NETWORK CONFIGURATION VERIFICATION IN COMPUTING SYSTEMS

    公开(公告)号:US20230134981A1

    公开(公告)日:2023-05-04

    申请号:US17978081

    申请日:2022-10-31

    Abstract: Techniques of network configuration verification are disclosed herein. One example process includes, upon receiving a query to determine whether a packet from a first endpoint is reachable to a second endpoint in a virtual network, identifying a network path between the first endpoint to the second endpoint in a network graph. The network graph has nodes representing corresponding enforcement points of network policies in the virtual network and edges connecting pairs of the nodes. The example process can also include generating compound function representing conjoined individual constraints of the network policies at each of the nodes in the network graph along the identified network path, compiling the generated compound function into a Boolean formula, and solving the compiled Boolean formula to determine whether an assignment of values to packet fields of the packet exists such that all the conjoined individual constraints of the compound function can be satisfied.

    EGRESS TRAFFIC ENGINEERING IN PUBLIC CLOUDS WITH COMMODITY ROUTERS ON THE WAN EDGE

    公开(公告)号:US20230041081A1

    公开(公告)日:2023-02-09

    申请号:US17397560

    申请日:2021-08-09

    Abstract: The present application relates to egressing traffic from a public cloud network. An egress traffic manager configures routing at hosts and edge routers within the public cloud network. The egress traffic manager determines, for an edge router, a plurality of current border gateway protocol (BGP) sessions with external networks. The egress traffic manager configures a virtual router hosted on the edge router to route a portion of egress traffic to a selected one of the external networks via one of the BGP sessions. A host is configured to route the portion of egress traffic within the public cloud network to the edge router. An edge router configured to route, by the virtual router, the portion of egress traffic from the edge router to the selected one of the external networks.

    ORCHESTRATION OF OVERLAY PATHS FOR WIDE AREA NETWORK VIRTUALIZATION

    公开(公告)号:US20230039665A1

    公开(公告)日:2023-02-09

    申请号:US17397525

    申请日:2021-08-09

    Abstract: The present application relates to traffic routing for overlay paths in a public cloud network. A path orchestrator receives a configuration of a set of overlay paths for a wide area network virtualization from a client, each overlay path including virtual routing nodes associated with respective geographic regions and at least one policy for a link between the virtual routing nodes. The path orchestrator is configured to instantiate a plurality of virtual routers on computing resources of the public cloud network located within the respective geographic regions based on the configuration, each virtual router configured to route traffic according to the policy for each link associated with the virtual routing node corresponding to the virtual router. The path orchestrator is configured to scale the plurality of virtual routers based on traffic for the client on the set of overlay paths.

    PROTOCOL TESTING USING LARGE LANGUAGE MODELS

    公开(公告)号:US20250156288A1

    公开(公告)日:2025-05-15

    申请号:US18440713

    申请日:2024-02-13

    Abstract: The present disclosure relates to utilizing resources provided by large language models (LLMs) to generate models to be used in model-based testing of a variety of protocols. In particular, systems described herein utilize a vasty body of protocol knowledge defined in RFCs and standards, networking forums, blogs, and other online resources and documents to extract this knowledge in generating models that can be used for testing one or more components of a variety of protocols. The features and functionalities described herein provide a framework for utilizing LLMs to generate a protocol model while providing constraints for a harness (e.g., a symbolic harness) that will guide a symbolic execution engine in generating any number of protocol tests that may be used in determining whether a given application, hardware, and/or software implementation will perform as designed for a given protocol.

    NETWORK TRAFFIC CONTROL USING ESTIMATED MAXIMUM GAP

    公开(公告)号:US20240080255A1

    公开(公告)日:2024-03-07

    申请号:US17929503

    申请日:2022-09-02

    CPC classification number: H04L45/08

    Abstract: A computing device is provided, including a processor that receives a network graph. The processor further receives a specification of a network traffic control heuristic for a network traffic routing problem over the network graph. The processor further constructs a gap maximization problem that has, as a maximization target, a difference between an exact solution to the network traffic routing problem and a heuristic solution generated using the network traffic control heuristic. The processor further generates a Lagrange multiplier formulation of the gap maximization problem. At a convex solver, the processor further computes an estimated maximum gap as an estimated solution to the Lagrange multiplier formulation of the gap maximization problem. The processor further performs a network traffic control action based at least in part on the estimated maximum gap.

    GHOST ROUTING
    16.
    发明公开
    GHOST ROUTING 审中-公开

    公开(公告)号:US20230231806A1

    公开(公告)日:2023-07-20

    申请号:US18191573

    申请日:2023-03-28

    CPC classification number: H04L45/586 H04L45/02 H04L45/64

    Abstract: Ghost routing is a network verification technique that uses a portion of a production network itself to verify the impact of potential network changes. Ghost routing logically partitions the production network into a main network and a ghost network. The main network handles live traffic while the ghost network handles traffic generated for diagnostic purposes. The ghost network may have a network topology identical to the production network and may use the same hardware and software as the production network. An operator may implement a network configuration change on the ghost network and then use verification tools to verify that the network configuration change on the ghost network does not result in bugs. Verifying on the ghost network may not affect the main network. If the network operator verifies the network configuration change on the ghost network, the network operator may implement the network configuration change on the main network.

    REPRESENTATION AND ORCHESTRATION FOR VIRTUAL WIDE AREA NETWORKS

    公开(公告)号:US20220417103A1

    公开(公告)日:2022-12-29

    申请号:US17358737

    申请日:2021-06-25

    Abstract: Described are examples for providing management of a virtual wide area network (vWAN) based on operator policies. A network orchestrator presents, to a network operator, a representation of the vWAN including virtual network entities associated with respective geographic locations and virtual connections between the virtual network entities. The network orchestrator receives a policy for the virtual wide area network from the network operator via the representation, the policy to be implemented at one or more of the virtual connections. The network orchestrator translates the policy for the virtual wide area network into a configuration of an underlying wide area network (WAN). The underlying WAN a plurality of geographically distributed physical computing resources in geographic regions corresponding to the virtual network entities and connections there between.

    GHOST ROUTING
    18.
    发明申请

    公开(公告)号:US20220124031A1

    公开(公告)日:2022-04-21

    申请号:US17072147

    申请日:2020-10-16

    Abstract: Ghost routing is a network verification technique that uses a portion of a production network itself to verify the impact of potential network changes. Ghost routing logically partitions the production network into a main network and a ghost network. The main network handles live traffic while the ghost network handles traffic generated for diagnostic purposes. The ghost network may have a network topology identical to the production network and may use the same hardware and software as the production network. An operator may implement a network configuration change on the ghost network and then use verification tools to verify that the network configuration change on the ghost network does not result in bugs. Verifying on the ghost network may not affect the main network. If the network operator verifies the network configuration change on the ghost network, the network operator may implement the network configuration change on the main network.

Patent Agency Ranking