Combining networking technologies to optimize wide area network traffic

    公开(公告)号:US11888752B2

    公开(公告)日:2024-01-30

    申请号:US17465699

    申请日:2021-09-02

    CPC classification number: H04L47/2475 H04L41/5051 H04L45/308

    Abstract: Techniques for using application network requirements and/or telemetry information from a first networking technology to enhance operation of a second networking technology and optimize wide area network traffic are described herein. The techniques may include establishing a communication network for use by applications of a scalable application service platform, the communication network including a first networking technology and a second networking technology. In this way, a request to establish a connection for use by an application may be received by the first networking technology. The request may include an indication of a threshold service level of the connection. In response to the request, the first networking technology may determine whether the second networking technology is capable of hosting the connection. If the second networking technology is capable of hosting the connection, the connection may be established such that application traffic is sent or received using the second networking technology.

    COMBINING NETWORKING TECHNOLOGIES TO OPTIMIZE WIDE AREA NETWORK TRAFFIC

    公开(公告)号:US20230069689A1

    公开(公告)日:2023-03-02

    申请号:US17465699

    申请日:2021-09-02

    Abstract: Techniques for using application network requirements and/or telemetry information from a first networking technology to enhance operation of a second networking technology and optimize wide area network traffic are described herein. The techniques may include establishing a communication network for use by applications of a scalable application service platform, the communication network including a first networking technology and a second networking technology. In this way, a request to establish a connection for use by an application may be received by the first networking technology. The request may include an indication of a threshold service level of the connection. In response to the request, the first networking technology may determine whether the second networking technology is capable of hosting the connection. If the second networking technology is capable of hosting the connection, the connection may be established such that application traffic is sent or received using the second networking technology.

    Layer-3 policy enforcement for layer-7 data flows

    公开(公告)号:US12294569B2

    公开(公告)日:2025-05-06

    申请号:US17718634

    申请日:2022-04-12

    Abstract: Techniques for using proxies with overprovisioned IP addresses to demultiplex data flows, which may otherwise look the same at L7, into multiple subflows for L3 policy enforcement without having to modify an underlying L3 network. The techniques may include establishing a subflow through a network between a first proxy and a second proxy, the subflow associated with a specific policy. In some examples, the first proxy node may receive an encrypted packet that is to be sent through the network and determine, based at least in part on accessing an encrypted application layer of the packet, a specific application to which the packet is to be sent. The first proxy node may then alter an IP address included in the packet to cause the packet to be sent through the network via the subflow such that the packet is handled according to the specific policy.

    APPLICATION MONITORING SYSTEM FOR NETWORK ORCHESTRATION

    公开(公告)号:US20240205094A1

    公开(公告)日:2024-06-20

    申请号:US18591960

    申请日:2024-02-29

    CPC classification number: H04L41/12

    Abstract: An application monitoring system for collecting, utilizing, and/or exchanging state information (e.g., application state and network state), configuration information, and/or other information to make network optimizations for applications orchestrated by an application orchestration system. The application monitoring system may include an application orchestrator discovery component that is configured to determine a presence of an application orchestration system for orchestrating applications. The application monitoring system may also include one or more application watch components for monitoring, among other things, application state, application configuration, and/or application replicas. The application monitoring system may further include a network state propagation component configured to provide network state information to the orchestration system.

    Extending distributed application tracing for network optimizations

    公开(公告)号:US12010001B2

    公开(公告)日:2024-06-11

    申请号:US18234252

    申请日:2023-08-15

    CPC classification number: H04L43/026 H04L43/10

    Abstract: Techniques for extending network elements to inspect, extract, and complement tracing information added to L7 flows by application distributed tracing systems. The techniques may include receiving a Layer-7 (L7) message of an L7 flow associated with a distributed application and determining that the L7 message includes tracing information. In some examples, the tracing information may be mapped to a marking that is to be included in a Layer 3 (L3) or Layer-4 (L4) packet carrying the L7 message, and the L3 or L4 packet including the marking may be sent to an L3 or L4 network element. In some examples, the L3 or L4 network element may be configured to utilize the marking to determine a network decision for the L3 or L4 packet.

    EXTENDING DISTRIBUTED APPLICATION TRACING FOR NETWORK OPTIMIZATIONS

    公开(公告)号:US20240097998A1

    公开(公告)日:2024-03-21

    申请号:US18234252

    申请日:2023-08-15

    CPC classification number: H04L43/026 H04L43/10

    Abstract: Techniques for extending network elements to inspect, extract, and complement tracing information added to L7 flows by application distributed tracing systems. The techniques may include receiving a Layer-7 (L7) message of an L7 flow associated with a distributed application and determining that the L7 message includes tracing information. In some examples, the tracing information may be mapped to a marking that is to be included in a Layer 3 (L3) or Layer-4 (L4) packet carrying the L7 message, and the L3 or L4 packet including the marking may be sent to an L3 or L4 network element. In some examples, the L3 or L4 network element may be configured to utilize the marking to determine a network decision for the L3 or L4 packet.

    Automatic SAAS optimization
    18.
    发明授权

    公开(公告)号:US12301418B2

    公开(公告)日:2025-05-13

    申请号:US18422708

    申请日:2024-01-25

    Abstract: Techniques for enabling a network access provider to make automatic Software as a Service (SaaS) optimization decisions. Among other things, the techniques may include determining a SaaS application that is being accessed by client endpoints via flows through a network access provider. The techniques may also include determining, based at least in part on a policy associated with the network access provider, whether to enable network optimizations for traffic through the network access provider to the SaaS application. Based at least in part on a determination that the network optimizations are to be enabled for the traffic to the SaaS application, the techniques may include installing a service definition associated with the SaaS application in a service policy database of the network access provider.

    PASSING APPLICATION NETWORK METADATA TO NETWORK CONTROLLERS USING SERVICE REGISTRIES

    公开(公告)号:US20240380699A1

    公开(公告)日:2024-11-14

    申请号:US18748415

    申请日:2024-06-20

    Abstract: Techniques for obtaining application network metadata from a service registry so that a network routing policy may be derived for traffic associated with the application are described herein. The techniques may include receiving, at a service registry, network metadata associated with traffic of an application hosted by a scalable application service platform. The techniques may also include obtaining, by a controller of a network and from the service registry, the network metadata associated with the traffic of the application. Based at least in part on the network metadata, the controller may determine a routing policy that is optimized for sending the traffic through the network. Additionally, the controller may send an indication of the routing policy to a node of the network or otherwise provision the network such that the traffic of the application is sent through the network according to the routing policy.

    Underlay network traffic steering
    20.
    发明授权

    公开(公告)号:US12120027B2

    公开(公告)日:2024-10-15

    申请号:US17992140

    申请日:2022-11-22

    CPC classification number: H04L45/74 H04L45/24 H04L45/566

    Abstract: Techniques for steering overlay network traffic along specific paths through an underlay network. The techniques may include determining a path through an underlay network that is optimized for sending a packet from a first node of an overlay network to a second node of the overlay network. The techniques may also include determining a destination address for sending the packet along the path from the first node to the second node, the destination address including a micro segment identifier (uSID) corresponding with an underlay node that is disposed along the path through the underlay network and trailing bits representing a portion of an address that corresponds with the second node. The techniques may also include causing the packet to be modified to include the destination address such that the packet is sent from the first node to the second node along the path.

Patent Agency Ranking