Network embedded real time service level objective validation

    公开(公告)号:US10931542B2

    公开(公告)日:2021-02-23

    申请号:US16101273

    申请日:2018-08-10

    IPC分类号: H04L12/24 H04L12/26 H04L29/08

    摘要: A mechanism is disclosed for performing network embedded real time service level objective (SLO) validation. A first data packet is received as part of a data flow. The first data packet includes a SLO indicating a network service threshold, the SLO including a key performance indicator (KPI) indicating a network service metric to be compared to the network service threshold. A service provided by the network device is measured according to the network service metric indicated by the KPI to obtain a measured service result. The measured service result is compared to the network service threshold indicated by the SLO to determine when the service provided by the network device has violated the SLO. Based on the determination that the service has violated the SLO, a defined action is performed.

    Network Embedded Real Time Service Level Objective Validation

    公开(公告)号:US20200052979A1

    公开(公告)日:2020-02-13

    申请号:US16101273

    申请日:2018-08-10

    IPC分类号: H04L12/24 H04L29/08 H04L12/26

    摘要: A mechanism is disclosed for performing network embedded real time service level objective (SLO) validation. A first data packet is received as part of a data flow. The first data packet includes a SLO indicating a network service threshold, the SLO including a key performance indicator (KPI) indicating a network service metric to be compared to the network service threshold. A service provided by the network device is measured according to the network service metric indicated by the KPI to obtain a measured service result. The measured service result is compared to the network service threshold indicated by the SLO to determine when the service provided by the network device has violated the SLO. Based on the determination that the service has violated the SLO, a defined action is performed.

    Identity and Metadata Based Firewalls in Identity Enabled Networks

    公开(公告)号:US20180343236A1

    公开(公告)日:2018-11-29

    申请号:US15969135

    申请日:2018-05-02

    IPC分类号: H04L29/06

    摘要: A method implemented by a firewall device in a network, comprising storing, by a memory, a firewall policy comprising information indicating whether to forward a data packet from a sending host entity to a receiving host entity, receiving, by a receiver, a data packet from a sending host entity, wherein the data packet includes an identifier of the receiving host entity, and determining, by a processor coupled to the memory and the receiver, whether to forward the data packet to the receiving host entity based on the firewall policy and the identifier of the receiving host entity.

    Network embedded real time service level objective validation

    公开(公告)号:US11621896B2

    公开(公告)日:2023-04-04

    申请号:US17160150

    申请日:2021-01-27

    摘要: A mechanism is disclosed for performing network embedded real time service level objective (SLO) validation. The mechanism may be implemented by a network device including a processor configured to generate a data packet as part of a data flow, the data packet including a service level objective (SLO), the SLO indicating a network service threshold and including a key performance indicator (KPI), the KPI indicating a network service metric to be compared to the network service threshold; a transmitter coupled to the processor, the transmitter configured to transmit the data packet toward a network; and a receiver coupled to the processor, the receiver configured to receive a message, the message indicating to the network device whether a service provided by the network has met or violated the SLO.

    ID-based data plane security for identity-oriented networks

    公开(公告)号:US10764050B2

    公开(公告)日:2020-09-01

    申请号:US15640156

    申请日:2017-06-30

    摘要: A computer-implemented method of transmitting encrypted data comprises accessing, by one or more processors of an origination endpoint, first data to be transmitted to a destination having a corresponding identifier; generating, by the one or more processors, an identifier security header; generating, by the one or more processors, second data from the first data and the identifier security header; encrypting, by the one or more processors, the second data; generating, by the one or more processors, authentication data based on the encrypted second data; generating, by the one or more processors, third data from the encrypted second data and the authentication data; generating, by the one or more processors, fourth data from the identifier corresponding to the destination and the third data; and sending, by the one or more processors, the fourth data to the destination.