User- and application-based network treatment policies

    公开(公告)号:US11057308B2

    公开(公告)日:2021-07-06

    申请号:US16565044

    申请日:2019-09-09

    Abstract: Systems, methods, and devices are disclosed for personalizing quality of service for network traffic. A user priority is assigned to a specific user and an application priority is assigned to a type of application. A header including an identifier is added to a packet from a client device associated with the type of application and the specific user in order to generate a modified packet. The identifier is based on a combination of the user priority associated with the specific user and an application priority. The modified packet is forwarded end to end through a network that is personalized to the specific user and the type of application by mapping a treatment policy to the identifier.

    Switch triggered traffic tracking
    22.
    发明授权

    公开(公告)号:US10819572B2

    公开(公告)日:2020-10-27

    申请号:US16366968

    申请日:2019-03-27

    Abstract: Systems and methods provide for performing performance analytics processing of network traffic by copying packets of network traffic to a switch CPU based on a flag. The systems and methods disclosing receiving network traffic comprising one or more packet, generating a network traffic flow record associated with the received network traffic, the network traffic flow record including a copy-to-CPU bit and one or more function flag bits, setting the copy-to-CPU bit to an on configuration, processing the one or more packets by one or more functions to generate network flow analytics, wherein the one or more function flag bits are set in response to the one or more functions generating network flow analytics, and setting the copy-to-CPU bit to an off configuration.

    Multitenant network orchestration
    24.
    发明授权

    公开(公告)号:US12267328B2

    公开(公告)日:2025-04-01

    申请号:US17695265

    申请日:2022-03-15

    Abstract: Methods are provided in which a network device hosts distinct network access resources that are managed by different entities. The method includes obtaining a request for partitioning one or more network resources of an on-premise network device for connecting one or more endpoints to a first network managed by a first entity. The on-premise network device connects one or more endpoints to a second network managed by a different entity. The method further involves partitioning, based on the request, the one or more network resources and connecting the one or more endpoints to the first network using the one or more network resources. The one or more network resources are managed by the first entity while at least one other network resource of the on-premise network device is managed by the different entity and is associated with connecting the one or more endpoints to the second network.

    REPLICATING TRAFFIC COMMUNICATED OVER SATELLITE NETWORKS

    公开(公告)号:US20250097739A1

    公开(公告)日:2025-03-20

    申请号:US18470653

    申请日:2023-09-20

    Abstract: Techniques for a proxy to replicate traffic being communicated between a client device and a destination device based on determining an outage or impairment in a LEO satellite network. The proxy may be communicating a traffic stream between a source device and a destination device using a primary WAN that includes the LEO satellite network. However, the proxy may determine that the primary WAN has experienced or will experience an outage or other impairment. In such examples, the proxy may then replicate the traffic stream and send the replicated traffic stream over a backup communication link. The backup communication link may a different path through the primary WAN, and/or may be a communication path through a secondary WAN. Once the outage or impairment has cleared, the proxy may stop replicating the traffic and again use the primary WAN to communicate traffic.

    Collaboration application integration for user-identity verification

    公开(公告)号:US12218931B2

    公开(公告)日:2025-02-04

    申请号:US17168301

    申请日:2021-02-05

    Abstract: Disclosed are methods, systems, and non-transitory computer-readable media for utilizes a collaboration application to provide data beneficial to the authentication of the user. The present application discloses receiving at least one item of personal identifying information for a user from a primary multi-factor authentication device. The present application further discloses receiving at least one item of personal identifying information for a user from a conferencing service in which the user is engaged in a conference. The present application also discloses determining whether to authenticate the user based on the items of personal identifying information from the primary multi-factor authentication device and from the conferencing service.

    PERFORMANCE TRACING FOR MOBILE NETWORK ENVIRONMENTS

    公开(公告)号:US20240396829A1

    公开(公告)日:2024-11-28

    申请号:US18323134

    申请日:2023-05-24

    Abstract: Provided herein are techniques to facilitate multi-level performance tracing for a mobile network environment. In one instance, a method may include obtaining, by a mobile network, a trigger from an enterprise to initiate an underlay-level trace for a wireless device of the enterprise, wherein the trigger includes a correlation identifier that correlates the underlay-level trace with an enterprise-level trace for the wireless device and providing the underlay-level trace for a session of the wireless device by including a first trace flag for IP packets for the session and including a second trace flag for encapsulations of the IP packets for the session in which the first and second trace flag are unique to the session of the wireless device and enable elements of the mobile network to provide underlay trace information for the underlay-level trace for the session of the wireless device to a trace.

    PREVIEWED REACTIONS FOR DISRUPTIVE NETWORK ACTIVITY

    公开(公告)号:US20240171451A1

    公开(公告)日:2024-05-23

    申请号:US17989830

    申请日:2022-11-18

    CPC classification number: H04L41/0645 H04L41/16 H04L43/02

    Abstract: In one embodiment, a method herein may comprise: determining, by a process, a disruptive activity within a particular computer network of a plurality of computer networks; determining, by the process, telemetry data for the particular computer network, the telemetry data being time-relevant to the disruptive activity; determining, by the process, a set of expected reactions that the particular computer network is expected to experience due to the disruptive activity in correlation to the telemetry data for the particular computer network; and sharing, from the process, the set of expected reactions with a management device of the particular computer network to cause the management device to distinguish between the set of expected reactions and any unexpected events during the disruptive activity.

    NAME RESOLUTION TRIGGERED MONITORING AGENT SELECTION

    公开(公告)号:US20240073177A1

    公开(公告)日:2024-02-29

    申请号:US17897745

    申请日:2022-08-29

    CPC classification number: H04L61/4511 H04L61/2514 H04L61/3015 H04L67/1036

    Abstract: Methods are provided to perform a name resolution triggered monitoring agent selection for full stack observability. The methods involve obtaining a name resolution request for an enterprise service to be accessed by an endpoint device. A plurality of service instances are configured to provide the enterprise service. The methods further involve determining, based on the name resolution request, a monitoring agent from a plurality of monitoring agents of a monitoring service that monitors performance of the enterprise service and selecting a service instance, from the plurality of service instances, that is associated with the monitoring agent in a name resolution record. The methods further involve providing, to the endpoint device, location information for accessing the service instance and provisioning the monitoring agent to monitor the performance of the enterprise service executed by the service instance for the endpoint device.

Patent Agency Ranking