Service aware virtual private network for optimized forwarding in cloud native environment

    公开(公告)号:US11336567B2

    公开(公告)日:2022-05-17

    申请号:US16853331

    申请日:2020-04-20

    Abstract: Techniques for defining a service flow definition among container pods that provide services in a network. The techniques may include an orchestrator of a computer network platform of the network determining which container pods need to communicate with which container pods. The service flow definition thus indicates needed paths between the container pods. In configurations, a cluster topology may be determined where the cluster topology indicates corresponding nodes of the network in which each container pod is located, as well as end points of the network with which the corresponding nodes communicate. Based at least in part on the service flow definition and the cluster topology, corresponding route distribution policies may be determined for the end points. The corresponding route distribution policies may be applied to the end points.

    Service or network function workload preemption

    公开(公告)号:US11245751B1

    公开(公告)日:2022-02-08

    申请号:US16580082

    申请日:2019-09-24

    Abstract: Techniques are described to provide service or network function workload preemption. In one example, a method includes identifying a network location at which a first function can be instantiated; determining whether compute resources are available at the network location to instantiate the first function; based on determining that compute resources are available, instantiating the first function; based on determining that compute resources are not available, determining whether preemption of a second function can be performed at the network location, wherein determining whether preemption of the second function can be performed is based, at least in part, on a comparison between a setup priority of the first function and a holdover priority of the second function; and, based on determining that preemption of the second function at the network location can be performed, performing preemption of the second function and instantiating the first function at the network location.

    SERVICE AWARE VIRTUAL PRIVATE NETWORK FOR OPTIMIZED FORWARDING IN CLOUD NATIVE ENVIRONMENT

    公开(公告)号:US20210328913A1

    公开(公告)日:2021-10-21

    申请号:US16853331

    申请日:2020-04-20

    Abstract: Techniques for defining a service flow definition among container pods that provide services in a network. The techniques may include an orchestrator of a computer network platform of the network determining which container pods need to communicate with which container pods. The service flow definition thus indicates needed paths between the container pods. In configurations, a cluster topology may be determined where the cluster topology indicates corresponding nodes of the network in which each container pod is located, as well as end points of the network with which the corresponding nodes communicate. Based at least in part on the service flow definition and the cluster topology, corresponding route distribution policies may be determined for the end points. The corresponding route distribution policies may be applied to the end points.

    Methods and apparatuses for content delivery over mobile networks with multi-access edge computing (MEC) control and user plane separation (CUPS)

    公开(公告)号:US11038979B2

    公开(公告)日:2021-06-15

    申请号:US16184220

    申请日:2018-11-08

    Abstract: A method is performed at a mobile core, including assigning a first cache servicing a client device in response to a first request for a media content item based at least in part on a first IP address of the client device associated with a first edge location. The method further includes providing a first portion of the media content item from the first cache. The method additionally includes triggering a plurality of caches at edge locations proximate to the first edge location to retrieve a second portion of the media content item. The method also includes receiving a continuation request from the client device with a second IP address associated with a second edge location. The method further includes selecting a second cache from the plurality of caches based at least in part on the second IP address and continuing providing the media content item from the second cache.

    In-situ OAM (IOAM) network risk flow-based “topo-gram” for predictive flow positioning

    公开(公告)号:US10958506B2

    公开(公告)日:2021-03-23

    申请号:US15834284

    申请日:2017-12-07

    Abstract: A system and method predict risks of failure or performance issues in a network to predictively position traffic flows in the network. For a traffic flow through a network, first data accumulated in a header of packets for the traffic flow is obtained, which header is populated by network elements along a path of the traffic flow through the network. Second data is obtained about the network in general including other network elements not along the path of the traffic flow. Machine learning analysis is performed to derive rules that characterize failure or performance risk issues in the network. The rules and topology data describing a topology of the network are applied to a model to create a topological graphical representation indicating failure or performance issues in the network that affect the traffic flow. A path for the traffic flow is modified based on the topological graphical representation.

    Dynamically-changing identity for IoT devices with blockchain validation

    公开(公告)号:US10924283B2

    公开(公告)日:2021-02-16

    申请号:US15620015

    申请日:2017-06-12

    Abstract: Techniques for use in generating a dynamically-changing IoT device identity with robust blockchain validation are provided. When entering a communication network, an IoT device performs a procedure for registration. The procedure includes communicating, in a transaction, data associated with the IoT device to a network device (e.g. a fog router). The data includes, amongst other data items, an identity for addressing communications to and from the IoT device. A transaction number associated with the transaction is received based on a blockchain registration of the transaction. An updated identity of the IoT device is then derived based on the transaction number. In one example, the updated identity of the IoT device may be derived by combining a static address of the IoT device and the transaction number. The steps may be repeated by the device for each one of a plurality of network registrations.

    IN SITU TRIGGERED FUNCTION AS A SERVICE WITHIN A SERVICE MESH

    公开(公告)号:US20200052982A1

    公开(公告)日:2020-02-13

    申请号:US16102395

    申请日:2018-08-13

    Abstract: The present technology is directed to a system and method for automatic triggering of relevant code segments corresponding to a sequence of code segments or function codes having a preferred execution order. The automatic triggering action is based on the snooping of a response generated from an execution of a previous code segment. Information with respect to the next code segment in the preferred execution order may be obtained by directing a network proxy, such as Envoy to snoop the Uniform Resource Identifier (URI) field of a response packet being forwarded to a client entity. In this way, a network proxy may preemptively spawn and instantiate the following function codes (pointed to by the snooped Uniform Resource Identifier) prior to receiving the corresponding client request. As such, by the time a client request for the subsequent function code is received the code ready for execution.

Patent Agency Ranking