摘要:
A Network Function Virtualization (NFV) data system controls virtual Probe (vProbe) deployment in an NFV Infrastructure (NFVI). An NFV Management and Orchestration (MANO) system receives Key Performance Indicators (KPIs) for the NFVI and processes the KPIs to generate NFV indices. The MANO system processes the NFV indices to trigger a vProbe deployment in the NFVI. Before vProbe deployment, the NFV MANO system compares the NFV indices that triggered the vProbe deployment to false-positive vProbe deployment criteria. The NFV MANO system blocks the vProbe deployment when the NFV indices that triggered the vProbe deployment correspond to the false-positive vProbe deployment criteria. The NFV MANO system initiates the vProbe deployment when the triggering NFV indices do not correspond to the false-positive vProbe deployment criteria. The NFVI may execute SDN applications and controllers that communicate over a virtual switch that hosts the vProbe.
摘要:
A Software-Defined Network (SDN) distributes Proxy Correlation Index (PCI) information across an SDN data-plane. A central SDN controller receives inbound SDN signaling from a source SDN controller serving a source geographic area indicating a PCI threshold breach in the SDN data-plane in the source geographic area. The central SDN controller generates PCI information that characterizes the PCI threshold breach. The central SDN controller selects a target SDN controller in a target geographic area responsive to the PCI threshold breach. The central SDN controller transfers outbound SDN signaling having the PCI information for delivery to the target SDN controller in the target geographic area.
摘要:
A Network Function Virtualization (NFV) Software Defined Network (SDN) performs a network task. An NFV management system processes Key Performance Indicators (KPIs) to identify the network task and to direct an NFV orchestration system to install a virtual Probe (vProbe) with filter criteria to collect additional KPIs for the network task. The NFV orchestration system directs an NFV Infrastructure (NFVI) to install the vProbe. The vProbe sends the filter criteria to a virtual Switch (vSW) in the NFVI, and the vSW applies the filter criteria to Virtual Network Function (VNF) traffic and transfers the filtered data to the vProbe. The vProbe processes the filtered data to generate the additional KPIs for the NFV management system. The NFV management system processes the additional KPIs to perform the network task.
摘要:
A Software-Defined Network (SDN) distributes Proxy Correlation Index (PCI) control in an SDN data-plane. An SDN controller transfers SDN signaling that indicates a data-plane PCI configuration. An SDN data machine processes the SDN signaling and configures a PCI generator and a flow controller to implement the data-plane PCI configuration. The SDN data-plane machine processes user data flows per a Flow Description Table (FDT) and generates Key Performance Indicators (KPIs) for the user data flows. The PCI generator generates PCIs based on the KPIs and the data-plane PCI configuration. The flow controller updates the FDT based on the PCIs and the data-plane PCI configuration. The SDN data-plane machine processes the user data flows per the updated FDT.
摘要:
A wireless communication system to secure data communications between APIs. The wireless communication system includes a first API for a first sensor in a first wireless communication device and a second API for a second sensor in a second wireless communication device. In the first wireless communication device, identifying an API request to externally share sensor data, and in response, performing a security challenge to verify the first API. If the first API is verified, then the API request is transferred to the second wireless communication device. In the second wireless communication device, performing a security challenge to verify the second API. If the second API is verified, then the API share request is transferred to the second API in the second wireless communication device.
摘要:
Systems, methods, and software for operating communication systems are provided herein. In one example, method of operating a communication system to establish secure communications between a first user device communicating in a first communication network and a second user device communicating in a second communication network is presented. The method includes, responsive to a communication request received from the first user device, establishing a secure communication link between the first user device and a first security node. When a second security node has a security relationship established with the first security node, the method includes establishing the secure communication link for the secure communications between the first user device and the second user device using at least the security relationship between the first security node and the second security node, and exchanging the secure communications over the secure communication link.
摘要:
In a Software Defined Network (SDN), a source SDN switch in a source geographic area generates switch performance data. The source SDN switch detects when its switch performance reaches a switch performance threshold based on its switch performance data, and in response, the source SDN switch transfers source switch information. An SDN controller receives the source switch information and selects a target SDN switch in a target geographic area based on the switch performance threshold and the source geographic area. The SDN controller transfers the source switch information to the target SDN switch in the target geographic area. The target SDN switch generates switch performance data and detects when SDN performance reaches a network performance threshold based on its switch performance data and the source switch information. The target SDN transfers SDN performance information to the SDN controller.
摘要:
A Software-Defined Network (SDN) distributes Proxy Correlation Index (PCI) control in an SDN data-plane. An SDN controller transfers SDN signaling that indicates a data-plane PCI configuration. An SDN data machine processes the SDN signaling and configures a PCI generator and a flow controller to implement the data-plane PCI configuration. The SDN data-plane machine processes user data flows per a Flow Description Table (FDT) and generates Key Performance Indicators (KPIs) for the user data flows. The PCI generator generates PCIs based on the KPIs and the data-plane PCI configuration. The flow controller updates the FDT based on the PCIs and the data-plane PCI configuration. The SDN data-plane machine processes the user data flows per the updated FDT.
摘要:
Systems, methods, and software for operating communication systems are provided herein. In one example, method of operating a communication system to establish secure communications between a first user device communicating in a first communication network and a second user device communicating in a second communication network is presented. The method includes, responsive to a communication request received from the first user device, establishing a secure communication link between the first user device and a first security node. When a second security node has a security relationship established with the first security node, the method includes establishing the secure communication link for the secure communications between the first user device and the second user device using at least the security relationship between the first security node and the second security node, and exchanging the secure communications over the secure communication link.
摘要:
Examples disclosed herein provide systems, methods, and software for communication using Common Public Radio Interface. In one example, a system for CPRI communication includes a radio equipment control system configured to generate a timing security flag for a basic frame, insert the security flag into the basic frame, and initiate transfer of the basic frame to a radio equipment system. The radio equipment system is further configured to receive the basic frame, identify validity of the timing security flag, and upon validation, update timing on the radio equipment.