    IPC分类号: H04L45/02 H04L9/40 H04L12/46

    摘要: In an example, a switch may receive an authentication request from a host associated with a first wireless access point (WAP) connected to the switch. The switch acts as a VXLAN Tunnel Endpoint (VTEP) in a Border Gateway Protocol (BGP) Ethernet Virtual Private Network (EVPN) based Virtual Extensible Local Area Network (VXLAN). The switch forwards the authentication request to an authentication server and on successful authentication of the host, may associate a role information with the host based on an authentication response from the authentication server. Further, the switch may create a BGP extended community field carrying the role identifier indicative of network policies to be implemented for the host and attach the BGP extended community field with a route advertisement. The switch then sends the route advertisement to another switch. The another switch is configured as a peer VTEP in the VXLAN. The switch and the another switch is configured in a single Virtual Local Area Network (VLAN).

    Communication management server, communication management system, communication management method

    公开(公告)号:US12101660B2

    公开(公告)日:2024-09-24

    申请号:US16996262

    申请日:2020-08-18

    发明人: Tatsuya Seo

    IPC分类号: H04W28/02 H04L12/46 H04W4/20

    摘要: A communication management server includes a processor and a memory device configured to store a program. The program causes the processor to acquire first identification information configured to indicate a network service and second identification information configured to manage a communication device receiving the network service. The program also causes the processor to generate first setting information configured to connect a network providing server corresponding to the network service and the communication device based on the first identification information and the second identification information. The program also causes the processor to transmit the first setting information generated in the generation unit to the communication device.

    COMMUNICATION METHOD AND APPARATUS FOR EXTERNAL DEVICES, ELECTRONIC DEVICE, AND STORAGE MEDIUM

    公开(公告)号:US20240314547A1

    公开(公告)日:2024-09-19

    申请号:US18575420

    申请日:2022-06-02

    申请人: ZTE Corporation

    摘要: Provided are a communication method and apparatus for an external device, allocating an IP address to the external device to access the base station, wherein the external device is connected to the base station through an Ethernet interface of a destination device; searching corresponding relations between internal IP addresses and Ethernet interfaces for the Ethernet interface corresponding to the allocated internal IP address; determining destination device information corresponding to the destination device to which the found Ethernet interface belongs; searching model data of all external devices for model data comprising the destination device information, and establishing a corresponding relation between the found model data and the allocated internal IP address, wherein the model data is configured to identify the external device; and communicating with the external device identified by the model data through the internal IP address corresponding to the model data.

    Cloud delivered access
    10.
    发明授权

    公开(公告)号:US12095765B2

    公开(公告)日:2024-09-17

    申请号:US18163351

    申请日:2023-02-02

    摘要: Cloud delivered access may be provided. A network device may provide a client device with a pre-authentication virtual network and a pre-authentication address. Next, a policy may be received in response to the client device authenticating. The client device may then be moved to a post-authentication virtual network based on the policy. A post-authentication address may then be obtained for the client device in response to moving the client device to a post-authentication virtual network. Traffic for the client device may then be translated to the post-authentication address.