CONFIGURATION VALIDATION IN A DISAGGREGATED NETWORK OS ENVIRONMENT

    公开(公告)号:US20230401072A1

    公开(公告)日:2023-12-14

    申请号:US17898924

    申请日:2022-08-30

    CPC classification number: G06F9/44505 G06F8/65 H04L45/02

    Abstract: A network device has a first OS component, a second OS component is added to run concurrently with the first. The first OS component transmits routing information to the second OS component where it is stored in memory. The second OS component registers with a routing infrastructure to receive packets that are routed to the first OS component. A timestamp and a first ID are added to a first instance of a packet and transmitted to the first OS component. The timestamp and a second ID are added to a second instance of the packet and transmitted to the second OS component. First functionality data for the first OS component is transmitted to a controller. Second functionality data for the second OS component is transmitted to the controller. The first and second functionality data are compared to determine whether to replace the first OS component with the second OS component.

    EVENT TRIGGERED GUARANTEED SERVICE CONNECTIVITY

    公开(公告)号:US20230300037A1

    公开(公告)日:2023-09-21

    申请号:US17695085

    申请日:2022-03-15

    CPC classification number: H04L41/5009 H04L41/5045

    Abstract: A device associated with an enterprise receives, from a user device, a message indicating that a user of the user device has requested a service level for accessing a service while performing teleworking activities for the enterprise. The user device accesses the service via a network that includes a portion controlled by an Internet Service Provider (ISP). The enterprise has established an agreement with the ISP indicating that the ISP is to provide service levels for users who are performing teleworking activities for the enterprise via the ISP. The ISP associated with the user device is identified based on the message. A request is transmitted to the ISP to provide the service level for the portion of the network that is controlled by the ISP and the ISP provides the service level for accessing the service based on the request.

    Determining node behavior in deterministic networks

    公开(公告)号:US11716274B2

    公开(公告)日:2023-08-01

    申请号:US17866465

    申请日:2022-07-15

    CPC classification number: H04L43/12 H04L43/0817

    Abstract: This disclosure describes techniques for monitoring expected behavior of devices in a computing network. Behavior of network devices may include performing various functions associated with transferring data packets through the computing network. Monitoring expected behavior may include sending a probe packet into the computing network, and determining whether network devices behave as expected with respect to the probe packet. In some examples, behaviors such as replicating, forwarding, eliminating, ordering, and/or other functions regarding data packets may be validated using the present techniques. As computing networks and/or operations become more complex, assuring the expected behavior of network devices may become more important for the continued efficient, smooth, successful, and/or timely flow of data traffic.

    Efficient BIER forwarding over varying BSL domain using header stitching

    公开(公告)号:US11705983B2

    公开(公告)日:2023-07-18

    申请号:US17208293

    申请日:2021-03-22

    CPC classification number: H04L1/0007 H04L45/745

    Abstract: The present disclosure is directed to BIER forwarding over varying BSL domains, the methods including the steps of receiving, at a border node, a packet comprising a BIER header having a BIER bit string with a first bit string length; reading an incoming label of the packet comprising instructions to split the BIER header into a plurality of smaller headers associated with a plurality of smaller bit strings; generating a set of split bit masks; performing a separate bitwise AND operation on each split bit mask and the BIER bit string to generate the plurality of smaller bit strings, each copied to a corresponding smaller header of the plurality of smaller headers; and performing a lookup for each of the plurality of smaller headers on a respective forwarding table to determine one or more egress routers to which to transmit the packet.

    MITIGATING SECURITY THREATS IN DAISY CHAINED SERVERLESS FaaS FUNCTIONS

    公开(公告)号:US20230208855A1

    公开(公告)日:2023-06-29

    申请号:US17559164

    申请日:2021-12-22

    CPC classification number: H04L63/1416 H04L41/22 H04L63/1425 H04L63/1466

    Abstract: In one embodiment, a method comprises: receiving, by a process, an executed function flow of a daisy chained serverless function-as-a-service (FaaS) function, the executed function flow having been injected with a particular trace identifier in response to an initial event trigger and span identifiers having been injected by each service that was executed; generating, by the process, a serverless flow graph associated with the particular trace identifier based on linking a path of serverless functions according to correlation of the span identifiers between the serverless functions; performing, by the process, a trace-based analysis of the serverless flow graph through comparison to a baseline of expectation; detecting, by the process, one or more anomalies in the serverless flow graph according to the trace-based analysis; and mitigating, by the process, the one or more anomalies in the serverless flow graph.

Patent Agency Ranking