Highly-available distributed network address translation (NAT) architecture with failover solutions

    公开(公告)号:US11436111B2

    公开(公告)日:2022-09-06

    申请号:US16592613

    申请日:2019-10-03

    Abstract: This disclosure describes techniques for providing a distributed scalable architecture for Network Address Translation (NAT) systems with high availability and mitigations for flow breakage during failover events. The NAT servers may include functionality to serve as fast-path servers and/or slow-path servers. A fast-path server may include a NAT worker that includes a cache of NAT mappings to perform stateful network address translation and to forward packets with minimal latency. A slow-path server may include a mapping server that creates new NAT mappings, depreciates old ones, and answers NAT worker state requests. The NAT system may use virtual mapping servers (VMSs) running on primary physical servers with state duplicated VMSs on different physical failover servers. Additionally, the NAT servers may implement failover solutions for dynamically allocated routable address/port pairs assigned to new sessions by assigning new outbound address/port pairs when a session starts and broadcasting pairing information.

    PARTIAL PACKET ENCRYPTION IN ENCRYPTED TUNNELS

    公开(公告)号:US20220070154A1

    公开(公告)日:2022-03-03

    申请号:US17002170

    申请日:2020-08-25

    Abstract: Techniques and mechanisms to reduce double encryption of packets that are transmitted using encrypted tunnels. The techniques described herein include determining that portions of the packets are already encrypted, identifying portions of the packets that are unencrypted, and selectively encrypting the portions of the packets that are unencrypted prior to transmission through the encrypted tunnel. In this way, potentially private or sensitive data in the packets that is unencrypted, such as information in the packet headers, will be encrypted using the encryption protocol of the encrypted tunnel, but the data of the packets that is already encrypted, such as the payload, may avoid unnecessary double encryption. By reducing (or eliminating) the amount of data in data packets that is double encrypted, the amount of time taken by computing devices, and computing resources consumed, to encrypted traffic for encrypted tunnels may be reduced.

    Load Balancing Communication Sessions in a Networked Computing Environment

    公开(公告)号:US20210359954A1

    公开(公告)日:2021-11-18

    申请号:US16875524

    申请日:2020-05-15

    Abstract: Techniques for load balancing communication sessions in a networked computing environment are described herein. The techniques may include establishing a first communication session between a client device and a first computing resource of a networked computing environment. Additionally, the techniques may include storing, in a data store, data indicating that the first communication session is associated with the first computing resource. The techniques may further include receiving, at a second computing resource of the networked computing environment, traffic associated with a second communication session that was sent by the client device, and based at least in part on accessing the data stored in the data store, establishing a traffic redirect such that the traffic and additional traffic associated with the second communication session is sent from the second computing resource to the first computing resource.

    Automatically producing software images

    公开(公告)号:US10915307B2

    公开(公告)日:2021-02-09

    申请号:US15902604

    申请日:2018-02-22

    Abstract: In one embodiment, a server generates expected levels of capability associated with possible combinations of settings for first and second adjustable parameters for an aspect of a software image feature. The server receives an indication of a desired level of capability for the aspect of the software image feature and, based on the indication, identifies a particular expected level of capability associated with a particular possible combination of the settings for the first and second adjustable parameters. The particular expected level of capability is closer to a desired level of capability for an aspect of a software image feature than the other expected levels of capability associated with the possible combinations of the settings for the first and second adjustable parameters. The server produces a software image that includes the particular possible combination of the settings for the first and second adjustable parameters.

    Time sensitive networking in a microservice environment

    公开(公告)号:US10911332B2

    公开(公告)日:2021-02-02

    申请号:US16221857

    申请日:2018-12-17

    Abstract: A cloud orchestration platform obtains from a policy controller, application flow requirements for an application to be deployed in a container network that includes a plurality of microservices. The cloud orchestration platform determines a path through at least a subset of the plurality of microservices based on the application flow requirements, and computes information describing compute resources for workloads associated with the path through the plurality of microservices needed to support the application flow requirements. The cloud orchestration platform creates and/or reserves the workloads among the plurality of microservices. The cloud orchestration platform communicates scheduling requirements to a scheduling driver function associated with the plurality of microservices, the scheduling deriver function using the scheduling requirements to coordinate scheduling of workloads based on the path. The cloud orchestration platform directs traffic associated with the application into the container network.

    Identifying execution environments for deploying network functions

    公开(公告)号:US12236229B2

    公开(公告)日:2025-02-25

    申请号:US18114708

    申请日:2023-02-27

    Abstract: This disclosure describes techniques and mechanisms for using a domain-specific language (DSL) to express and compile serverless network functions, and optimizing the deployment location for the serverless network functions on network devices. In some examples, the serverless network functions may be expressed entirely in the DSL (e.g., via a text-based editor, a graphics-based editor, etc.), where the DSL is a computer language specialized to a particular domain, such as a network function domain. In additional examples, the serverless network functions may be expressed and compiled using a DSL in combination with a general-purpose language (GSL). Once the serverless network function have been expressed and/or compiled, the techniques of this disclosure further include determining an optimized network component on which the serverless network function is to execute, and deploying the serverless function to the optimized network component.

    Creating network-based consent contracts

    公开(公告)号:US12184661B2

    公开(公告)日:2024-12-31

    申请号:US17183900

    申请日:2021-02-24

    Abstract: Techniques for creating consent contracts for devices that indicate whether the devices consent to receiving network-based communications from other devices. Further, the techniques include enforcing the consent contracts such that network-based communications are either allowed or disallowed in the network-communications layer prior to the network communications reaching the devices. Rather than simply allowing a device to communicate with any other device over a network, the techniques described herein include building in consent for network-based communications where the consent is consulted at one or more points in a communication process to make informed decisions about network-based traffic.

    Network address translation (NAT)-based traffic steering

    公开(公告)号:US12095665B2

    公开(公告)日:2024-09-17

    申请号:US17572320

    申请日:2022-01-10

    CPC classification number: H04L45/74 H04L69/165

    Abstract: Techniques for Network Address Translation (NAT)-based steering of traffic in cloud-based networks. The techniques may include establishing, by a frontend node of a network, a connection with a client device. The frontend node may receive, via the connection, a packet including an indication of an identity of a service hosted on a backend node of the network. Based at least in part on the indication, the frontend node may establish a second connection with the backend node. Additionally, the frontend node may store a mapping indicating that packets received from the client device are to be sent to the backend node. The techniques may also include receiving another packet at the frontend node or another frontend node of the network. Based at least in part on the mapping, the frontend node or other frontend node may alter one or more network addresses of the other packet and forward it to the backend node.

Patent Agency Ranking