摘要:
A method and/or network system is able to perform an in-service software upgrade (“ISSU”) using virtualization technology while ongoing network service is maintained. After receipt of an upgrade signal such as a command of software upgrade, a new or second virtual machine (“VM”) is created in response to the upgrade signal. After downloading the new version of program to the second VM while maintaining the first version of program running on the first VM, the process for providing network management begins to migrate from the first version of program to the new version of program. The process simultaneously facilitates ISSU for a data-path module such as a line card to convert from the previous version of software to the new version of the software.
摘要:
An apparatus and method for providing a cloud hosted application able to manage virtual network (“VN”) is disclosed. In one embodiment, a process of managing VN using virtual machines (“VMs”) receives a message or request from a user requesting a new VN to be built. The request is sent from a dashboard to a network orchestrator via a communication network. The orchestrator is a VN manager able to facilitate building a VN based on users' input. In one aspect, the orchestrator provides a set of templates that represent VN devices or components to users for facilitating construction of VN. After configuring a VN, a cloud capable of hosting the network is selected. The network or VN is subsequently launched using at least a portion of computing resources allocated in the cloud.
摘要:
A process capable of automatically establishing a secure overlay network (“SON”) across different clouds is disclosed. The process, in one aspect, receives a first request from a first node in a first cloud for establishing a SON. After receiving a second request for connecting to the SON from a second node in a second cloud, a first connection is established connecting between the first node and the second node utilizing a network security protocol such as Internet Protocol Security (“IPSec”). After receiving a third request for connecting to the SON from a third node in a third cloud, a second connection is used to connect between the first node and the third node. A third connection is used to connect between the second node and the third node. Each subsequent request for connecting to the SON from a new node results in new connections between the new node and each existing node in the SON forming a full-mesh.
摘要:
An apparatus and method for providing a cloud hosted application able to manage virtual network (“VN”) is disclosed. In one embodiment, a process of managing VN using virtual machines (“VMs”) receives a message or request from a user requesting a new VN to be built. The request is sent from a dashboard to a network orchestrator via a communication network. The orchestrator is a VN manager able to facilitate building a VN based on users' input. In one aspect, the orchestrator provides a set of templates that represent VN devices or components to users for facilitating construction of VN. After configuring a VN, a cloud capable of hosting the network is selected. The network or VN is subsequently launched using at least a portion of computing resources allocated in the cloud.
摘要:
An apparatus and method for providing a cloud hosted application able to manage virtual network (“VN”) is disclosed. In one embodiment, a process of managing VN using virtual machines (“VMs”) receives a message or request from a user requesting a new VN to be built. The request is sent from a dashboard to a network orchestrator via a communication network. The orchestrator is a VN manager able to facilitate building a VN based on users' input. In one aspect, the orchestrator provides a set of templates that represent VN devices or components to users for facilitating construction of VN. After configuring a VN, a cloud capable of hosting the network is selected. The network or VN is subsequently launched using at least a portion of computing resources allocated in the cloud.
摘要:
A process capable of automatically establishing a secure overlay network (“SON”) across different clouds is disclosed. The process, in one aspect, receives a first request from a first node in a first cloud for establishing a SON. After receiving a second request for connecting to the SON from a second node in a second cloud, a first connection is established connecting between the first node and the second node utilizing a network security protocol such as Internet Protocol Security (“IPSec”). After receiving a third request for connecting to the SON from a third node in a third cloud, a second connection is used to connect between the first node and the third node. A third connection is used to connect between the second node and the third node. Each subsequent request for connecting to the SON from a new node results in new connections between the new node and each existing node in the SON forming a full-mesh.
摘要:
A method and/or network system is able to perform an in-service software upgrade (“ISSU”) using virtualization technology while ongoing network service is maintained. After receipt of an upgrade signal such as a command of software upgrade, a new or second virtual machine (“VM”) is created in response to the upgrade signal. After downloading the new version of program to the second VM while maintaining the first version of program running on the first VM, the process for providing network management begins to migrate from the first version of program to the new version of program. The process simultaneously facilitates ISSU for a data-path module such as a line card to convert from the previous version of software to the new version of the software.
摘要:
A method and/or network configuration configured to enhance network performance using virtual system redundancy is disclosed. The network configuration, in one embodiment, includes a first packet core entity (“PCE”), routing cloud, and a second PCE. The first PCE, which includes a virtual backup module configured to facilitate virtual backup, actively provides network services to subscribers. The routing cloud provides network communication between network entities or PCEs across geographical distances. The second PCE, in one embodiment, includes a virtual smart core (“VSC”), wherein the VSC facilitates a redundancy instance for the first PCE. The first PCE and the second PCE may be separated with a long distance.
摘要:
A method and apparatus for predicting a handover of a Mobile Station (MS) of a plurality of MSs to one or more target Base Stations (BSs) of a plurality of BSs in a wireless communication network. The method includes predicting a need for a handover of a MS to one or more target BSs selected from the plurality of BSs based on a handover threshold. The handover threshold is associated with a quality of a signal received by the MS. The method further includes transferring datapath associated with the MS to one or more of the one or more target BSs and one or more gateways prior to the handover of the MS. The one or more gateways are associated with one or more of a serving BS associated with the MS and the one or more target BSs. The plurality of BSs includes the serving BS.
摘要:
As part of mobility management messaging in current systems, only static quality of service (QoS) profiles and their statically configured classifiers are reported. These classifiers are known a priori and are typically used for hosted traffic. Once advanced application classifiers are matched and mobility messaging is done, the deep packet inspection (DPI) learned subscriber context is lost. An embodiment of the invention is configured to associate DPI-learned dynamic classifiers with the classifier's policy information as payload over mobility management messaging. The embodiment is useful for identifying protocols and applications, for authentication purposes, solving congestion—based issues between elements in a network, guaranteeing QoS without reserving resources statically, attaching traffic packets to a particular subscriber, and creating mobile signaling to provision end-to-end communication in a network. Thereby enabling the transfer of subscriber parameters and information to be associated with the subscriber throughout subscriber movement through multiple elements of a network.