Encoding and verifying network intents for stateful networks

    公开(公告)号:US10771342B2

    公开(公告)日:2020-09-08

    申请号:US16176905

    申请日:2018-10-31

    Abstract: Example method includes: identifying three relationships about a network function in an intent-based stateful network—(1) the network function forwarding a network packet implies that at least one previous network packet was received by the network function in the same direction prior to the network packet is forwarded, (2) an established state in the network function implies that at least one previous network packet was received at the network function, (3) the network function receiving the network packet as a downward network function implies the network packet was previously sent by a second network function acting as an upward network function; encoding the network function using a combination of at least one of the three identified relationships; and verifying a plurality of network intents in the intent-based stateful network based at least in part on the encoding of the network function.

    Network affinity index increase
    32.
    发明授权

    公开(公告)号:US10728132B2

    公开(公告)日:2020-07-28

    申请号:US15611095

    申请日:2017-06-01

    Abstract: Examples herein relate to identifying a placement of a virtual network function (VNF) to increase a network affinity index. For example a method, executable by a network controller, determines for the VNF the network affinity index over a period of time. The network affinity index identifies a number of packets received by the VNF from a data locality corresponding to a processing unit hosting the VNF. The method proceeds to identify a placement of the VNF extrinsic to the processing unit hosting the VNF to increase the network affinity index.

    Server discrete side information
    33.
    发明授权

    公开(公告)号:US10721150B2

    公开(公告)日:2020-07-21

    申请号:US15571522

    申请日:2015-05-12

    Abstract: In some examples, a method can include receiving, at a network monitor, discrete side information from a first server at a first rack regarding a data flow between the first server and a second server at a rack other than the first rack. The discrete side information can, for example, include an indicator determined by the first server that indicates whether the data flow satisfies a reference criteria. The method can further include performing, with the network monitor, a network inference process partly based on the received discrete side information.

    Device for orchestrating distributed application deployment with end-to-end performance guarantee

    公开(公告)号:US10686678B2

    公开(公告)日:2020-06-16

    申请号:US15990554

    申请日:2018-05-25

    Abstract: A method for receiving, in an application orchestrator, a request for executing an application. The method includes identifying a function sequence to complete the application, each function in the function sequence is executed in one instance, and identifying an instance chain of the functions to complete the application, wherein the instance chain includes an instance for each function in the function sequence. The method includes tracking a performance of each instance for each function in the chain, and selecting an application execution route based on the performance that includes the instance chain of the functions to complete the application. The method includes allocating a server resource to each instance for each function and modifying the application execution route based on a performance and a performance policy. A system and a computer readable medium storing instructions to perform the above method are also provided.

    Determining violation of a network invariant

    公开(公告)号:US10541873B2

    公开(公告)日:2020-01-21

    申请号:US15775378

    申请日:2015-11-20

    Abstract: Example implementations relate to determining whether network invariants are violated by flow rules to be implemented by the data plane of a network. In an example, a verification module implemented on a device receives a flow rule transmitted from an SDN controller to a switch, the flow rule relating to an event. The module determines whether the flow rule matches any of a plurality of network invariants cached in the device. If determined that the flow rule matches one of the plurality of network invariants, the verification module determines whether the flow rule violates the matched network invariant. If determined that the flow rule does not match any of the plurality of network invariants, the verification module (1) reports the event associated with the flow rule to a policy management module, (2) receives a new network invariant related to the event from the policy management module, and (3) determines whether the flow rule violates the new network invariant. The verification module generates an alarm if determined that the flow rule violates any of the network invariants.

    NETWORK AFFINITY INDEX INCREASE
    40.
    发明申请

    公开(公告)号:US20180351843A1

    公开(公告)日:2018-12-06

    申请号:US15611095

    申请日:2017-06-01

    Abstract: Examples herein relate to identifying a placement of a virtual network function (VNF) to increase a network affinity index. For example a method, executable by a network controller, determines for the VNF the network affinity index over a period of time. The network affinity index identifies a number of packets received by the VNF from a data locality corresponding to a processing unit hosting the VNF. The method proceeds to identify a placement of the VNF extrinsic to the processing unit hosting the VNF to increase the network affinity index.

Patent Agency Ranking