Methods of deriving location information of a wireless device include deriving, in the continuous domain, a location of a wireless device and at least one time and location varying path loss function parameter. The coordinates and parameter are derived based on signal strength measurements made at the wireless device, with the measured signals originating from a plurality of wireless transmitters, such as access points. The derived path loss function parameter can include one or more of a path loss exponent parameter, an intercept parameter, a receiver antenna gain parameter, transmitter antenna gain parameter, or a transmit power parameter.
H04W 4/029 - Location-based management or tracking services
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
A network device may enable local breakout for a subscriber device, and may create, for the subscriber device, a primary path to a data network via a user plane function. The network device may create, for the subscriber device, a secondary path direct to the data network and based on the local breakout being enabled, and may determine whether a connection with the user plane function is available. The network device may selectively provide traffic between the subscriber device and the data network via the primary path based on determining that the connection with the user plane function is available, or may provide the traffic between the subscriber device and the data network via the secondary path based on determining that the connection with the user plane function is unavailable.
A network device may originate a route, and may designate the route as a first colored route having a first color. The network device may advertise the first colored route to a first intermediate network device to cause the first intermediate network device to propagate the first colored route to an ingress network device over a first colored border gateway protocol session. The network device may designate the route as a second colored route having a second color, and may advertise the second colored route to a second intermediate network device to cause the second intermediate network device to propagate the second colored route to the ingress network device over a second colored border gateway protocol session.
A disaggregated broadband network gateway (DBNG) control plane system may be configured to receive a first initialization packet associated with a user device via a first user plane and a second initialization packet associated with the user device via a second user plane. The DBNG control plane system may be configured to determine, based on at least one of the first initialization packet or the second initialization packet, one or more load balancing parameters. The DBNG control plane system may be configured to cause, based on at least one of the one or more load balancing parameters, a communication session for the user device to be established via the first user plane and not via the second user plane.
An example method includes receiving, from a network device, data indicating characterizations of network traffic on a plurality of ports of the network device; determining, by processing circuitry, for each port of the plurality of ports, an indicator of a port type for the port based on the data indicating the characterizations of network traffic on the plurality of ports, wherein the port type indicates a link type of network traffic exchanged by the port; and outputting, by the processing circuitry, the indicator of the port type to an output device.
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
H04L 41/12 - Discovery or management of network topologies
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
In some implementations, a non-ingress node of one or more label-switched paths (LSPs) may identify a resource issue event. The non-ingress node may identify, based on identifying the resource issue event, one or more notification-requester stacks included in a data structure. The non-ingress node may generate one or more resource notification messages that each include a respective notification-requester stack of the one or more notification-requester stacks. The non-ingress node may send the one or more resource notification messages based on the one or more notification-requester stacks.
An access point, which is a Power over Ethernet (PoE) Powered Device (PD) measures input voltage and input current. The access point determines a power requirement of the access point based on the measured current, measured voltage, and information about power requirements of access point components or devices coupled to the access point a power requirement of the access point. The access point communicates the determined power request to a power sourcing equipment (PSE), e.g., a network switch in some embodiments, the access point further communicates one of measured input current and measured input voltage to the PSE. The PSE uses the information received from the access point, e.g., power request and power measurements to determine an amount of power to be granted to the access point. If the access point does not receive the requested power level the access point selects internal components and/or external devices to de-power.
A device may receive a configuration of a network device, where the configuration includes configuration blocks with references to high level objects. The device may receive an out-of-band configuration change from the network device, and may compare the out-of-band configuration change and the configuration to identify an impacted high level object. The device may determine an impacted reference and an impacted configuration block associated with the impacted high level object, and may determine whether to reject the out-of-band configuration change, accept the out-of-band configuration change, or merge the out-of-band configuration change with the configuration based on the impacted high level object, the impacted reference, and the impacted configuration block. The device may perform one or more actions based on determining whether to reject the out-of-band configuration change, accept the out-of-band configuration change, or merge the out-of-band configuration change with the configuration.
An initiator network device may determine that a graceful shutdown is required for the initiator network device, and may generate a route refresh packet indicating that the graceful shutdown is enabled. The initiator network device may provide the route refresh packet to a receiver network device, and may disable the graceful shutdown after providing the route refresh packet to the receiver network device. The initiator network device may generate another route refresh packet indicating that the graceful shutdown is disabled, and may provide the other route refresh packet to the receiver network device.
Techniques are described by which a routing protocol, such as border gateway protocol (BGP), is extended to control propagation and importation of information using route targets (RTs) specified as bitmasks that encode link administrative group information. For example, a network control device (e.g., controller) is configured to allocate one or more subset of resources (e.g., nodes or links) of an underlay network to each of one or more virtual networks established over the underlay network. The controller generates a bitmask encoded with link administrative group information of the one or more links. The controller then outputs, to a plurality of provider edge (PE) routers that are participating in a respective virtual network, a routing protocol message to advertise the one or more subset of resources, wherein the routing protocol message includes a route target specified as the bitmask.
A system may identify a security intent policy model associated with an initial time. The system may generate one or more delta snapshots that respectively indicate one or more incremental changes to the security intent policy model at times subsequent to the initial time. The system may determine that the system is to deploy an updated version of the security intent policy model to a device and may thereby determine a previous deployment time at which the system deployed a previous version of the security intent policy model to the device. The system may generate, based on the one or more delta snapshots and the previous deployment time, a cumulative delta snapshot, and may thereby update a low-level security intent policy model associated with the device. The system may generate, based on the low-level security intent policy model, device-level security configuration information for the device.
A network device may assign subscriber groups to logical ports of the network device, and may generate a load balanced group that includes the logical ports assigned to the subscriber groups. The network device may provide a backup logical port for the load balanced group, and may maintain the backup logical port in an oversubscribed state or a full state. The network device may identify a subscriber group failure for one of the subscriber groups, and may switch the one of the subscriber groups to the backup logical port based on the subscriber group failure.
Techniques are described for creating isolated pools of external, failover, and/or floating IP addresses. In one example, this disclosure describes a method including creating a plurality of virtual networks, creating a plurality of pools of external IP addresses, detecting a request to instantiate an object that identifies a specific pool from the plurality of pools of external IP addresses; and instantiating the object and configuring the object with an external IP address drawn from the specific pool. The pools of external IP addresses may be created and isolated on a per-namespace, per-service, or per-ingress basis.
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
A resource controller module of a network management system receives a request for an allocation of threads to perform a job associated with a job category for a tenant associated with the network management system. The resource controller module determines, based on the request, a number of available threads associated with the job category of the system at a particular time and causes, based on the request and the number of available threads associated with the job category at the particular time, a group of threads associated with the job category to be allocated to perform the job to be allocated to perform the job.
A method for use in a system including an Ethernet Virtual Private Network (EVPN) core network and a VXLAN data plane, a first gateway device GW1 and a second gateway device GW2 operating in an all-active multihoming mode to interconnect the EVPN core network and VXLAN data plane, is described. The method includes establishing, by the second gateway device GW2, a VXLAN tunnel to a remote VTEP X before traffic is sent by the remote VTEP X and received by the second gateway device GW2, but after traffic is sent by the remote VTEP X and received by the first gateway device GW1. wherein the first and second gateway devices GW1 and GW2 use an anycast IP address as a source address for VTEP X.
A cloud-based architecture includes a cloud-based network management system (NMS) that provides the management plane and one or more cloud-based NAC systems that provide NAC services, including end-point device authentication. The cloud-based NAC system may have multiple groups of authentication server instances. Each group may have multiple authentication server instances to allow the authentication service provided by the group to serve more client devices than a single authentication server instance alone. Different Groups can be configured differently to serve different tenant sets.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Techniques are disclosed for the detection of different states of a session comprising a bidirectional flow of network traffic between client devices so as to enable a network device to apply different network policies to different states of the session. In one example, a computing device identifies multiple states of a session and defines a plurality of network policies. Each network policy defines performance requirements for network traffic during each state of the session. A network device receives the plurality of network policies and determines a state of the session. The network device selects a path based on the performance requirements of the network policy associated with the determined state of the session. The network device forwards traffic associated with the session along the selected path while the session is in the determined state.
An example network provisioning system includes a provisioning portal that is configured to: receive, from a client device, a selection of a service template specifying network service attributes for a communication service, receive a selection of one or more tracking areas, receive a selection of one or more subscribers, and generate a service order based on the network service attributes for the communication service, the one or more tracking areas, and the one or more subscriber. The network provisioning system is configured to provision the communication service in accordance with the service order.
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
H04W 4/029 - Location-based management or tracking services
19.
X-OVER-Y TUNNEL SIGNALING AND CONFIGURATION, AND USE OF CONFIGURED X-OVER-Y TUNNEL(S)
Network operators can define port mappings for UDP destination ports and the encapsulated protocol/traffic type (X) in UDP. BGP may be used to notify the UDP destination port-to-traffic type mapping to an encapsulator. A generic UDP encapsulation mechanism (X-in-UDP), where UDP can be used to encapsulate packets of any user configured protocol/traffic type X (e.g., IPv4, IPv6, MPLS, etc.), is described. Primary benefits of using UDP for encapsulation are to leverage UDP port numbers for load-balancing. Generic UDP encapsulation of any protocol/traffic type using user defined port-maps provides flexibility to network operators in constructing different overlay networks. UDP encapsulation helps leverage fine-grade load balancing over Equal-Cost Multipath (ECMP).
A network management system (NMS) configured to attribute a health issue of an access point (AP) to a classifier or sub-classifier and remedy the health affecting a user's experience. The NMS obtains network data associated with an AP device of a site. The NMS also determines whether the network data satisfies one or more criteria corresponding to a classifier of a service level expectation (SLE) metric for determining a health issue of the AP device. In response to determining the network data does not satisfy the criteria associated with the classifier, NMS attributes the health issue of the AP device to the classifier. In response to attributing the health issue of the AP device to the classifier, NMS performs a remedy action based on the classifier.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
A method is described for measuring a communication latency between a first device with a first local clock and a second device with a second local clock, the devices interconnected for digital communication to a network, comprising sending an upstream communication and a downstream communication between the devices, and measuring using said local clocks an upstream send time (τ1), an upstream receive time (τ2), a downstream send time (τ3) and a downstream receive time (τ4); calculating a first measured delay (y1) as τ2−τ1 and calculating a second measured delay (y2) as τ4−τ3; providing said measured delays (y1, y2) to a recursive filter function arranged to estimate a first latency (d1) and a second latency (d2) based on said measured delays (y1, y2) and on values for the first and second latencies (d1, d2) previously estimated by said recursive filter function, and iterating. A system and a computer software product are also described.
A first network device may receive an advertisement that includes a prefix for a second network device, wherein the advertisement is destined for a third network device. The first network device may determine, based on a network topology, whether a next hop is one hop away or multiple hops away. The first network device may selectively modify the advertisement to include a first segment identifier, based on the next hop being one hop away and to generate a first modified advertisement, or may modify the advertisement to include a second segment identifier, based on the next hop being multiple hops away and to generate a second modified advertisement. The first network device may forward the first modified advertisement or the second modified advertisement toward the third network device.
Techniques are described that detect areas with insufficient radio frequency (RF) coverage in a wireless network. A network management system (NMS) determines one or more service level expectation (SLE) metrics for each client device in a wireless network. The SLE metrics are aggregated to each access point (AP) in the wireless network, and each AP is assigned an AP score based on the aggregated SLE metrics. To identify potential coverage holes, the NMS groups APs having poor AP scores. If a root cause of the poor AP scores cannot be automatically resolved and if the poor AP scores persist for a predetermined period of time, the group of APs is determined to represent a true coverage hole. The NMS may generate a notification regarding recommended corrective actions to the customer and/or IT personnel.
Techniques are described by which a network management system (NMS) receives, from a plurality of access points (APs) configured to provide a wireless network, received signal strength indicator (RSSI) values. The NMS generates, based on the RSSI values, a graph of the plurality of APs, wherein the graph of the plurality of APs includes a plurality of clusters, wherein each cluster comprises a subset of the plurality of APs that are grouped based on strength of connectivity between the subset of the plurality of APs. The NMS generates, based on the graph, an upgrade plan to upgrade the plurality of APs, wherein the upgrade plan comprises a plurality of batches, wherein each batch includes a selection of at least one AP from each of one or more of the plurality of clusters. The NMS sends the upgrade plan to an orchestrator to execute the upgrade plan.
This disclosure describes techniques for providing application assurance by validating expected packet flows for an application against a model of a network that is to transport the expected packet flows. For example, a method includes obtaining, by an application assurance system, a flow definition that describes a packet flow for an application; determining, by the application assurance system by querying a network model of a network system that transports packet flows for applications, using the flow definition, a set of network nodes and links of the network system that are expected to transport or process the packet flow for the application; obtaining, by the application assurance system, an indication that a network node or link, from the set of network nodes and links, is in an operational state that could affect performance of the application; and in response to obtaining the indication, by the application assurance system, outputting an alert.
In some implementations, an authenticator device may receive, from a browser, a request to connect to a secure service, wherein the request includes login credentials associated with a user of the browser. The authenticator device may determine that the user is an authorized user to access the secure service based on the login credentials. The authenticator device may generate an authentication cookie for the browser, wherein the authentication cookie encodes metadata information associated with the user, and wherein the metadata information includes at least an indication of user attributes of the user. The authenticator device may transmit, to the browser device, the authentication cookie.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A system includes computer-readable media configured to store an event store associated with a network. Processing circuitry, in response to a determination that an event associated with the network device has occurred stores, at a time series store, configuration information for a network device in the network and stores, at the event store, event information comprising a pointer to the configuration information and an indication of a time that the event occurred. In response to receiving a request for data corresponding to the event, the processing circuitry determines, using the event information in the event store, the pointer to the network information for the event, obtains, from the time series store, the configuration information for the event using the pointer, generates a response to the request based on the configuration information obtained from the time series store, and outputs the response to the request.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
Job management solutions often involve a controller distributing tasks to worker nodes or worker nodes in an efficient manner. In one example, this disclosure describes a method that includes receiving, by a controller, a first set of tasks; assigning, by the controller, each of the tasks in the first set of tasks to worker nodes for processing by the worker nodes; receiving, by the controller and for at least some of the tasks in the first set of tasks, feedback information; determining, by the controller and based on the feedback information, an expected amount of processing associated with each task type in the plurality of task types; receiving, by the controller, a second set of tasks; and assigning, by the controller and based on the expected amount of processing associated with each task type, each of the tasks in the second set of tasks to the worker nodes for processing.
A network management system includes a memory and processing circuitry in communication with the memory. The processing circuitry is configured to obtain connection event data. The connection event data indicates a plurality of disconnection events. The processing circuitry is also configured to generate, from the connection event data, aggregate data according to a plurality of network scope levels and detect, based on the aggregate data, one or more network anomalies. Additionally, the processing circuit is configured to determine, based on the aggregate data, whether a root cause of the one or more network anomalies is associated with each network scope level of the plurality of network scope levels and output an indication of the determined network scope level associated with the root cause or performing a remedial action to address the root cause at the determined network scope level.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
30.
GROUP BASED POLICY FOR NON-VIRTUAL EXTENSIBLE LOCAL AREA NETWORK DEPLOYMENTS
A network device may receive, from a server device, a first tag assigned to a first host device, and may generate a first filter based on the first tag. The network device may receive a second filter generated based on a second tag assigned to a second host device, and may generate a policy based on the first filter and the second filter. The network device may propagate the first filter and the second filter to one or more other network devices, and may receive a packet. The network device may derive a source tag and a destination tag associated with the packet, and may determine an action for the packet based on the policy, the source tag, and the destination tag. The network device may perform the action.
The problem of bandwidth insufficiency within an Intermediate System-to-Intermediate System (IS-IS) flood reflection (FR) cluster, and its associated problem(s) of increased signaling failures (and increased crank-bank signaling attempts, also referred to as “signaling churn”) when traffic engineered (TE) paths are computed, is avoided by signaling a more realistic “available bandwidth” advertisement on the FR TE links.
A first network device of a first data center may encode a source tenant system interface (TSI) group identifier into a tag protocol identifier and a group-based policy identifier, and may encode the tag protocol identifier and the group-based policy identifier into a virtual extensible local area network (VXLAN) packet with the source TSI group identifier, where the source TSI group identifier is not included in a header of the VXLAN packet. The first network device may provide the VXLAN packet, with the source TSI group identifier, to a second network device of a second data center, via an Ethernet virtual private network (EVPN) multiprotocol label switching (MPLS) network.
This disclosure describes a network management system configured to determine, for each AP of the plurality of APs and based on received signal strength indicators (RSSIs) of each AP of the plurality of APs, one or more strong neighbors of each AP. compute an AP redundancy score for each AP of the plurality of APs indicative of a redundancy of each AP; compute, based on the AP redundancy scores, at least one of: a switch redundancy score for each network switch associated with one or more of the plurality of APs, wherein the switch redundancy score is indicative of a redundancy of each network switch, or a site redundancy score, wherein the site redundancy score is indicative of an overall redundancy of the network site; and invoke, based on the AP redundancy scores, the switch redundancy score, or the site redundancy score, one or more actions.
A controller device receives, from a plurality of assisted replication network devices, respective utilization information associated with the plurality of assisted replication network devices. The controller device generates, based on the respective utilization information associated with the plurality of assisted replication network devices, load balancing information for a network device associated with two or more assisted replication network devices of the plurality of assisted replication network devices, and sends, to the network device, the load balancing information. The network selects, based on the load balancing information, a particular assisted replication network device of the two or more assisted replication network devices. The network device receives a traffic flow that is to be multicast and sends the traffic flow to the particular assisted replication network device, wherein sending the traffic flow to the particular assisted replication network device permits the particular assisted replication network device to multicast the traffic flow.
Example systems, devices, and techniques are described for inferring a potential bad cable issue associated with a cable. An example system includes processing circuitry configured to determine a class of a cable associated with one of a plurality of network interfaces. The processing circuitry is configured to select, based on the class of the cable, a first machine learning model of a plurality of machine learning models. The processing circuitry is configured to determine, based on the class of the cable and the one of the plurality of network interfaces, a first feature set of the performance data. The processing circuitry is configured to execute the first machine learning model to infer, based on the first feature set, a potential bad cable issue associated with the cable and output an indication of the potential bad cable issue associated with the cable.
A machine learning system is trained to predict resource usage by cells or network slices of a mobile network. For example, a computing system obtains respective datasets for the cells or network slices. Each dataset comprises time steps and respective values for a performance metric of the corresponding one of the cells or network slices. The computing system groups, based on a clustering algorithm applied to (1) the datasets, or (2) the cells or network slices, the datasets into clusters of datasets. The computing system applies, to a subset of most-recent time steps and corresponding values of each dataset of a first cluster of the clusters, a transformation to obtain a set of time steps and corresponding standardized values with which a machine learning system is trained to generate predicted values at future time steps of the datasets of the first cluster.
Techniques are described for a computing system configured to obtain a plurality of candidate logs for a plurality of layers of a computing infrastructure. The computing system may, for each candidate log of the plurality of candidate logs, map the candidate log to a log template of a plurality of log templates, wherein each log template to which a candidate log is mapped is a mapped log template. The computing system may rank mapped log templates based on properties of the mapped log templates. The computing system may select, based on the ranking, one or more candidate logs as critical logs. The computing system may output at least one of (1) an indication of the critical logs to determine a potential root cause associated with a performance issue of a network application or (2) an indication of the potential root cause associated with the performance issue of the network application.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 43/065 - Generation of reports related to network devices
A device may receive a handover request to handover a protocol data unit (PDU) session of a network device from a radio access network (RAN) to the device, and may provide, to the RAN, a handover request acknowledgment message acknowledging receipt of the handover request. The device may receive, from the RAN, a sequence number status transfer indicating provision of a handover command by the RAN to the network device, and may receive, from the RAN, uplink data packets and downlink data packets associated with the PDU session. The device may receive, from the network device, a request to establish the PDU session, and may establish the PDU session of the network device based on the request to establish the PDU session.
Techniques are described by which a network management system (NMS) is configured determine a specific wireless channel assigned to a first AP device. The NMS is further configured to determine one or more neighboring AP devices that are within a certain proximity of the first AP device and generate a packetized scan command for each of the one or more neighboring AP devices. The NMS is further configured to send the packetized scan command to each of the one or more neighboring AP devices and receive, from the first AP device and each of the one or more neighboring AP devices, signal samples of a client device connected to the first AP device on the specific wireless channel assigned to the first AP device. The NMS is further configured to, based on the received signal samples, determine a location within the site of the client device.
Techniques are disclosed for a network management system (NMS) that performs quality of service (QoS) monitoring and troubleshooting of user experience issues occurring outside of a network managed by the NMS using data obtained from third-party sources. For example, an NMS obtains third-party data of a third-party application server or third-party service provider server from a third-party monitoring vendor. The NMS identifies a user experience issue indicated by the third-party data and stitches the third-party data to network data received from network devices. The NMS determines a root cause or a remedial action of the user experience issue based at least on the network data received from the one or more network devices. The NMS generates a notification for presentation to an administrator device which identifies the root cause or the remedial action of the user experience issue.
G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
H04L 67/53 - Network services using third party service providers
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
41.
Apparatus, system, and method for achieving certain characteristics in stacked vias formed through multilaminate circuit boards
A disclosed apparatus may include (1) a multilaminate circuit board that includes multiple layers whose dielectric values differ from one another and (2) at least one stacked via formed through the multilaminate circuit board, wherein the stacked via comprises (A) a first sub-laminate via that spans a first layer included in the multiple layers and is characterized by at least one feature and (B) a second sub-laminate via that spans a second layer included in the multiple layers and is characterized by at least one other feature. Various other apparatuses, systems, and methods are also disclosed.
A device may receive edge data identifying locations of a plurality of edge devices and other criteria associated with the plurality of edge devices, and may identify an upgrade for an edge device, of the plurality of edge devices, based on the other criteria of the edge data. The device may identify a location of a repository mirror for the upgrade based on a location of the edge device identified in the edge data, and may instruct the edge device to utilize the location of the repository mirror to receive the upgrade.
In general, techniques are described for a computing system comprising processing circuitry having access to a storage device. The processing circuitry is configured to apply, by a reinforcement learning agent, a policy model to a forecasted network traffic load associated with a workload to assign the workload to a first processing core of a plurality of processing cores of a computing device. The processing circuitry is also configured to process, by a virtual router and based on the assignment of the workload to the first processing core, network traffic for the workload using the first processing core.
An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which cause the system to obtain telemetry data, the telemetry data being associated with a plurality of applications running on a plurality of hosts. The instructions cause the system to, based on the telemetry data, determine a subset of applications of the plurality of applications that run on a first host of the plurality of hosts. The instructions cause the system to determine a subset of firewall policies of a plurality of firewall polices, each of the subset of firewall policies applying to at least one respective application of the subset of applications. The instructions cause the system to generate an indication of the subset of firewall policies and send the indication to a management plane of a distributed firewall.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
In some implementations, a sampling aggregator device may obtain, from one or more packet forwarding devices, first-stage sampling information associated with a packet at a first stage of a packet forwarding path. The sampling aggregator device may obtain, from the one or more packet forwarding devices, second-stage sampling information associated with the packet at a second stage of the packet forwarding path. The sampling aggregator device may determine aggregate sampling information based on the first-stage sampling information and the second-stage sampling information. The sampling aggregator device may transmit the aggregate sampling information to a sampling analyzer device.
A system includes computer-readable media configured to store a plurality of objects representing intent graph models of a network, and processing circuitry coupled to the computer-readable media. The processing circuitry is configured to receive a request indicating a requested time, determine one or more first objects of the plurality of objects, the first objects storing an intent graph model associated with a first time, the first time different from the requested time, determine one or more second objects of the plurality of objects, the second objects storing difference information indicating one or more changes to the intent graph model associated with the first time that occurred after the first time, apply the changes to the intent graph model associated with the first time to generate an intent graph model associated with the requested time, and output an indication of the intent graph model associated with the requested time.
An example method includes receiving, by an SD-WAN system, WAN link characterization data for a plurality of WAN links of the SD-WAN system over a time period; and for each site of a plurality of sites of the SD-WAN system, generating, by the SD-WAN system, a local policy for the site, wherein generating the local policy is based on a machine learning model trained with the WAN link characterization data for the plurality of WAN links, and providing the local policy to an SD-WAN edge device of the site.
H04L 41/0893 - Assignment of logical groups to network elements
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
48.
BROADBAND NETWORK GATEWAY (BNG) AS DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) SERVER
In some implementations, a broadband network gateway (BNG) may receive, from a customer premises equipment, a dynamic host configuration protocol (DHCP) discover request, wherein the BNG is connected to the customer premises equipment and a fixed mobile interworking function (FMIF). The BNG may communicate with, based on the DHCP discover request, the FMIF. The BNG may provide to the customer premises equipment, and based on communicating with the FMIF, a DHCP offer that offers utilization of the BNG as a DHCP server. The BNG may receive from the customer premises equipment, and based on providing the DHCP offer, a DHCP request to request utilization of the BNG as the DHCP server. The BNG may provide to the customer premises equipment, and based on the DHCP request, a DHCP acknowledgment that acknowledges utilization of the BNG as the DHCP server.
In some implementations, an ingress provider edge network device (PE) may obtain dynamic load information associated with respective links of a plurality of multi-homing (MH) PEs. The ingress PE may determine based on the dynamic load information, a dynamic load-balancing scheme associated with the plurality of MH PEs. The ingress PE may forward traffic using the dynamic load-balancing scheme.
A co-packaged optical-electrical chip can include an application-specific integrated circuit (ASIC) and a plurality of optical modules, such as optical transceivers. The ASIC and each of the optical modules can exchange electrical signaling via integrated electrical paths. The ASIC can include Ethernet switch, error correction, bit-to-symbol mapping/demapping, and digital signal processing circuits to pre-compensate and post-compensate channel impairments (e.g., inter-channel/intra-channel impairments) in electrical and optical domains. The co-packaged inter-chip interface can be scaled to handle different data rates using spectral efficient signaling formats (e.g., QAM-64, PAM-8) without adding additional data lines to a given design and without significantly increasing the power consumption of the design.
Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.
Conflict management of functions and services (e.g., RAN intelligent controller (RIC) may be performed by displaying a plurality of policies for an interface service of a radio access network (RAN); receiving an indication of selection of a conflict resolution strategy for a selected RAN interface policy type; determining whether the interface service of the RAN has a conflict based on the selected conflict resolution strategy for the selected RAN interface policy type; when the interface service does not have the conflict, accepting the selected conflict resolution strategy for the selected RAN interface policy type and displaying an indication of the selected conflict resolution strategy for the selected RAN interface policy type; and based on the selected conflict resolution strategy for the selected RAN interface policy type, modifying a configuration of the RAN.
In some implementations, a network device of a network may discover a media access control (MAC) address of a host device, associated with an attachment circuit, that has moved to the network device from another network device of the network. The network device may transmit, based on discovering the MAC address of the host device that has moved to the network device from the other network device, over the attachment circuit, a general membership query. In some implementations, another network device may receive a media access control (MAC) advertisement route message indicating that the network device has discovered the MAC address of the host device. The other network device may delete one or more multicast group memberships associated with the host device.
In general, this disclosure describes techniques for leveraging a containerized routing protocol process to implement virtual private networks using routing protocols. In an example, a system comprises a container orchestration system for a cluster of computing devices, the cluster of computing devices including a computing device, wherein the container orchestration system is configured to: deploy a containerized application to a compute node; and in response to deploying the containerized application to the compute node, configure in the compute node a virtual routing and forwarding (VRF) instance to implement a virtual private network (VPN) for the containerized application.
A network management system includes a memory storing a set of access point (AP) data, wherein the set of AP data corresponds to a communication between a client device and an AP device. Additionally, the network management system includes processing circuitry configured to: receive the set of AP data corresponding to the client device; and receive a set of remote server data, wherein the set of remote server data comprises information corresponding to a communication between the client device and a remote server separate from the network management system. Additionally, the processing circuitry is configured to: determine an association between the set of AP data and the set of remote server data based one or more matching criteria; store data indicative of the association between the set of AP data and the set of remote server data; and perform an action based on the association.
An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which, when executed by the processing circuitry, cause the network system to receive connection data related to an egress connection of an application service of an application. The instructions cause the network system to analyze the connection data to determine that the egress connection is an anomalous connection. The instructions cause the network system to generate a notification indicative of the egress connection being an anomalous connection and send the notification to a computing device.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
A method for managing a plurality of network devices of a network includes determining, by one or more processors, a causality map for the plurality of network devices according to an intent. The method further includes receiving, by the one or more processors, an indication of a network service impact and determining, by the one or more processors, a relevant portion of the causality map based on the network service impact. The method further includes determining, by the one or more processors, one or more candidate root cause faults based on the relevant portion of the causality map and outputting, by the one or more processors, an indication of the one or more candidate root cause faults.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
In some implementations, a system may identify historical utilization data associated with a network device. The system may determine, based on the historical utilization data, a utilization forecast for the network device. The system may determine, based on the utilization forecast, a power management plan for the network device. The system may selectively control, based on the power management plan, enablement and disablement of one or more non-forwarding components of the network device.
In some implementations, a system may receive an extensible markup language (XML) configuration stream that indicates one or more resource configurations. The system may maintain a data model that includes metadata that describes the XML configuration stream. The system may process the data model to generate a metadata tree. The system may generate, based on the XML configuration stream and the metadata tree, one or more XML configuration sub-streams that are respectively associated with a subset of the one or more resource configurations. The system may process, using respective resource processing modules of the system, the one or more XML configuration sub-streams to generate respective information associated with the subset of the one or more resource configurations.
A network device may install a new receive encryption key, and may start a timer associated with deleting an old receive encryption key. The network device may provide, to another network device, a message identifying the new receive encryption key, and may determine whether packet counts, successfully decrypted with the old receive encryption key, have changed. The first network device may determine whether the timer has expired, and may determine whether the new receive encryption key has successfully decrypted a packet. The first network device may delete the old receive encryption key from the first network device based on the new receive encryption key successfully decrypting a packet.
A network device may receive traffic associated with a network, and may generate a system message based on the traffic. The network device may convert the system message into a binary message, and may compress the binary message to generate a compressed binary message. The network device may provide the compressed binary message to a server device, and the server device may process the compressed binary message, with a decoder, to generate the system message.
In some implementations, a network device may transmit a key request and a proposed key request rate associated with the key request. The network device may receive a response to the key request based on the proposed key request rate. In some implementations, a network device may transmit a key request. The network device may receive a response to the key request that includes a key-derived key or an indication of a time associated with another key request.
In some implementations, a client device may send to an access gateway function (AGF) device, and via a wireline connection, a first Internet protocol (IP) message that includes non-access stratum (NAS) information. The client device may receive from the AGF device, via the wireline connection, and based on sending the first IP message, a second IP message that includes acknowledgement information. The NAS information may be included in a service data unit (SDU) that is encapsulated in the first IP message. The wireline connection may be a user datagram protocol (UDP) wireline connection or a transmission control protocol (TCP) wireline connection.
H04L 69/18 - Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
H04L 69/168 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP] specially adapted for link layer protocols, e.g. asynchronous transfer mode [ATM], synchronous optical network [SONET] or point-to-point protocol [PPP]
64.
ENCAPSULATED INTERNET PROTOCOL TRANSPORT DATA PACKETS COMMUNICATED IN CABLE NETWORKS
In some implementations, a client device may send to an access gateway function (AGF) device, and via a wireline connection, one or more first encapsulated Internet protocol (IP) transport data packets. The client device may receive from the AGF device, and via the wireline connection, one or more second encapsulated IP transport data packets. In some implementations, the one or more first encapsulated IP transport data packets are sent via a general packet radio service (GPRS) tunneling protocol (GTP) for user data (GTP-U) tunnel over the wireline connection, and the one or more second encapsulated IP transport data packets are received via the GTP-U tunnel.
A device may provide a class of service configuration to a plurality of network devices of a network serving a plurality of user devices, and may identify a set of network devices, of the plurality of network devices, that are subject to a modified class of service. The device may receive telemetry data associated with the plurality of the network devices, and may determine whether the telemetry data satisfies a threshold. The device may selectively maintain the class of service configuration for the plurality of network devices based on the telemetry data failing to satisfy the threshold, or modify the class of service configuration to cause the set of network devices to provide the modified class of service for a set of user devices based on the telemetry data satisfying the threshold.
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 47/2425 - Traffic characterised by specific attributes, e.g. priority or QoS for supporting services specification, e.g. SLA
66.
Apparatus, system, and method for optimizing storage usage in connection with segment identifiers
A network device may include (1) at least one storage device configured to store a plurality of SIDs and (2) at least one processing device configured to (A) insert, into the storage device, a single instance of a SID corresponding to a multihomed network segment and/or (B) advertise the SID to a remote network device for aliasing to enable the remote network device to load-balance traffic across the multihomed network segment. Various other apparatuses, systems, and methods are also disclosed.
Techniques are described for monitoring application performance in a computer network. For example, a network management system (NMS) includes a memory storing path data received from a plurality of network devices, the path data reported by each network device of the plurality of network devices for one or more logical paths of a physical interface from the given network device over a wide area network (WAN). Additionally, the NMS may include processing circuitry in communication with the memory and configured to: determine, based on the path data, one or more application health assessments for one or more applications, wherein the one or more application health assessments are associated with one or more application time periods for a site, and in response to determining at least one failure state, output a notification including identification of a root cause of the at least one failure state.
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/08 - Configuration management of networks or network elements
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 43/067 - Generation of reports using time frame reporting
68.
DEFAULT TRANSMIT POWER FOR 400ZR OPTICAL TRANSMITTER
An optical communication device includes an optical transmitter configured to transmit data over an optical link. The optical communication device also includes a memory having a configuration location of one or more bytes, and one or more registers storing a default transmit power value. The optical communication device also includes a controller configured to access the configuration location. In response to determining that no valid transmit power value is indicated by information stored in the configuration location, the controller accesses the one or more registers to read the default transmit power value, and sets a transmit power level of the optical transmitter to the default transmit power value.
Techniques are described for predicting a wide area network (WAN) issue based on detection of service provider connection swapping. A cloud-based network management system (NMS) obtains connection event data for one or more network access server (NAS) devices at a site, where each event included in the connection event data comprises a connection or disconnection event of a connection session provided by a service provider. The NMS detects a number of connection swaps in the connection event data over a time window, where a connection swap includes a change from a first connection session provided by a first service provider to a second connection session provided by a second service provider. Based on the detected number of connection swaps satisfying a threshold, the NMS predicts a root cause of the connection swaps as a WAN issue and generates a notification of the predicted root cause of the connection swaps.
H04L 41/147 - Network analysis or design for predicting network behaviour
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
70.
CLOUD-BASED MANAGEMENT OF HARDWARE COMPLIANCE DATA FOR ACCESS POINT DEVICES
A plurality of access point (AP) devices configured to provide a wireless network at a site within a geographic region and a management system (NMS) configured to manage the plurality of APs are described. An AP device sends, to the NMS, a message including version information of hardware compliance data currently stored at the AP device. The NMS determines, based on the version information, whether the first version of the hardware compliance data stored at the AP device is in compliance with applicable regulations of the geographic region. When the first version is not in compliance, the AP device receives, from the NMS, a second version of the hardware compliance data that is in compliance with the applicable regulations of the geographic region. The AP device enables operation of one or more hardware components of the AP device in accordance with the second version of the hardware compliance data.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04B 17/11 - MonitoringTesting of transmitters for calibration
H04B 17/21 - MonitoringTesting of receivers for calibrationMonitoringTesting of receivers for correcting measurements
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
U-Turn detour paths, though the head-end router of a primary label switched path (LSP), are configured and used to enable fast failover to a secondary LSP, while avoiding reserving bandwidth (e.g., on links unused by primary and secondary paths) unnecessarily.
A cloud-based network management system (NMS) stores path data from network devices operating as network gateways for an enterprise network, the path data collected by each network device of the plurality of network devices. The NMS determines, for a logical path within a specified time window, a wireless signal quality and a link quality based at least in part on the path data. The NMS, in response to determining that the logical path is of a poor link quality, determine a correlation between a poor wireless quality and the poor link quality. The NMS may output a notification that indicates the correlation between the poor wireless quality and the poor link quality of the logical path.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
In general, this disclosure describes techniques that enable a network system to perform application-aware active measurement for monitoring network health. The network system includes memory that stores a topology graph for a network. The network system includes processing circuitry that may receive an identifier associated with an application utilizing the network for communications, and determine, based on the topology graph and the identifier, a subgraph of the topology graph based on a location, in the topology graph, of a node representing a compute node that is a host of the application. The processing circuitry may next determine, based on the subgraph, a probe module to measure performance metrics associated with the application, and for the probe module, generate configuration data corresponding to the probe module. The processing circuitry may output, to the probe module, the configuration data.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A device comprises processing circuitry configured to configure an edge device to collect telemetry flow data output by a plurality of network devices and to generate processed telemetry flow data based on the collected telemetry flow data. The processing circuitry is further configured to receive the processed telemetry flow data from the edge device and store an indication of the processed telemetry flow data.
In some implementations, a first access gateway function (AGF) may receive, from a second AGF, a communication indicating at least one of a subscriber identity, session information, subscriber context, or session transport information associated with an active session between the second AGF and a client device. The first AGF device may detect that the second AGF device is associated with a failure. The first AGF device may transmit, to a first core network device, a request to switch a first path associated with the active session from the second AGF device to the first AGF device, wherein the request indicates at least one of the subscriber identity, the session information, the subscriber context, or the session transport information. The first AGF device may forward one or more data communications between a second core network device and the DHCP client device associated with the active session via a second path.
A computing device may implement the techniques described in this disclosure. The computing device may include processing circuitry configured to execute an analysis framework system, and memory configured to store time series data. The analysis framework system may create, based on the time series data, a knowledge graph comprising a plurality of first nodes in the network system referenced in the time series data interconnected by edges. The analysis framework system may cause a graph analytics service of the analysis framework system to receive a graph analysis request comprising a request to determine a fault propagation path, a request to determine changes in the knowledge graph, a request to determine an impact of an emulated fault, or a request to determine an application-to-network path. The analysis framework system may also cause the graph analytics service to determine a response to the graph analysis request, and output the response.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
77.
CONTINUITY INFORMATION INCLUDED IN METRIC DATA ELEMENT OF A NON-TRANSITIVE ATTRIBUTE
In some implementations, a border gateway protocol (BGP) network device may receive from an originator BGP network device via a first other BGP network device, a first message, wherein the first message includes first attribute data associated with a non-transitive attribute, wherein the first attribute data comprises a first metric data element that is associated with a metric data element format and that indicates a metric type, a metric value, and continuity information. The BGP may process the first message to determine first path information associated with a first path from the BGP network device to the originator BGP network device via the first other BGP network device.
In some implementations, an ingress node may receive first traffic from a host device. The ingress node may determine and based on an ingress filter of the ingress node, that traffic from the host device is allowed. The ingress node may select, using a load balancing functionality, and based on determining that traffic from the host device is allowed, a security node, of a plurality of security nodes, to which the ingress node is to forward the first traffic. The ingress node may forward the first traffic to the selected security node. The ingress node may receive, based on forwarding the first traffic, a message that indicates that traffic from the host device is to be blocked. The ingress node may update, using the message, the ingress filter of the ingress node to indicate that traffic from the host device is to be blocked.
In some implementations, a network device may receive an indication of a next-next-hop of the network device and link quality information of the next-next-hop. The network device may transmit network traffic based on the indication of the next-next-hop and the link quality information of the next-next-hop.
A device may configure, in the device, a network address of an access gateway function, and may receive upstream packets from one or more routing gateways. The device may encapsulate the upstream packets with an identifier of a layer 2 tunnel, based on the network address, and to generate encapsulated upstream packets, and may provide the encapsulated upstream packets to the access gateway function via the layer 2 tunnel and based on the network address and the identifier. The device may receive encapsulated downstream packets from the access gateway function, and may decapsulate the encapsulated downstream packets to generate downstream packets. The device may provide the downstream packets to the one or more routing gateways.
Techniques are described for determining port misconfiguration between network devices. For example, a network management system comprises a memory and one or more processors in communication with the memory and configured to: obtain information associated with one or more ports of a plurality of network devices; determine, based on information associated with a port of a first network device of the plurality of network devices and information associated with a port of a second network device of the plurality of network devices that is connected to the port of the first network device, whether there is a port misconfiguration of the first network device or the second network device; and perform, based on the determination that there is a port misconfiguration of the first network device or the second network device, an action to remedy the port misconfiguration of the first network device or the second network device.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
A device may receive an input associated with deploying a virtual firewall on a computing device. The device may determine a first set of characteristics associated with the virtual firewall and a second set of characteristics associated with a hypervisor associated with the computing device. The device may automatically tune the virtual firewall based on the first set of characteristics and the second set of characteristics. The device may deploy the virtual firewall after tuning the virtual firewall.
Techniques are described for configuration and application of intent-based network access control (NAC) policies for authentication and authorization of multi-tenant, network access server (NAS) devices to access enterprise networks of organizations. A network management system configures intent-based NAC policies for an organization. A cloud-based NAC system may apply an appropriate intent-based NAC policy in response to an authentication request from a NAS device. The NAC system identifies a vendor of the NAS device, matches incoming attributes in the authentication request to a set of normalized match rules of the intent-based NAC policy, and translates a set of abstracted policy results corresponding to the set of normalized match rules into a vendor-specific set of return attributes based on the vendor of the NAS device. The NAC system sends the vendor-specific set of return attributes to the NAS device to enable the NAS device to access the enterprise network of the organization.
A customer edge device is connected, in a multi-homed configuration, to a device via a downlink of the device and to another device via another downlink of the other device. The device may determine that each of one or more uplinks of the device has an inactive interface status and may thereby cause the downlink of the device to be down. This may cause the customer edge device to communicate network traffic via the other downlink of the other device. The device may determine that at least one uplink, of the one or more uplinks, has an active interface status and may thereby cause the downlink to be up. This may cause the customer edge device to communicate network traffic via the downlink of the device.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
A network management system (NMS) generates a hierarchical attribution graph representing different scopes at different hierarchical levels of a wide area network (WAN); obtains logical path down data indicative of operational behavior including failure events associated with logical paths of network devices over the WAN; obtains total path data indicative of a historical number of active logical paths between the network devices; and determines a scope of a logical path down issue by, for a time period of the logical path down issue, determining a score for each scope of the different scopes based on the logical path down data aggregated across the respective scope and the total path data, and determining the scope of the logical path down issue as a particular scope of the different scopes having a highest score. The NMS may identify the particular scope as a root cause of the logical path down issue.
H04L 43/062 - Generation of reports related to network traffic
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
86.
Virtualized cell site routers with layer 2 forwarding
In general, techniques are described for deploying virtualized cell site routers (vCSRs). In an example, a method comprises receiving, at a forwarding plane of a virtualized cell site router (vCSR) of a first Distributed Unit (DU) of a plurality of DU servers of a cell site for a 5G radio access network, the vCSR having a containerized routing protocol process and a forwarding plane configured to perform Layer 2 (L2) switching, L2 packets on a second interface for a second physical link connecting the first DU server to an L2 switch; and switching, by the forwarding plane of the vCSR of the first DU, the L2 packets on a first interface for a first physical link connecting the first DU server to a second DU server of the plurality of DU servers.
Techniques are disclosed for overlaying logical switch fabrics upon a physical switch fabric comprising multiple physical switch devices. In one example, a network device determines an overlay network associated with a received packet. The network device determines a logical identifier that is associated with the overlay network. In some examples, the logical identifier corresponds to a color. The network device selects a logical switch fabric that is associated with the logical identifier from a plurality of other logical switch fabrics that are overlaid upon a physical switch fabric comprising a plurality of network switch devices. The network device forwards the received packet to the selected logical switch fabric for transport across the physical switch fabric.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 45/00 - Routing or path finding of packets in data switching networks
This disclosure describes techniques are described for proactively computing configuration information for policy-driven on-demand tunnel creation and deletion between sites in a software-defined networking in wide area network (SD-WAN) environment. In some examples, a controller device is configured to precompute configuration data for an overlay tunnel through the wide area network to connect a first site and a second site of a plurality of sites in the SD-WAN environment. The controller device is further configured to obtain, after precomputing the configuration data, an indication to configure the overlay tunnel. The controller device is also configured to send, in response to receiving the indication to configure the overlay tunnel, at least some of the configuration data to the first site to configure the first site with the overlay tunnel.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
In some implementations, a network device may transmit an indication that a first access gateway function user plane (AGF-UP) device is associated with an active state for a subscriber group, an indication that a second AGF-UP device is associated with a backup state for the subscriber group, and an indication of a virtual internet protocol (IP) address associated with the subscriber group. The network device may transmit a failover indication that the second AGF-UP device is associated with the active state for the subscriber group.
Example network management systems, techniques, and computer-readable media are set forth herein. An example network management system is configured to obtain client activity data of one or more access point (AP) devices. The example network management system is configured to determine, based on the client activity data, an anomaly in a behavior of an AP device of the one or more AP devices based on at least one of a comparison to forecasted client activity data of the AP device or a comparison to client activity data of at least one peer AP device. The network management system is configured to perform, based on the determined anomaly in the behavior of the AP device, an action.
A network device may receive transport layer messages from an ingress network device, and may determine whether a quantity of resources required for processing the transport layer messages exceeds a threshold level of available resources of the network device. The network device may generate a transport layer path error message based on the quantity of resources required for processing the transport layer messages exceeding the threshold level of available resources. The network device may provide the transport layer path error message to the ingress network device to prevent the ingress network device from providing additional transport layer messages to the network device.
A network device may identify a link aggregation group (LAG) of a plurality of links between the network device and another network device. The network device may identify link aggregation control protocol (LACP) parameters that were communicated by the network device and the other network device in association with the LAG. The network device may determine, based on the LACP parameters, a priority order of the plurality of links in the LAG. The network device may communicate with the other network device, and based on the priority order of the plurality of links of the LAG, one or more precision time protocol (PTP) messages via the LAG. For example, the network device may determine that a first link and a second link in the priority order are not available, and therefore may communicate the one or more PTP messages via a third link in the priority order.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
Techniques are disclosed for maintaining processing unit core affinity for fragmented packets. In one example, a service physical interface card (PIC) implementing a service plane of a network device receives fragmented and/or non-fragmented packet data for a traffic flow. The service PIC comprises at least one processing unit comprising multiple cores. A routing engine operating in a control plane of the network device defines one or more core groups comprising a subset of the cores. The routing engine assigns the traffic flow to a core group and a forwarding engine operating in a forwarding plane of the network device forwards the packet data for the traffic flow to the assigned core group. A core of the assigned core group applies a network service to the fragmented and/or non-fragmented packet data for the traffic flow, and the forwarding engine forwards the packet data for the traffic flow toward a destination.
In general, techniques are described for managing a distributed application based on call paths among the multiple services of the distributed application that traverse underlying network infrastructure. In an example, a method comprises determining, by a computing system, and for a distributed application implemented with a plurality of services, a call path from an entry endpoint service of the plurality of services to a terminating endpoint service of the plurality of services; determining, by the computing system, a corresponding network path for each pair of adjacent services from a plurality of pairs of services that communicate for the call path; and based on a performance indicator for a network device of the corresponding network path meeting a threshold, performing, by the computing system, one or more of: reconfiguring the network; or redeploying one of the plurality of services to a different compute node of the compute nodes.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
A disclosed apparatus may include and/or represent a first node and a second node communicatively coupled to the first node. In some examples, the second node is configured to send binding information to the first node and then resend the binding information to the first node due at least in part to not having received an acknowledgement of successful installation of the binding information from the first node. Various other devices, systems, and methods are also disclosed.
In some implementations, a connection optimization device may determine a first connection configuration associated with network equipment, wherein the network equipment includes multiple external facing ports, and wherein the first connection configuration is associated with a connectivity of one or more network devices to the multiple external facing ports. The connection optimization device may determine that the first connection configuration is a suboptimal connection configuration of the network equipment. The connection optimization device may determine, based on determining that the first connection configuration is a suboptimal connection configuration, a second connection configuration associated with the network equipment, wherein the second connection configuration is an optimized connection configuration of the network equipment. The connection optimization device may cause feedback to be transmitted to a user interface device, wherein the feedback indicates a recommendation to change the first connection configuration to the second connection configuration.
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/0833 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network energy consumption
H04L 41/08 - Configuration management of networks or network elements
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A system includes a plurality of access point devices (APs) configured to provide a wireless network at a site, each of the plurality of APs having a known location, and a network management system comprising one or more processors and a memory comprising instructions that when executed by the one or more processors cause the one or more processors to: determine, based on a known location of a first AP of the plurality of APs, a known location of a second AP of the plurality of APs, and received signal strength measurements of wireless signals originating at one or more antennas of the first AP and received by one or more antennas of the second AP, an orientation angle of the second AP; and generate an output indicative of the orientation angle of the second AP.
The techniques describe a network management system (NMS) configured to obtain, from a first computing device supporting ultra-wide band (UWB) protocol, a request to access a resource. The NMS may initiate an UWB secure ranging session between the first computing device and a second computing device to determine a location of the first computing device, the second computing device supporting the UWB protocol. The NMS may obtain, based on the UWB secure ranging session, distance measurements between the first computing device and the second computing device. The NMS may determine the location of the first computing device based on the distance measurements. The NMS may provide the first computing device with access to the resource based on the location of the first computing device satisfying a condition of an access policy for the resource.
In some implementations, a network control point may manage power consumption in a network. Some aspects may involve adjusting a network topology to manage network power consumption. For example, the resulting network power or power type consumption may be less than or equal to a power or power type budget specified by a network administrator.
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/0833 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network energy consumption
H04L 41/12 - Discovery or management of network topologies
H04L 41/147 - Network analysis or design for predicting network behaviour
H04L 41/149 - Network analysis or design for prediction of maintenance
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters