NETWORK CONFIGURATION VERIFICATION IN COMPUTING SYSTEMS

    公开(公告)号:US20240015072A1

    公开(公告)日:2024-01-11

    申请号:US18370824

    申请日:2023-09-20

    CPC classification number: H04L41/0895 H04L41/0894

    Abstract: Techniques of network configuration verification are disclosed herein. One example process includes, upon receiving a query to determine whether a packet from a first endpoint is reachable to a second endpoint in a virtual network, identifying a network path between the first endpoint to the second endpoint in a network graph. The network graph has nodes representing corresponding enforcement points of network policies in the virtual network and edges connecting pairs of the nodes. The example process can also include generating compound function representing conjoined individual constraints of the network policies at each of the nodes in the network graph along the identified network path, compiling the generated compound function into a Boolean formula, and solving the compiled Boolean formula to determine whether an assignment of values to packet fields of the packet exists such that all the conjoined individual constraints of the compound function can be satisfied.

    GUARANTYING SLA THRU EDGE CLOUD PATH ORCHESTRATION

    公开(公告)号:US20230018685A1

    公开(公告)日:2023-01-19

    申请号:US17376653

    申请日:2021-07-15

    Abstract: The present application relates to communications between a partner network and a wide area network (WAN) via the Internet. Although Internet service providers may act as autonomous systems, the WAN may control routing from the partner network by advertising unicast border gateway protocol (BGP) address prefixes for a plurality of front-end devices in the WAN. An agent in the partner network measures a plurality of paths to a service within the WAN. Each of the plurality of paths is associated with one of the plurality of front-end devices and a respective unicast BGP address prefix. The WAN selects a path within the WAN for the service. The WAN exports a routing rule to the agent. The agent forwards data packets for the service to the respective BGP address prefix via the Internet. The WAN receives data packets for the service of the partner network at the selected device.

    AUTOMATICALLY DETECTING ANOMALIES IN COMPLEX CONFIGURATIONS

    公开(公告)号:US20240370276A1

    公开(公告)日:2024-11-07

    申请号:US18333930

    申请日:2023-06-13

    Abstract: The present application relates to a system, apparatus, and method of detecting anomalies in configurations of computer systems. A computer may execute a configuration analyzer to infer a configuration template that is applicable to multiple configuration files. The configuration analyzer configuration uses unsupervised learning on the configuration template to score parameters within each configuration file. The configuration analyzer indicates an anomaly for a parameter of a configuration file exceeding a threshold score. Inferring a configuration template may include generating a lowest cost template that is applicable to two of the multiple configuration files based on a cost function; and combining the lowest cost template with a subsequent configuration file of the multiple configuration files to generate an updated lowest cost template until the updated lowest cost template is applicable to all of the multiple configuration files.

    PROVISIONING EDGE BACKHAULS FOR DYNAMIC WORKLOADS

    公开(公告)号:US20230088681A1

    公开(公告)日:2023-03-23

    申请号:US17478369

    申请日:2021-09-17

    Abstract: Network capacity is provisioned in a computing environment comprising a computing service provider and an edge computing network. A cost function is applied to usage data for a number of user endpoints at the edge computing network, a number and type of workloads at the edge computing network, offload capability of the edge computing network, and resource capacities at the edge computing network. An estimated network capacity is determined, where the workloads are dynamic, and the cost function is usable to optimize the network capacity with respect to one or more criteria.

    AUTOMATIC VERIFICATION OF SAFETY FOR VIRTUALIZED NETWORKS

    公开(公告)号:US20220417102A1

    公开(公告)日:2022-12-29

    申请号:US17359241

    申请日:2021-06-25

    Abstract: Described are examples for providing a system for managing configuration and policies for a virtualized wide area network (vWAN) support on a wide area network (WAN). The vWAN includes a plurality of virtual network entities associated with geographic locations including the physical computing resources of the WAN and virtual connections between the virtual network entities. The system includes a network safety component for managing configurations and policies of the vWAN on the WAN. The network safety component receives a change to a policy or configuration of the vWAN from an operator of a network connected to the vWAN. The network safety component evaluates a set of safety rules for the operator based on the change and a network state of a physical WAN underlying the vWAN. The network safety component generates an error message in response to at least one of the set of safety rules failing the evaluation.

    GHOST ROUTING
    9.
    发明申请

    公开(公告)号:US20250141777A1

    公开(公告)日:2025-05-01

    申请号:US19011331

    申请日:2025-01-06

    Abstract: Ghost routing is a network verification technique that uses a portion of a production network itself to verify the impact of potential network changes. Ghost routing logically partitions the production network into a main network and a ghost network. The main network handles live traffic while the ghost network handles traffic generated for diagnostic purposes. The ghost network may have a network topology identical to the production network and may use the same hardware and software as the production network. An operator may implement a network configuration change on the ghost network and then use verification tools to verify that the network configuration change on the ghost network does not result in bugs. Verifying on the ghost network may not affect the main network. If the network operator verifies the network configuration change on the ghost network, the network operator may implement the network configuration change on the main network.

Patent Agency Ranking