Patents Issued in February 1, 2024
-
Publication number: 20240039798Abstract: Methods and systems are described herein for generating communication modifications to reduce inaccurate machine-learning-based communication suppressions. The system may receive a candidate communication to be sent to a user device or user account. The system may generate a prediction indicating whether a negative action is likely to be taken by a machine learning model with respect to the candidate communication. Based on a prediction that a negative action is likely to be taken by a machine learning model with respect to the candidate communication, the system may modify the candidate communication.Type: ApplicationFiled: August 1, 2022Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Christopher McDANIEL, Matthew Louis NOWAK, Michael Anthony YOUNG, JR.
-
Publication number: 20240039799Abstract: Systems and methods of the present disclosure are directed to a computer implemented method performed by a Wireless Communication Device (WCD). The method includes receiving information from a network node. The information includes an Artificial Intelligence (AI)/Machine Learning (ML) model that outputs a set of output parameters that represent whether a Random Access (RA) procedure to be performed by the WCD will be successful based on a set of input parameters. Or the information includes information about or that characterizes the AI/ML model that enables the WCD to build the AI/ML model that outputs the set of output parameters that represent whether the RA procedure to be performed by the WCD will be successful based on the set of input parameters. The method includes adapting one or more RA parameters for the RA procedure based on the AI/ML model.Type: ApplicationFiled: December 10, 2021Publication date: February 1, 2024Inventors: Ali Parichehrehteroujeni, Joel Berglund, Henrik Rydén
-
Publication number: 20240039800Abstract: Disclosed communication flow modeling solution is significantly streamlined in a user friendly way to shield users from the technical complexities usually required. At design time, an orchestration flow modeling application receives user instruction to open or create a communication flow modeling project. Per configuration specific to an enterprise associated with the user, a custom drag-and-drop communication flow modeling environment with a canvas and modeling entities is provided. Responsive to the user dragging and dropping a set of modeling entities from the menu onto the communication flow modeling canvas and drawing connections between them, the orchestration flow modeling application logically connects the modeling entities to form a valid communication flow and stores it in a database. The communication flow undergoes an approval process. Once approved, it is activated for execution by an orchestration server.Type: ApplicationFiled: October 11, 2023Publication date: February 1, 2024Inventors: Robert Smith, Christian Askland, Philip Gyuling, Christian Wessman, Dennis Reil
-
Publication number: 20240039801Abstract: Example embodiments are directed towards charting and mapping visualization of time and location data, such as, for example, that including or related to key performance indicator (KPIs) of a wireless telecommunication network. For example, in response to the system electronically receiving from a user an indication of a wireless network report type indicating one or more of a logical and a physical portion of a wireless services network, the system may determine a plurality of KPIs based on the indication (e.g., based on a selected report type and selected filter(s)). The system may then cause the plurality of determined KPIs to be displayed on a graphical user interface (GUI), including in interactive charts and maps containing objects which the user may select to drill-down and see more detailed data regarding the selected object based on the indicated report type and filter.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Anil Pathak, Sagar Bhatt, Charlie Kennamer
-
Publication number: 20240039802Abstract: A computer-implemented method for managing network services for a cellular network provider including receiving a user selection of an identifier type and a query input of a first subscriber identifier associated with a subscriber. Based on the user selection of the identifier type, querying IAM using the first subscriber identifier. In response to querying the IAM, receiving a first set of subscriber information associated with the subscriber, where the first set of subscriber information includes a second subscriber identifier associated with the subscriber. In response to receiving the second subscriber identifier, querying a first additional system using the second subscriber identifier. In response to querying the first additional system using the second subscriber identifier, receiving a second set of subscriber information associated with the subscriber, and populating one or more fields of the GUI with the first and second set of subscriber information.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventor: Paul Avetoom
-
Publication number: 20240039803Abstract: Some embodiments of the invention provide a method for offloading one or more data message processing services from a machine executing on a host computer. The method is performed by the machine. The method uses a set of virtual resources allocated to the machine to perform a set of services for a first set of data messages belonging to a particular data message flow. The method determines that for a second set of data messages belonging to the particular data message flow, the set of services should be performed by a virtual network interface card (VNIC) that executes on the host computer and is attached to the machine. Based on the determination, the method directs the VNIC to perform the set of services for the second set of data messages. The VNIC uses resources of the host computer to perform the set of services for the second set of data messages.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Peng Li, Guolin Yang, Ronak Doshi, Boon Seong Ang, Wenyi Jiang
-
Publication number: 20240039804Abstract: Computer-implemented methods, media, and systems for automating secured deployment of containerized workloads on edge devices are disclosed. One example computer-implemented method includes receiving, by a software defined wide area network (SD-WAN) edge device and from a remote manager, resource quotas for a compute service to be enabled at the SD-WAN edge device. Pre-deployment sanity checks are performed by confirming availability of resources satisfying the resource quotas, where the resources are at the SD-WAN edge device. In response to the confirmation of the availability of resources satisfying the resource quotas, one or more security constructs are set up to isolate SD-WAN network functions at the SD-WAN edge device from the compute service at the SD-WAN edge device. The compute service is attached to a SD-WAN network by the SD-WAN edge device. An acknowledgement that the compute service is enabled at the SD-WAN edge device is sent to the remote manager.Type: ApplicationFiled: September 14, 2022Publication date: February 1, 2024Inventors: EROL AYGAR, MARGARET NATASHA DREW, MARK PEEK, DANIEL BEVERIDGE, RAUNAK RAVINDRA SINGWI, NILANJAN DAW, PRANAY PAREEK, SAIRAM VEERASWAMY, AMARNATH RAGHUNATHAN
-
Publication number: 20240039805Abstract: Provided is a technique that allows persons concerned with provision of a service to share information pertaining to a communication infrastructure which has been used to provide the service. An information processing apparatus includes: an acquisition means that acquires log information of one or more communication infrastructures which constitute an end-to-end communication path; and a generation means that generates transaction data which includes the log information and which is to be added to a block chain updated using a predetermined consensus algorithm.Type: ApplicationFiled: March 25, 2021Publication date: February 1, 2024Applicant: NEC CorporationInventor: Tomohisa Yokota
-
Publication number: 20240039806Abstract: Computer-implemented methods, media, and systems for inter-cluster automated failover and migration of containerized workloads across edges devices are disclosed. One example method includes monitoring telemetry data received from a first software defined wide area network (SD-WAN) edge device that has a workload scheduled, where the telemetry data includes at least one of a health status of the workload or multiple runtime context elements at the first SD-WAN edge device. It is determined that a failure associated with either the first SD-WAN edge device or the workload occurs. A mode of the failure is determined. A remediation process based on the determined mode of the failure and a current state of the workload is performed.Type: ApplicationFiled: September 14, 2022Publication date: February 1, 2024Inventors: RAUNAK RAVINDRA SINGWI, Daniel Beveridge, Erol Aygar, Nilanjan Daw, Sairam Veeraswamy
-
Publication number: 20240039807Abstract: The embodiments of the present application relate to communication technology field, and discloses an operation and maintenance management method of a network slice subnet, including: obtaining a performance analysis result of each network function (NF) in the network slice subnet, wherein the performance analysis result is obtained by an analytical model in the NF, and the analytical model is obtained by multiple NFs and a common node based on federated learning; and performing operation and maintenance management on the network slice subnet based on the performance analysis result. The embodiments of the present application also discloses an operation and maintenance management apparatus of a network slice subnet, a system, a device and a medium.Type: ApplicationFiled: November 22, 2021Publication date: February 1, 2024Inventors: Shubin YUE, Hua NI, Yongsheng DU
-
Publication number: 20240039808Abstract: Computer-implemented methods, media, and systems for context based meta scheduling of containerized workloads across edge devices are disclosed. One example computer-implemented method includes receiving a manifest file that includes multiple context requirements of a workload, where the multiple context requirements include multiple runtime service level agreement (SLA) requirements of the workload. Telemetry data is received from multiple software defined wide area network (SD-WAN) edge devices, where the telemetry data includes respective context data of each of the multiple SD-WAN edge devices. A SD-WAN edge device is selected, based on the telemetry data and the multiple context requirements of the workload, from the multiple SD-WAN edge devices for placing the workload on the selected SD-WAN edge device, where the context data of the selected SD-WAN edge device meets the multiple context requirements of the workload. The workload is run on the selected SD-WAN edge device.Type: ApplicationFiled: September 15, 2022Publication date: February 1, 2024Inventors: RAUNAK RAVINDRA SINGWI, EROL AYGAR, DANIEL BEVERIDGE, MARK PEEK, NILANJAN DAW, SAIRAM VEERASWAMY, PRANAY PAREEK
-
Publication number: 20240039809Abstract: Computer-implemented methods, media, and systems for right-sizing containerized workloads running on edge devices are disclosed. One example method includes receiving a manifest file including one or more runtime service level agreement (SLA) requirements and one or more upper bounds on resource allocation for running the workload on a software defined wide area network (SD-WAN) edge device. The workload on the SD-WAN edge device is started based on the manifest file. Telemetry data from the SD-WAN edge device is monitored, where the telemetry data includes resource usage data for running the workload on the SD-WAN edge device. A model for resource usage behavior of the workload running on the SD-WAN edge device is established based on the monitored telemetry data. One or more updated upper bounds on resource allocation for running the workload on the SD-WAN edge device are displayed based on the established model.Type: ApplicationFiled: September 14, 2022Publication date: February 1, 2024Inventors: EROL AYGAR, Nilanjan Daw, Raunak Ravindra Singwi
-
Publication number: 20240039810Abstract: Example apparatus disclosed herein are to send a request to a media provider that is to cause the media provider to initiate transmission of a transport stream that is to provide streaming media to a media presentation device. Disclosed example apparatus are also to extract metering metadata from a data file to be received by the media presentation device after the transmission of the transport stream is initiated by the media provider but before receipt by the media presentation device of the transport stream that is to provide the streaming media to the media presentation device, the data file associated with the transport stream. Disclosed example apparatus are further to report the metering metadata to a server in response to a detected event, and access an identification of secondary media responsive to the report of the metering metadata, the secondary media to be presented by the media presentation device.Type: ApplicationFiled: October 9, 2023Publication date: February 1, 2024Applicant: The Nielsen Company (US), LLCInventors: Arun Ramaswamy, Jan Besehanic
-
Publication number: 20240039811Abstract: In one embodiment, a device identifies a plurality of online applications whose traffic is conveyed via an interface of a networking entity of a network. The device computes a relationship between a quality of experience metric for a particular online application in the plurality of online applications and a traffic volume associated with the interface for the plurality of online applications. The device makes, based on the relationship, a determination that degradation of the quality of experience metric for the particular online application is due to the traffic volume associated with the interface for the plurality of online applications. The device reconfigures, based on the determination, the networking entity to prioritize traffic for the particular online application.Type: ApplicationFiled: July 26, 2022Publication date: February 1, 2024Inventors: Jean-Philippe Vasseur, Vinay Kumar KOLAR, Grégory MERMOUD, Eduard SCHORNIG, Michal Wladyslaw GARCARZ
-
Publication number: 20240039812Abstract: One example method includes receiving, by a network test engine of a conference client application executed by a client device, a script associated with network functionality provided by a conference client application, the network test engine dynamically installable into the conference client application; accessing, by the network test engine, functionality of the conference client application; initiating, by the network test engine via the conference client application, functionality of the conference client application based on the script; monitoring, by the network test engine, one or more parameters of network communications employed by the functionality, the network communications between the conference client application and a virtual conference provider; and providing an indication of network communications status based on the monitored one or more parameters.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Applicant: Zoom Video Communications, Inc.Inventors: Russell Charles Hearn, Nicholas Alexander Sieracki
-
Publication number: 20240039813Abstract: Some embodiments provide a novel method of assessing health of a software managed network (SMN) that includes multiple forwarding elements that exchange data messages with each other. A health analytics manager collects performance metrics from control-plane components of the SMN that configure the forwarding elements of the SMN to forward data messages. The health analytics manager also collects performance metrics from data-plane components including the forwarding elements of the SMN. Then, the health analytics manager generates one health score from the collected performance metrics of the control-plane and data-plane components to express an overall health of the SMN.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Inventors: Minjal Agarwal, Vinith Podduturi, Tejas Sanjeev Panse, Sonam Sinha
-
Publication number: 20240039814Abstract: An object of the present disclosure is to continuously and easily grasp a communication quality such as RTT of application communication itself without depending on a protocol type. A communication system of the present disclosure holds a DPI rule for each application in a DPI rule management server in advance, duplicates a packet of a designated application extracted based on a filtering rule for extracting the packet, extracts information from the packet based on a DPI rule for the application acquired from the DPI rule management server, and calculates a communication quality based on the extracted information.Type: ApplicationFiled: August 14, 2020Publication date: February 1, 2024Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Tatsuya FUKUI, Katsuya MINAMI, Yuki SAKAUE
-
Publication number: 20240039815Abstract: An example method for using wireless packets to indicate boot status of a network device is disclosed. The method includes initiating a boot sequence of a network device. The method also includes during at least a portion of the boot sequence, transmitting a first wireless packet comprising data indicating a boot status of the network device, wherein the boot status indicates the network device is booting. The method also includes transmitting a second wireless packet comprising data indicating the boot status of the network device, wherein the boot status indicates the network device has finished booting.Type: ApplicationFiled: October 6, 2023Publication date: February 1, 2024Inventors: Robert J. Pera, Yao-Chung Chang, Andrejs Bogdanovs
-
Publication number: 20240039816Abstract: A system, method, and computer-readable medium are disclosed for performing a data center connectivity management operation. The connectivity management operation includes: providing a data center asset with a data center asset client module and a host operating system agent; establishing a secure communication channel between the data center asset client module and a connectivity management system, the connectivity management system comprising a service mesh proxy; exchanging information between the data center asset and the connectivity management system via the secure communication channel between the data center asset and the connectivity management system; and, remotely executing a workload on the data center asset via a workload orchestration operation, the service mesh proxy communicating with the host operating system agent when performing the workload orchestration operation.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Applicant: Dell Products L.P.Inventors: Anurag Sharma, Michael E. Brown, Dominique Prunier, Eric Williams
-
Publication number: 20240039817Abstract: A video transmission system includes a video transmitter for storing a packet of video data in a transmitting buffer and transmitting the packet stored in the transmitting buffer, a video receiver for receiving the packet, and an estimation unit for estimating a characteristic of a transmission line between the video transmitter and the video receiver from an arrival time of each packet in the video receiver. The video transmitter transmits a packet at a timing specified from an inverse characteristic of a characteristic of the transmission line.Type: ApplicationFiled: December 11, 2020Publication date: February 1, 2024Inventors: Yasuhiro MOCHIDA, Takuro YAMAGUCHI, Daisuke Shirai, Takahiro YAMAGUCHI
-
Publication number: 20240039818Abstract: Methods, systems, and devices for discounting extensibility latency are described. A first service platform may receive, from a user via a client device, a first request to access extensible resources at a second service platform using the first service platform. In response to receiving the first request, the first service platform may transmit, at a first time instance, a second request to access the extensible resources at the second service platform. In response, the second service platform may transmit a response to the first service platform at a second time instance subsequent to the first time instance. The second time instance, in which the first service platform may receive the response, may be based on an extensibility latency associated with the extensible resources. The first service platform may determine a server latency associated with the first service platform that may be unassociated with the extensibility latency.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Daniel Justin Mican, Damian Fortuna, Germán Gastón Lena, Luís Garrido Henriques de Miranda
-
Publication number: 20240039819Abstract: A circuit and corresponding method perform timestamp filtering. The circuit comprises input format-conversion logic that converts a received timestamp from an original format to an intermediate format. The circuit further comprises recursive filter logic coupled to the input format-conversion logic. The recursive filter logic generates a filtered timestamp in the intermediate format by filtering the received timestamp in the intermediate format. The circuit further comprises output format-conversion logic coupled to the recursive filter logic. The output format-conversion logic converts the filtered timestamp from the intermediate timestamp format to the original timestamp format and outputs the filtered timestamp in the original timestamp format. Converting the received timestamp into a different format avoids use of complex logic to handle rollover of input values, thereby reducing area and power consumption of the circuit.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Eliya Babitsky, Moran Noiman, Adi Katz, Yaakov Yehezkel, Ofer Halili, Tal Robinson
-
Publication number: 20240039820Abstract: Methods and system for configuring a remote terminal unit (RTU) device of a Supervisory Control and Data Acquisition (SCADA) system. The RTU device transmits an initial message payload to a SCADA server of the SCADA system via a broker server in accordance with a Message Queuing Telemetry Transport (MQTT) messaging protocol. The initial message payload complies with a Sparkplug specification for MQTT and includes at least one metric name and initial data and at least one PropertySet object associated with the metric name indicative of at least one parameter of the RTU device to be configured. In response to the initial message payload, the SCADA server transmits a subsequent message payload to the RTU device via the broker server. The subsequent message payload also complies with the Sparkplug specification and includes one or more values for the PropertySet object for configuring the at least one parameter of the RTU device.Type: ApplicationFiled: August 1, 2022Publication date: February 1, 2024Inventor: Stephen Richard Owen Beadle
-
Publication number: 20240039821Abstract: A network computer system operates to mitigate failures for a network service. The network computer system can generate a data path model for the network service, where the data path model identifies a probabilistic set of expectations with respect to the programs and program sequences which handle service requests for the network service. The data path models can be used to detect, analyze or mitigate service request failures of the network service.Type: ApplicationFiled: October 16, 2023Publication date: February 1, 2024Inventors: William Andrew Westlin, Edward Joseph Farro
-
Publication number: 20240039822Abstract: A circuit and corresponding method perform timestamp filtering. The circuit comprises recursive filter logic that implements a recursive least-squares (RLS) filter. The circuit (i) generates a filtered timestamp from a received timestamp by filtering the received timestamp via the recursive filter logic. The recursive filter logic applies the RLS filter to a portion of the received timestamp. A number of bits of the portion is less relative to a total number of bits of the received timestamp. The circuit outputs the filtered timestamp generated. Applying the RLS filter to the portion enables the circuit to be more efficient (e.g., smaller adders, fewer flipflops, etc.), thereby reducing area and power consumption of the circuit.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Eliya Babitsky, Moran Noiman, Adi Katz, Yaakov Yehezkel, Ofer Halili, Tal Robinson
-
Publication number: 20240039823Abstract: Providing overload protection may include receiving, from a first NRF of two or more NRFs, a load metric and comparing the load metric to a threshold. Additionally, when the load metric is above the threshold, providing NRF overload protection may include sending a Network Function (NF) Discovery (NFD) message to a second NRF instead of the first NRF and sending a heartbeat signal to the first NRF.Type: ApplicationFiled: July 29, 2023Publication date: February 1, 2024Applicant: Cisco Technology, Inc.Inventors: SUDEEP KUMAR PANDEY, ROHIT JAIN, RAVIKANT MATWAR PRASAD SINGH, SUJIN KUMAR ANAGANI
-
Publication number: 20240039824Abstract: Some embodiments provide a novel method for monitoring health of LFEs of a logical network. For an LFE implemented by multiple PFEs, a health analytics manager identifies a set of one or more metrics associated with each PFE implementing the LFE. The health analytics manager uses the set of metrics to compute a health score for the LFE. Then, the health analytics manager provides the health score in a report to provide an indication regarding the monitored health of the LFE. The set of metrics used to compute the health score for the LFE includes, in some embodiments, at least one metric for each PFE implementing the LFE.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Inventors: Minjal Agarwal, Vinith Podduturi, Tejas Sanjeev Panse, Sonam Sinha
-
Publication number: 20240039825Abstract: The present disclosure discloses a network switching method and apparatus, an electronic device, and a computer-read-able storage medium, the method including: creating a smart monitor used for monitoring port changes; if the smart monitor monitors that a smart port for deploying a network is created, performing network deployment of a bare metal server (bms) node by using the smart port, wherein a smart network interface card is installed in the bms node, and the smart network interface card generates a first bare metal port at the bms node and generates a second bare metal port corresponding to the first bare metal port in an operating system of the smart network interface card; if the smart monitor monitors that a neutron port of a neutron network is updated, adding the second bare metal port into a network bridge of the bms node.Type: ApplicationFiled: February 28, 2022Publication date: February 1, 2024Inventor: Yuanfeng LIU
-
Publication number: 20240039826Abstract: Methods and systems are disclosed to identify network nodes/cells with performance seasonality based on time series of performance data and external reference data. A plurality of time series of data values is obtained, each time series comprising a series of data values corresponding to a performance indicator of one network node in a periodicity. A plurality of series of external reference data values in the first periodicity is also obtained. For a time series of data values, the method identifies a network node providing the time series of data values as having performance seasonality regarding the performance indicator of the network, when similarity between the time series of data values and a corresponding series of external reference data values meets a criterion based on dynamic time warping distance calculation and pair-wise distance calculation using the time series of data values and the series of external reference data values.Type: ApplicationFiled: January 19, 2021Publication date: February 1, 2024Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Simone VINCENZI, Jieneng YANG, Yuyao HU
-
Publication number: 20240039827Abstract: A router advertises an aggregated service or route that can be evaluated by other routers as a unitary segment rather than as a group of individual links/paths associated with the aggregated service or route. The aggregated service or route can be based on service and topology state information received from one or more other routers and can be advertised with the router as the nexthop for the aggregated service or route. The router can advertise an aggregated metric for the aggregated service or route for use in such evaluation. An aggregated route can be associated with different aggregated metrics for different services.Type: ApplicationFiled: September 27, 2023Publication date: February 1, 2024Inventors: Hadriel S. Kaplan, Abilash Menon, Patrick Timmons, Michael Baj, Robert Penfield, Patrick J. MeLampy
-
Publication number: 20240039828Abstract: A method for reverse path forwarding (RPF) selection by a network device connected to a network includes receiving an advertisement message from each of a plurality of neighbor devices within the network, parsing the advertisement message to determine a color identification (ID) of each of the neighbor devices, and selecting, from among the neighbor devices, a RPF device based on the color ID of each of the neighbor devices.Type: ApplicationFiled: October 12, 2023Publication date: February 1, 2024Inventors: Bharathram Pattabhiraman, Ryan Michael Halbrook
-
Publication number: 20240039829Abstract: This application provides a route refresh method, apparatus, and system, and relates to the field of communication technologies. In solutions provided in this application, a first network device can send a plurality of first routes to a second network device in a parallel transmission manner, and can send an end indication after determining that the second network device receives the plurality of first routes. Therefore, it can be ensured that in a parallel transmission scenario, the end indication does not reach the second network device earlier than the first routes. This can avoid a problem that a service flow is interrupted because the second network device untimely ages a route that is not refreshed in a routing table.Type: ApplicationFiled: October 13, 2023Publication date: February 1, 2024Inventors: Shuanglong CHEN, Hongjie YANG, Zhenbin LI
-
Publication number: 20240039830Abstract: A system and computer-implemented method for allocating a plurality of transactions to a plurality of networks comprising: receiving from a router at a classical computer a plurality of first information associated with a respective one of the plurality of transactions; receiving from a router at the classical computer a plurality of second information associated with a respective one of the plurality of networks; determining in the classical computer a switching characteristic to be optimised by the allocation of the plurality of transactions to the plurality of networks; expressing by the classical computer in at least one expression to a quantum computer, the plurality of first information, the plurality of second information and the switching characteristic; resolving in the quantum computer the at least one expression to determine the allocation of the plurality of transactions to the plurality of networks; and providing the allocation to the router.Type: ApplicationFiled: December 8, 2021Publication date: February 1, 2024Inventors: Nicola Mariella, Stephen Patrick Flinter
-
Publication number: 20240039831Abstract: A computer-implemented method according to one embodiment includes establishing, for each hop in pathways of a network, a relation between a desired reliability and channel error. Based on the established relations, a maximum number of copies of packets to send from a source in the network to a target in the network is determined. An overhead associated with sending packets from the source to the target in the network is determined for each of the hops, and a first sum of such overheads is also determined. An overhead associated with sending an acknowledgement packet to the source is determined for each of the hops. A second sum is a sum of the overheads associated with sending the acknowledgement packet to the source. In response to a determination that a sum of the first sum and the second sum is less than a predetermined threshold value, the pathways are used.Type: ApplicationFiled: August 1, 2022Publication date: February 1, 2024Inventors: Rajesh Kumar Saxena, Harish Bharti, Anupam Gupta, Sandeep Sukhija
-
Publication number: 20240039832Abstract: Hitless migration of network devices for communication between two data centers using a dual IP stack mode is provided herein. In a first data center, a first gateway receives first routing information from an edge device regarding a first set of routes associated with a first host device in the first data center. The first gateway device generates a second set of routes that include a first address of the edge device formatted according to a first communication protocol. The second set of routes is exported to a second gateway device in a second data center. The first gateway device receives an encapsulated data packet having a first overlay that includes the first address from the second gateway device. The first gateway device decapsulates and re-encapsulates the data packet and a re-encapsulated data packet is sent to the edge device, the re-encapsulated data packet having a second overlay that includes the second address.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Hui Qu, Xuan Qi
-
Publication number: 20240039833Abstract: A multi-path routing method oriented to supercomputing user experience quality includes: decoupling, according to a preset rule, a service with a path to be planned into at least one service block; acquiring, according to a network requirement feature of each service block, all paths between network nodes of the path to be planned, and a network feature of each of all the paths, a multi-path set between the network nodes for the service; and inputting the network feature of each path in the multi-path set and the network requirement features of all the service blocks into a preset matching degree evaluation function to acquire a network path between the network nodes for the service. According to the multi-path routing method, the overall service of the network is described in blocks, so that a strong dependency relationship between supercomputing service task scheduling and data exchange is decoupled.Type: ApplicationFiled: December 29, 2020Publication date: February 1, 2024Applicant: SHANDONG COMPUTER SCIENCE CENTER (NATIONAL SUPERCOMPUTER CENTER IN JINAN)Inventors: Huiling SHI, Yan ZHOU, Meihong YANG, Wei ZHANG, Yuhan ZHAO
-
Publication number: 20240039834Abstract: Methods, computer-readable media, and systems are disclosed for coordinating host link status and installation of egress filters in coordination with a multi-chassis link aggregation group (MLAG) peer. In response to receiving a request from an MLAG peer to install an egress filter, a local network device provides an indication that the local device has entered a local egress filter installed state. Next, a filter-installed watermark value associated with the local network device is incremented. The local network device provides an indication that the egress filter has been installed. Finally, in response to determining that the MLAG peer network device is not indicating a request peer to install filter status, a local network device indicates a link down status and uninstalls its local egress filter. Alternatively, in response to determining that the local network device is in a link up status, the local device indicates that an MLAG peer should install an egress filter.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Ryan Megathlin, Victor Wen, Craig Lauer, Vijay Mahadevan, Christopher Roche
-
Publication number: 20240039835Abstract: Embodiments of this application disclose a packet processing method and a related device, to save access control list resources. A first network device receives a packet sent by a second network device. The packet reaches the first network device through a tunnel between the first network device and the second network device. The first network device determines a reserved port that is of the first network device and that corresponds to a port of the tunnel. The first network device processes the packet based on the reserved port.Type: ApplicationFiled: October 16, 2023Publication date: February 1, 2024Inventors: Chenchen Guan, Guifeng Liu
-
Publication number: 20240039836Abstract: Systems and methods are provided for passing data amongst a plurality of switches having a plurality of links attached between the plurality of switches. At a switch, a plurality of load signals are received from a plurality of neighboring switches. Each of the plurality of load signals are made up of a set of values indicative of a load at each of the plurality of neighboring switches providing the load signal. Each value within the set of values provides an indication for each link of the plurality of links attached thereto as to whether the link is busy or quiet. Based upon the plurality of load signals, an output link for routing a received packet is selected, and the received packet is routed via the selected output link.Type: ApplicationFiled: October 2, 2023Publication date: February 1, 2024Inventors: Duncan Roweth, Edwin L. Froese, Joseph G. Kopnick, Andrew S. Kopser, Robert Alverson
-
Publication number: 20240039837Abstract: In one embodiment, a device generates an application map for an online application accessed via a network that indicates a set of network addresses at which the online application was accessed, client information for clients that accessed the online application via the network, and quality of experience metrics for the online application. The device identifies a location change of the online application by tracking changes to the application map. The device determines a correlation between the location change and a degradation in the quality of experience metrics. The device adjusts, based on the correlation, routing of traffic associated with the online application in the network.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Michal Wladyslaw Garcarz, Jean-Philippe VASSEUR, Vinay Kumar KOLAR
-
Publication number: 20240039838Abstract: In one embodiment, a device discovers one or more network interfaces that an endpoint in a local network could use to access an online application. The device identifies a plurality of connectivity options available to the endpoint to access the online application via an external network. The device makes a prediction that a path that comprises a particular connectivity option from among the plurality of connectivity options and a particular network interface from among the one or more network interfaces will provide an optimal quality of experience metric associated with the online application. The device causes the endpoint to use the path to connect to the online application.Type: ApplicationFiled: July 30, 2022Publication date: February 1, 2024Inventors: Michal Wladyslaw Garcarz, Jean-Philippe VASSEUR, Eduard SCHORNIG, Grégory MERMOUD, Vinay Kumar KOLAR
-
Publication number: 20240039839Abstract: Systems, methods, and computer-readable media for discovering silent hosts in a software-defined network and directing traffic to the silent hosts in a scalable and targeted manner include determining interfaces of a fabric device that are connected to respective one or more endpoints, where the fabric device is configured to connect the endpoints to a network fabric of the software-defined network. At least a first interface is identified, where an address of a first endpoint connected to the first interface is not available at the fabric device. A first notification is transmitted to a control plane of the software-defined network based on identifying the first interface, where the control plane may create a flood list which includes the fabric device. Traffic intended for the first endpoint from the network fabric is received by the fabric device can be based on the flood list.Type: ApplicationFiled: October 13, 2023Publication date: February 1, 2024Inventors: Satish Kondalam, Sanjay Kumar Hooda, Prakash C. Jain, Vikram Vikas Pendharkar
-
Publication number: 20240039840Abstract: A routing policy includes policy directives and policy functions. Execution of the routing policy includes invoking a policy function at a point of application in a policy directive. Execution of the invoked policy function can include making any number of nested function calls. When an EXIT statement is encountered in a nested policy function, execution of the policy function terminates and execution of the routing policy continues immediately with the policy directive following the point of application, irrespective of how deeply nested in the invocation hierarchy the policy function is.Type: ApplicationFiled: October 25, 2022Publication date: February 1, 2024Inventors: Oscar Harry Frasier, David Cronin, Keon Matthew Vafai, Matthieu Loriol, Sharad Birmiwal
-
Publication number: 20240039841Abstract: Techniques for configuring a packet session are disclosed. An example method includes receiving, at a network function, a packet from a virtual connection device. The method also includes identifying, by the network function, an action to perform on the packet and modifying the header based on the action to create a modified packet with a modified header. The method also includes copying the modified packet from the network function to the virtual connection device for the virtual connection device to perform the action on the modified packet based on the modified header. The method also includes configuring, by a processing device executing the network function, the virtual connection device to perform the action on subsequent packets of the packet session. The virtual connection device performs the action on the subsequent packets without copying the subsequent packets to the network function.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Christophe Fontaine, Saravanan KR, David Marchand, Maxime Coquelin
-
Publication number: 20240039842Abstract: In one embodiment, a device identifies peaks of a timeseries of a path metric used to predict performance of a path in a network. The device determines one or more characteristics of the peaks of the timeseries. The device computes, based on the one or more characteristics of the peaks, a measurement frequency for the path metric. The device causes the path metric to be measured in the network according to the measurement frequency.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Inventors: Mukund Yelahanka Raghuprasad, Vinay Kumar Kolar, Jean-Philippe Vasseur
-
Publication number: 20240039843Abstract: A network data packet filtering method includes receiving a network data packet, obtaining a communication 5-tuple in the network data packet through parsing, determining, by determining that the communication 5-tuple in the network data packet matches at least one of one or more communication 5-tuple entries, that the network data packet is a broadcast data packet to be discarded, and discarding the broadcast data packet.Type: ApplicationFiled: July 19, 2021Publication date: February 1, 2024Inventors: Zhengbin Tan, Kunpeng Zhang, Xiaoyu Fan, Yanzhao He
-
Publication number: 20240039844Abstract: Disclosed are a sensor data transmission method and a device. The method includes: a periodic signal acquisition apparatus receiving a message requesting for data packet description information from a data receiving end and reporting the data packet description information to the data receiving end, wherein the data packet description information includes: signal type information, the acquisition rate for each type of signal, and the sending rate of a data packet; receiving a data reporting request from the receiving end, and sending a data packet to the data receiving end according to the sending rate of the data packet in the data packet description information, wherein the data packet sent to the data receiving end contains a packet header portion and a load portion, the packet header portion includes a frame header field, a load length field, and a check field.Type: ApplicationFiled: December 27, 2022Publication date: February 1, 2024Inventors: Qichao ZHAO, Ran YANG, Zhao LI
-
Publication number: 20240039845Abstract: The present disclosure provides a packet tracing mechanism will be described that provides packet tracing information to a mobile network controller. In one aspect, a method includes receiving a data packet sent from a source node to a destination node; determining if the data packet is to be updated with packet tracing information; and upon determining that the data packet is to be updated, updating the packet tracing information of the data packet to include identification of the network device and an ingress timestamp of the data packet at the network device for a corresponding network controller to determining network routing policies.Type: ApplicationFiled: August 25, 2023Publication date: February 1, 2024Inventors: Clarence Filsfils, Pablo Camarillo Garvia
-
Publication number: 20240039846Abstract: A mechanism operating in a border router is disclosed. The mechanism includes receiving an upstream packet over a limited domain network (LDN). The upstream packet comprises a source address including a LDN suffix. The source address is translated into Internet Protocol version six (IPv6) format by applying a function to translate the LDN suffix into an IPv6 suffix. The upstream packet is forwarded over an IPv6 network based on the source address in IPv6 format.Type: ApplicationFiled: October 16, 2023Publication date: February 1, 2024Inventors: Kiran Makhijani, Lijun Dong
-
Publication number: 20240039847Abstract: Systems and methods for highly-available host networking with active-active or active-backup traffic load-balancing are disclosed herein. The method can include selecting a compute instance from an overlay network residing on a substrate network, identifying a plurality of Network Virtualization Devices (“NVD”) for association with the compute instance, creating a loopback interface on each of the NVDs, each of which loopback interfaces can include a shared IP address that can be in the substrate layer, prepopulating a table in each of the NVDs, the table linking the shared IP address to the compute instance, and each of the plurality of NVDs advertising a unique route to the compute instance via the shared IP address.Type: ApplicationFiled: October 6, 2023Publication date: February 1, 2024Applicant: Oracle International CorporationInventors: Jagwinder Singh Brar, Bryce Eugene Bockman, Santosh Narayan Shilimkar