Making transmission control protocol (TCP) sessions robust in a socket replication environment

    公开(公告)号:US11886304B2

    公开(公告)日:2024-01-30

    申请号:US17837355

    申请日:2022-06-22

    CPC classification number: G06F11/1464 G06F11/0757 G06F11/1451

    Abstract: A network device may execute a master application communicating with another network device via a session, and may receive, by a backup application replication layer, a replicated data object. The backup application replication layer may provide the replicated data object to a backup application, and may calculate a time delta between when the replicated data object is received and when the replicated data object arrives at the backup application. The backup application replication layer may determine whether the time delta exceeds a first threshold or a second threshold, and may generate a session flag based on the time delta exceeding the first threshold or the second threshold. The backup application replication layer may provide the session flag to a master application replication layer and to the backup application, and the master application replication layer may provide details of the session to the master application and the backup application.

    MULTI-PROTOCOL SERVICE CHAINING AMONG DEVICES OF INTERCONNECTED TOPOLOGY

    公开(公告)号:US20240007396A1

    公开(公告)日:2024-01-04

    申请号:US18467377

    申请日:2023-09-14

    CPC classification number: H04L45/42 H04L67/1014 H04L41/22 H04L45/586

    Abstract: Virtual network controllers are described that automatically generate policies and configuration data for routing traffic through physical network function (PNF) service chains in a multi-tenant data center. An example network controller includes a memory and processing circuitry configured to: automatically generate, for one or more integrated routing and bridging (IRB) units of corresponding virtual network forwarding tables of a switch of a switch fabric of a data center network, configuration information that, when deployed, causes the IRB units to direct data traffic conforming to multiple communication protocols and flowing over a plurality of virtual networks between a first set of server devices and a second set of server devices positioned outside of the switch fabric (i) toward a service device logically positioned outside of the switch fabric and coupled to the switch, and (ii) back from the service device into the switch fabric via the switch.

    ADJUSTING A SECURITY POLICY BASED ON SYSTEM RESOURCE UTILIZATION

    公开(公告)号:US20230421614A1

    公开(公告)日:2023-12-28

    申请号:US17809407

    申请日:2022-06-28

    CPC classification number: H04L63/205

    Abstract: In some implementations, a security device may identify a resource profile based on a value of a resource utilization metric associated with the security device. The security device may identify a security services profile to be applied to traffic that is to be processed by the security device. The security device may determine a set of security services to be performed by the security device, the set of security services being identified based on the resource profile and the security services profile. The security device may perform the set of security services according to the security services profile.

    LINK BEHAVIOR PREDICTION FOR USE IN PATH SELECTION

    公开(公告)号:US20230412488A1

    公开(公告)日:2023-12-21

    申请号:US17808066

    申请日:2022-06-21

    CPC classification number: H04L45/123 H04L45/124 H04L45/08

    Abstract: Techniques are described for predicting future behavior of links in a network and generating dynamic thresholds for link metrics for use in path selection. In one example, a computing system receives historical values of a link metric for links of a network. The computing system executes a machine learning system which processes the historical values of the link metric to generate: (1) a predicted future value of the link metric for each link; and (2) a threshold for the link metric indicating whether the predicted future value for each link is anomalous. The computing system computes a path based on the predicted future values of the link metric and the threshold for the link metric. The computing system provisions the computed path, thereby enabling a network device to forward network traffic along the computed path.

    NETWORK ACCESS CONTROL INTENT-BASED POLICY CONFIGURATION

    公开(公告)号:US20230403305A1

    公开(公告)日:2023-12-14

    申请号:US17937208

    申请日:2022-09-30

    CPC classification number: H04L63/20 H04L41/22 H04L63/104 H04L63/0876

    Abstract: Techniques are described for configuration and application of intent-based network access control (NAC) policies for authentication and authorization of multi-tenant, network access server (NAS) devices to access enterprise networks of organizations. A network management system configures intent-based NAC policies for an organization. A cloud-based NAC system may apply an appropriate intent-based NAC policy in response to an authentication request from a NAS device. The NAC system identifies a vendor of the NAS device, matches incoming attributes in the authentication request to a set of normalized match rules of the intent-based NAC policy, and translates a set of abstracted policy results corresponding to the set of normalized match rules into a vendor-specific set of return attributes based on the vendor of the NAS device. The NAC system sends the vendor-specific set of return attributes to the NAS device to enable the NAS device to access the enterprise network of the organization.

Patent Agency Ranking