Middlebox modeling
    1.
    发明授权

    公开(公告)号:US10594574B2

    公开(公告)日:2020-03-17

    申请号:US15345123

    申请日:2016-11-07

    Abstract: In some examples, a method includes parsing, by a network device, a section of source code associated with a network function provided by a middlebox in a network; extracting, by the network device, a packet processing slice and a state transition slice from the section of source code; generating, by the network device, a plurality of execution paths from the packet processing slice and the state transition slice; and modeling the middlebox by inserting, by the network device, the plurality of execution paths to a match-action table that describes a packet processing model for the middlebox.

    SELECTIVELY MONITORING A NETWORK OF NETWORK FUNCTION CHAINS BASED ON PROBABILITY OF SERVICE LEVEL AGREEMENT VIOLATION

    公开(公告)号:US20200084152A1

    公开(公告)日:2020-03-12

    申请号:US16685877

    申请日:2019-11-15

    Abstract: In some implementations, a method includes conducting, by a network device, a query associated with a network function chain comprising a plurality of switches and middleboxes to verify whether a service performed by the network function chain complies with a Service Level Agreement (SLA); computing, by the network device, based on a result of the query, a difference in metric value between an actual performance metric of a packet passing through a path in the network function chain and an expected performance metric of the packet passing through the path; deriving, by the network device, a probability of SLA violation associated with the path based on the difference in metric value; and selectively monitoring, by the network device, a network of network function chains by monitoring the path for passive performance measurements based on the probability of SLA violation.

    Generating composite network policy

    公开(公告)号:US10812342B2

    公开(公告)日:2020-10-20

    申请号:US15581826

    申请日:2017-04-28

    Abstract: Example method includes: receiving, by a network device in a network, a first network policy and a second network policy configured by a network administrator, wherein the first network policy comprises a first metric and the second network policy comprises a second and different metric; detecting, by the network device, a conflict between the first network policy and the second network policy; determining, by the network device, a relationship between the first metric and the second metric; modifying, by the network device, at least one of the first network policy and the second network policy to resolve the conflict based on the relationship between the first metric and the second metric; and combining, by the network device, the first network policy and the second network policy to generate a composite network policy that is represented on a single policy graph.

    Selectively monitoring a network of network function chains based on probability of service level agreement violation

    公开(公告)号:US11425049B2

    公开(公告)日:2022-08-23

    申请号:US16685877

    申请日:2019-11-15

    Abstract: In some implementations, a method includes conducting, by a network device, a query associated with a network function chain comprising a plurality of switches and middleboxes to verify whether a service performed by the network function chain complies with a Service Level Agreement (SLA); computing, by the network device, based on a result of the query, a difference in metric value between an actual performance metric of a packet passing through a path in the network function chain and an expected performance metric of the packet passing through the path; deriving, by the network device, a probability of SLA violation associated with the path based on the difference in metric value; and selectively monitoring, by the network device, a network of network function chains by monitoring the path for passive performance measurements based on the probability of SLA violation.

    GENERATING COMPOSITE NETWORK POLICY
    6.
    发明申请

    公开(公告)号:US20180316576A1

    公开(公告)日:2018-11-01

    申请号:US15581826

    申请日:2017-04-28

    Abstract: Example method includes: receiving, by a network device in a network, a first network policy and a second network policy configured by a network administrator, wherein the first network policy comprises a first metric and the second network policy comprises a second and different metric; detecting, by the network device, a conflict between the first network policy and the second network policy; determining, by the network device, a relationship between the first metric and the second metric; modifying, by the network device, at least one of the first network policy and the second network policy to resolve the conflict based on the relationship between the first metric and the second metric; and combining, by the network device, the first network policy and the second network policy to generate a composite network policy that is represented on a single policy graph.

    MIDDLEBOX MODELING
    7.
    发明申请
    MIDDLEBOX MODELING 审中-公开

    公开(公告)号:US20180131621A1

    公开(公告)日:2018-05-10

    申请号:US15345123

    申请日:2016-11-07

    CPC classification number: H04L43/028 H04L41/145 H04L67/1004

    Abstract: In some examples, a method includes parsing, by a network device, a section of source code associated with a network function provided by a middlebox in a network; extracting, by the network device, a packet processing slice and a state transition slice from the section of source code; generating, by the network device, a plurality of execution paths from the packet processing slice and the state transition slice; and modeling the middlebox by inserting, by the network device, the plurality of execution paths to a match-action table that describes a packet processing model for the middlebox.

Patent Agency Ranking