Selectively monitoring a network of network function chains based on probability of service level agreement violation

    公开(公告)号:US11425049B2

    公开(公告)日:2022-08-23

    申请号:US16685877

    申请日:2019-11-15

    Abstract: In some implementations, a method includes conducting, by a network device, a query associated with a network function chain comprising a plurality of switches and middleboxes to verify whether a service performed by the network function chain complies with a Service Level Agreement (SLA); computing, by the network device, based on a result of the query, a difference in metric value between an actual performance metric of a packet passing through a path in the network function chain and an expected performance metric of the packet passing through the path; deriving, by the network device, a probability of SLA violation associated with the path based on the difference in metric value; and selectively monitoring, by the network device, a network of network function chains by monitoring the path for passive performance measurements based on the probability of SLA violation.

    GENERATING COMPOSITE NETWORK POLICY
    2.
    发明申请

    公开(公告)号:US20180316576A1

    公开(公告)日:2018-11-01

    申请号:US15581826

    申请日:2017-04-28

    Abstract: Example method includes: receiving, by a network device in a network, a first network policy and a second network policy configured by a network administrator, wherein the first network policy comprises a first metric and the second network policy comprises a second and different metric; detecting, by the network device, a conflict between the first network policy and the second network policy; determining, by the network device, a relationship between the first metric and the second metric; modifying, by the network device, at least one of the first network policy and the second network policy to resolve the conflict based on the relationship between the first metric and the second metric; and combining, by the network device, the first network policy and the second network policy to generate a composite network policy that is represented on a single policy graph.

    MIDDLEBOX MODELING
    4.
    发明申请
    MIDDLEBOX MODELING 审中-公开

    公开(公告)号:US20180131621A1

    公开(公告)日:2018-05-10

    申请号:US15345123

    申请日:2016-11-07

    CPC classification number: H04L43/028 H04L41/145 H04L67/1004

    Abstract: In some examples, a method includes parsing, by a network device, a section of source code associated with a network function provided by a middlebox in a network; extracting, by the network device, a packet processing slice and a state transition slice from the section of source code; generating, by the network device, a plurality of execution paths from the packet processing slice and the state transition slice; and modeling the middlebox by inserting, by the network device, the plurality of execution paths to a match-action table that describes a packet processing model for the middlebox.

    SELECTIVELY MONITORING A NETWORK OF NETWORK FUNCTION CHAINS BASED ON PROBABILITY OF SERVICE LEVEL AGREEMENT VIOLATION

    公开(公告)号:US20200084152A1

    公开(公告)日:2020-03-12

    申请号:US16685877

    申请日:2019-11-15

    Abstract: In some implementations, a method includes conducting, by a network device, a query associated with a network function chain comprising a plurality of switches and middleboxes to verify whether a service performed by the network function chain complies with a Service Level Agreement (SLA); computing, by the network device, based on a result of the query, a difference in metric value between an actual performance metric of a packet passing through a path in the network function chain and an expected performance metric of the packet passing through the path; deriving, by the network device, a probability of SLA violation associated with the path based on the difference in metric value; and selectively monitoring, by the network device, a network of network function chains by monitoring the path for passive performance measurements based on the probability of SLA violation.

    INFERRING A LABEL NAMESPACE
    6.
    发明申请

    公开(公告)号:US20180314957A1

    公开(公告)日:2018-11-01

    申请号:US15582195

    申请日:2017-04-28

    Abstract: Example method includes: negotiating, by a network device, a location of a data source for a particular network infrastructure manager; inferring, by the network device, a meta label namespace by analyzing the data source, wherein the meta label namespaces comprises at least a relationship between a plurality of meta labels; inferring, by the network device, a label namespace that is specific to the particular network infrastructure manager from the meta label namespace; converting, by the network device, the label namespace to an abstract label namespace; and aggregating, by the network device, the abstract label namespace into a global label namespace that is applicable across diverse network infrastructures.

    NETWORK POLICY GRAPHS
    8.
    发明申请

    公开(公告)号:US20170222873A1

    公开(公告)日:2017-08-03

    申请号:US15500628

    申请日:2014-11-06

    Abstract: Example implementations disclosed herein can be used to generate composite network policy graphs based on multiple network policy graphs input by network users that may have different goals for the network. The resulting composite network policy graph can be used to program a network so that it meets the requirements necessary to achieve the goals of at least some of the network users. In one example implementation, a method can include receiving multiple network policy graphs, generating composite endpoint groups based on relationships between endpoint groups and policy graph sources, generating composite paths based on the relationships between the endpoints and the network policy graphs, generating a composite network policy graph based on the composite endpoint groups and the composite paths, and analyzing the composite network policy graph to determine conflicts or errors.

    Network policy graphs
    9.
    发明授权

    公开(公告)号:US10992520B2

    公开(公告)日:2021-04-27

    申请号:US15500628

    申请日:2014-11-06

    Abstract: Example implementations disclosed herein can be used to generate composite network policy graphs based on multiple network policy graphs input by network users that may have different goals for the network. The resulting composite network policy graph can be used to program a network so that it meets the requirements necessary to achieve the goals of at least some of the network users. In one example implementation, a method can include receiving multiple network policy graphs, generating composite endpoint groups based on relationships between endpoint groups and policy graph sources, generating composite paths based on the relationships between the endpoints and the network policy graphs, generating a composite network policy graph based on the composite endpoint groups and the composite paths, and analyzing the composite network policy graph to determine conflicts or errors.

Patent Agency Ranking