US20160006696A1 - Network function virtualization (nfv) - Google Patents
Network function virtualization (nfv) Download PDFInfo
- Publication number
- US20160006696A1 US20160006696A1 US14/788,684 US201514788684A US2016006696A1 US 20160006696 A1 US20160006696 A1 US 20160006696A1 US 201514788684 A US201514788684 A US 201514788684A US 2016006696 A1 US2016006696 A1 US 2016006696A1
- Authority
- US
- United States
- Prior art keywords
- nfv
- virtualization
- packets
- nfvs
- readable medium
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000013461 design Methods 0.000 claims abstract description 34
- 238000012545 processing Methods 0.000 claims abstract description 6
- 238000000034 method Methods 0.000 claims description 28
- 230000008569 process Effects 0.000 claims description 19
- 230000005540 biological transmission Effects 0.000 claims description 18
- 238000007689 inspection Methods 0.000 claims description 6
- 238000013519 translation Methods 0.000 claims description 3
- 238000011144 upstream manufacturing Methods 0.000 description 17
- 230000006870 function Effects 0.000 description 12
- 230000011664 signaling Effects 0.000 description 7
- 230000009286 beneficial effect Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 6
- 238000012938 design process Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 230000006855 networking Effects 0.000 description 3
- 238000013316 zoning Methods 0.000 description 3
- 239000008186 active pharmaceutical agent Substances 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000004069 differentiation Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 238000007639 printing Methods 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- ABEXEQSGABRUHS-UHFFFAOYSA-N 16-methylheptadecyl 16-methylheptadecanoate Chemical compound CC(C)CCCCCCCCCCCCCCCOC(=O)CCCCCCCCCCCCCCC(C)C ABEXEQSGABRUHS-UHFFFAOYSA-N 0.000 description 1
- 241000764238 Isis Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000005417 image-selected in vivo spectroscopy Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012739 integrated shape imaging system Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/40—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5054—Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5058—Service discovery by the service manager
-
- H04L61/2015—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/58—Association of routers
- H04L45/586—Association of routers of virtual routers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/60—Router architectures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
- H04L61/5014—Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
Definitions
- the present invention relates to facilitating network function virtualization (NFV), such as but not necessary limited to facilitating NFV on packets, frames and/or signaling associated with a home network or other network where configuration of routers or other devices may be difficulty for an associated subscriber/customer.
- NFV network function virtualization
- SDN Software Defined Networking
- NFV Network function Virtualization
- SDN describes an open architecture comprising a set of APIs, and control protocols such as Open Flow that allow for dynamic, distributed provisioning and automation.
- NFV decouples network functions such as firewalls, deep packet inspection, caching, etc., from proprietary hardware so that they can be run in software on generic (e.g., x86) servers. While SDN and NFV can be implemented independently, one non-limiting aspect of the present invention contemplates the benefits multiplying when the technologies are combined
- Home networks are evolving. Most subscribers today connect to the Internet using a home router or ISP supplied Modem/Router combination. Subscribers are connecting additional routers to their networks to extend the reach of their WiFi, or to add services such as home automation and security, IP video, and sensor networks (e.g., Internet of Things). Home routers, however, typically do not run a routing protocol, and networking these routers was challenging, and usually resulted in multiple layers of IPv4 Network Address Translation (NAT). As customers are interconnecting devices within the home for video streaming or remote printing from tablets, these multiple layers of NAT are problematic and severely hamper these in-home services.
- NAT IPv4 Network Address Translation
- HIPNetTM was developed as a new architecture for leveraging IPv6 provisioning to automatically configure home routers into a routable network without requiring NAT on interior routers.
- HIPNet functionality is becoming available on cable eRouters, and represents a significant improvement over previous technology.
- Service Discovery across routers e.g., to allow Smart TVs to locate DLNA media servers
- MSOs do not have an easy way to manage this proliferation of home routers on behalf of their subscribers.
- FIG. 1 illustrates a network function virtualization (NFV) system in accordance with one non-limiting aspect of the present invention.
- NFV network function virtualization
- FIG. 2 illustrates operation a virtual platform in accordance with one non-limiting aspect of the present invention.
- FIG. 3 illustrates zoning of a home network in accordance with one non-limiting aspect of the present invention.
- FIG. 4 illustrates a messaging diagram for a method of facilitating NFV in accordance with one non-limiting aspect of the present invention.
- FIG. 5 illustrates an NFV portal in accordance with one non-limiting aspect of the present invention.
- FIG. 6 illustrates a messaging diagram for a method of facilitating NFV in accordance with one non-limiting aspect of the present invention.
- FIG. 1 illustrates a network function virtualization (NFV) system 10 in accordance with one non-limiting aspect of the present invention.
- the system 10 illustrates one exemplary configuration where a virtual platform 12 associated with an outside network 14 facilitates communications with an edge router 18 of a home or inside network 20 , such as in the manner described in U.S. patent application Ser. Nos. 13/792,016, 14/250,444 and 14/668,389, the disclosures of which are hereby incorporated by reference in their entireties herein.
- the system 10 demonstrate one exemplary, non-limiting use of the present invention where a multiple system operator (MSO), Internet service provider (ISP), cellular service provider or other type of service provider facilitates Internet-based messaging or other network-based messaging/signaling between one or more servers 22 , etc. connected to the Internet or network external to the home network 20 .
- the home network 20 may include a plurality of interconnected, internal routers (IRs) and devices.
- IRs internal routers
- the signaling associated with facilitating messaging or other exchanges between the servers 22 and the devices may be wireless and/or wired signaling and occurring according to any suitable protocol or standard.
- the MSO may be responsible for facilitating NFV for any number of inside networks or other downstream connected networks.
- the virtual platform 12 or other feature of the MSO may be responsible for providing other services to the home network 20 and devices associated therewith, such as provisioning related services where DHCP or other functions are performed to assign prefixes or other addressing information to the home network prior to facilitating the contemplated NFV.
- the home network 20 may be arranged in a hierarchical order with the edge router 18 , which may be periodically referred to herein as a customer edge router (CER) or edge router (ER), connected to the MSO network with a plurality of routers connected downstream thereof in a multi-layered arranged, the routers below the edge router may be periodically referred to herein as internal routers (IRs).
- the ER, IRs and/or devices may be configured to receive multiple prefixes, such as in the manner described in U.S. patent application Ser. No. 13/754,954, Reverse Prefix Delegation, the disclosure of which is hereby incorporated by reference in its entirety.
- a five layer architecture is shown to correspond with a first layer having the ER, a second layer having one or more IRs connected directly to the ER, a third layer having one or more IRs and/or devices connected to one of the second layer IRs, a fourth layer having one or more IRs and/or devices connected to one of the third layer IRs, and a fifth layer having one or more devices connected to one of the fourth layer IRs.
- the IRs and/or devices are shown to be connected to a single upstream ER or IRs as such devices may be configured to listen to no more than one delegating router/device on a network link (solid lines) in order to comply with DHCP requirements.
- each component is shown for exemplary non-limiting purposes as the present invention fully contemplates the inside network having any number of configurations and interconnections between the ER, IRs and/or devices.
- One non-limiting aspect of the present invention contemplates the ER and/or the IRs being HlPnet routers or other consumer-level routers having off-the-shelf, default, pre-configured and/or consumer-level configurations whereby operations may be automatically performed or implemented without user/manual manipulation and programming, such as that described in The Internet Engineering Task Force (IETF) Internet draft entitled A Near Term Solution for Home IP Networking (HIPnet) draft-groundemann-hipnet-00 (updated draft 01 draft-hillemann-homenet-hipnet-01) and U.S.
- IETF Internet Engineering Task Force
- the multi-router network 20 may also include non-HlPnet routers or routers otherwise lacking capabilities for performing the out-of-the-box functionality associated with the HlPnet routers.
- FIG. 2 schematically illustrates operation of the virtual platform 12 being configured to address various home network complexities using NFV in accordance with one non-limiting aspect of the present invention.
- the virtual platform 12 may be considered as a cloud device or other construct operating independently of the home network 20 and devices connected thereto, i.e., the functions and operations performed by the virtual platform 12 may be independent of the functions and operations being performed at the ER or IRs of the home network 20 .
- the operation of the virtual platform 12 is shown for exemplary non-limiting purposes with respect to processing of packets, such as IP packets, for exemplary non-limiting purposes as the present invention fully contemplates processing any other type of message or signal, e.g. Ethernet frames.
- the virtual platform 12 may be configured with an input/output (I/O) 26 , 28 operable to receive messages from one or more of the servers 22 and/or one or more of the inside networks 20 .
- the packets shown to be entering the virtual platform 12 may be characterized as traveling in an upstream direction when originating from the home network 20 and may be characterized as traveling in a downstream direction when originating from one of the servers 22 .
- the virtual platform 12 may include capabilities sufficient to facilitate simultaneously processing multiple packets and/or multiple packet streams in both of the upstream and downstream directions.
- a first stream 30 which may be characterized as traveling in a downstream direction, may be subjected to a first NFV (NFV # 1 ), a third NFV (NFV # 3 ) and a fourth NFV (NFV # 4 ) before being subsequently transmitted to the home network 20 .
- NFV # 1 first NFV
- NFV # 3 third NFV
- NFV # 4 fourth NFV
- a second stream 32 which may also be characterized as traveling in a downstream direction, may be subjected to a second NFV (NFV # 2 ), the third NFV (NFV # 3 ) and a fifth NFV (NFV # 5 ) before being subsequently transmitted to the home network 20 .
- a third stream 34 which may be characterized as traveling in an upstream direction, may be subjected to the first NFV (NFV # 1 ) and an nth NFV (NFV nth) before being subsequently transmitted to one of the servers 22 .
- the noted streams 30 , 32 , 34 are exemplary and illustrative of the virtual platform 12 being capable of simultaneously performing NFV on any number of packets in any direction, e.g., the first NFV is shown to be simultaneously applied to upstream and downstream packets and the third NFV is shown to be simultaneously applied to different downstream packets.
- the virtual platform may include a memory (not shown) having a plurality of non-transitory computer-readable instructions operable with a processor (not shown) to facilitate the operations contemplated herein.
- the virtual platform 12 or capabilities associated therewith may provide a solution to the growing complexity of subscriber home networks by virtualizing management of the home network for management by the MSO (or the subscriber via a self-service portal).
- the offsite management may enable users to move beyond the device-centric architecture and consider a virtualized service-centric architecture, which offers MSOs the ability to better manage subscriber networks and to understand how customers are using them, and offers subscribers a way to tailor the network to optimize their specific use cases such as gaming or video streaming.
- FIG. 3 illustrates a zoning 40 of the home network in accordance with one non-limiting aspect of the present invention.
- the present invention can have the best of both worlds through such zoning.
- the home network 20 can be separated into different logical policy domains, such as for Internet access, guest access, VPNs, or in-home video sharing.
- Each zone 42 , 44 , 46 , 48 , 50 can be assigned its own firewall, connectivity policies, etc. via the NFVs associated with the virtual platform 12 .
- each zone 42 , 44 , 46 , 48 , 50 may be distributed throughout the house using encapsulation techniques such as VXLAN, VLAN, IPv6 flow labels, etc.
- devices/hosts may be assigned to one or more zones 42 , 44 , 46 , 48 , 50 , and devices can receive multiple IPv6 addresses such that they may receive unique addresses for each zone or other methods of membership in a zone such belonging to the same VLAN or using another identifier indicating zone membership.
- the devices can be assigned to the Internet or Guest zone (for a Guest WiFi network) but could be assigned to different zones, as well.
- HIPNet included in eRouter devices, provides this level of connectivity using DHCPv6 prefix delegation to provision routers in a tree topology and establish routes to all the devices. It may be optimized for Internet connectivity, and also supports host-to-host communication. Once network connectivity is established, the home routers can contact the MSO virtual platform for optimized forwarding instructions using protocols such as Open Flow or TR-069.
- the MSO virtual platform can collect topology information from the home network devices, e.g., the home routers can collect this topology information using Link Layer Discovery Protocol (LLDP) and communicate it to the MSO controller using Open Flow or similar protocols.
- the MSO controller can then use the Dijkstra algorithm (also used in routing protocols such as OSPF and ISIS) to compute optimal forwarding paths and communicate them back to the subscriber's routers.
- Subscriber routers can also collect and report attached host MAC and IP addresses to help troubleshoot issues that may arise in the home and to further optimize traffic forwarding.
- this architecture would allow the network to use a backup connectivity mechanism such as WiFi. If that is not available, the home network will continue to operate, albeit with more basic HIPNet functionality.
- the MSO controller provides optimizations when the service is connected, but the home has local survivability.
- control plane or its routers, servers, switches, etc.
- the virtual platform 12 can be associated with the home network 20 and/or devices to perform a number of NFVs on behalf of the customer.
- These features may be generically divided into two types: control plane and data plane.
- the control plane features may look at packet headers and enforce policy on a network, while data plane features may be inserted in the traffic forwarding path and affect the payload of the traffic. While not an exhaustive list, control plane features may include:
- the data plane features may include:
- MSOs can host all of these services in their data centers and offer them to subscribers as cloud services.
- customers are interested in some control plane features that are not widely available today, either because they have not been possible, or because they have been difficult to implement with existing devices, but that could be delivered according to the present invention. These may include:
- the virtual network of the present invention allows MSOs to offer new network services such as Bandwidth on Demand or enhanced service levels for high-value content such as video streaming or gaming.
- the home network 20 described above offers benefits for both MSOs and subscribers.
- MSOs benefit from reduced expenses, faster time-to-market with new services, and optimized use of deployed reserves.
- Subscribers benefit from mass-customized services and service-centric policies (as opposed to device-centric policies today).
- MSOs stand to benefit from reduced expenses, as this virtualized network architecture allows for self-service provisioning via a web portal, simplified upgrades managed by DevOps tools such as Puppet and Chef, and simplified inventory management and certification testing, as the functionality is delivered in software, rather than via specific devices.
- network virtualization offers a mass-customized Internet service. Just as we have seen with cellphone app stores, subscribers value different aspects of a service. Under this approach, they can drag and drop those features that are important to them. For example, an avid gamer might select optimized gaming service, while parents might opt for strict parental controls. As services can be tailored to individual subscriber needs, this approach offers an enhanced quality of experience over today's networks. In addition, network policies are tied to the user, and not the device. This allows subscribers to have the same Internet experience at home or on the road through Cable WiFi. The contemplated network virtualization allows MSOs to offer subscribers a new network architecture that is mass-personalized, automated, and tailored to individual needs.
- This architecture includes service-(or policy-) specific overlay zones that can be extended into the MSO data center to allow delivery of MSO-managed network features. From the data center, MSO SDN controllers can push policy to individual network devices, optimizing network forwarding paths and enforcing firewall policies. These changes offer improved economics to MSOs and an improved quality of experience to subscribers.
- FIG. 4 illustrates a messaging diagram for a method of facilitating NFV in accordance with one non-limiting aspect of the present invention.
- the various operations associated with and/or other process necessarily to the method may be embodied in a computer-readable medium having a plurality of non-transitory transitory instructions operable with a processor or other logically functioning element of the devices attendant thereto.
- the NFVs are described for exemplary non-limiting purposes with respect to various virtualization performed at the virtual platform 12 in order to manipulate packets, messaging or other signaling transmitted from/to a network 20 having a plurality of devices, such as in the above-described manner where an MSO or other provider executes the NFV for on the behalf of an edge router 18 , gateway or other interface to the home network 20 connected to the devices.
- the NFVs may generally correspond with the virtual platform 12 adapting, manipulating or otherwise alternating received packets or the like for subsequent transmission with added, removed, replaced or other changes to data, addresses, content, markers, etc.
- the packets when received include in the packets when received (varies depending on the one or more NFVs and/or the ordering in which the NFVs are performed) and/or selecting routing, tunnels, priority and optimizations for communication of the packets (the packets may be considered as modified when route, etc. according to one of the NFV even when there is no alteration of the packet contents (e.g. payload and/or headers).
- a service discovery process(s) 60 , 62 may include the virtual platform 12 identifying the devices associated with the home network 20 (services, etc. could similarly be discovered and are referred to a devices for exemplary purposes).
- the discovered device(s) may be determined as a function of corresponding messages exchanged between the virtual platform 12 and devices or edge router 18 , messages reported from the edger router 18 following its discovery of the devices and/or through other suitable mechanisms, such as those described in the above-referenced patent applications and/or U.S. patent application Ser. Nos. 14/334,027, 62/105,142 and 62/092,449, the disclosures of which are hereby incorporated by reference in their entireties herein.
- the discovered devices may be associated with a device ID or other identification, such as by MAC or IP address or subscriber input of an identifying name (e.g., Michael's tablet).
- the capabilities, services, entitlements and other information regarding capabilities of the device, purchased subscriptions, authorizations and the like may be collected to facilitate identifying the devices and/or the NFV amenable to it (e.g., some NFVs may be application to some devices and not others).
- the service discovery 60 , 62 may be performed in the background or automatically in a manner transparent to the subscriber so as to ameliorate complexity and user interaction.
- the routers, etc. connected directly to or in the paths of the devices may also be discovered or otherwise identified, particularly if the manipulation thereof is necessary to implement one or more of the desired NFVs.
- An NFV design process 64 may be performed in order to select the NFVs relevant to each of the discovered devices or data flows from multiple devices with common needs.
- the NFV design process 64 may be performed on a per device basis and/or according to other differentiations, e.g., a device may have multiple IP addresses such that NFVs may be selected for each IP address or a device may support multiple services/service flows such that NFVs may be selected for each.
- FIG. 5 illustrates an NFV portal 68 in accordance with one non-limiting aspect of the present invention.
- the NFV portal 68 may be a webpage or other interface hosted by the MSO and operable with the virtual platform 12 to facilitate identifying the discovered devices and designing the NFVs operable for association therewith.
- Access to the NFV portal 68 may be restricted to authenticated or registered users, such as by requiring a username and password combination, token or other construct to be provided in order to associate particular NFVs with the devices.
- the restricted access may be beneficial in limiting children or other unauthorized users from manipulating operations of the home network or thwarting desired NFV implemented restrictions, e.g., parental controls, firewalls, etc.
- the NFV portal 68 may include a listing of discovered devices 70 , a set of defined users or other groupings such as a group of applications, or other future groupings, and a listing of available NFVs 72 .
- the NFVs may be associated with each device 68 (or other identifiers for signaling amendable to the completed NFV, such as service flows, grouping, applications, etc.) in a drag-and-drop manner whereby a user may click on the desired NFV and drag it to a menu 74 , 76 , 78 of the desired device.
- the user may identify the appropriate device according to the device ID and/or the user may be enabled to manually manipulate the device ID to a more descriptive representation, e.g., it may be beneficial to list the device ID manually as “Michael's tablet” instead of listing the Mac/IP address associated therewith.
- multiple sections may be included for certain device menus 74 , 76 , 78 if the corresponding device supports multiple services/service flows or otherwise is amenable to applying NFVs to differentiable packets depending on their associated use/address.
- the corresponding NFVs may be removed from the listing or otherwise prevented from being dragged to the corresponding device, e.g., the user may be required to click on the device menu 74 , 76 , 78 before dragging one of the NFVs thereto such that any unavailable NFVs may be removed or deemphasized within the NFV listing.
- the NFV portal 68 may include additional customizations or other variables to further define selection of that NFVs desired for each device. This may include altering the device menus 74 , 76 , 78 to include additional sections (not shown) to differentiate between upstream and downstream communications, e.g., NFVs may be applied to the upstream communications but not similarly desired for downstream communications (the user may agree to packet inspection or upstream traveling messages but not for downstream traveling messages). Further customizations may include generating different profiles for a device according to a user thereof, a time of day or other identifying feature, e.g., parental controls may be selectively engaged depending on whether an adult or child is using device and/or whether an adult or child is within the home.
- a time of day or other identifying feature e.g., parental controls may be selectively engaged depending on whether an adult or child is using device and/or whether an adult or child is within the home.
- the devices within the home may collect and perform analytics on various events, data or information associated with the operation thereof such that this information may be utilized to facilitate selecting when to implement certain profiles and/or the parameters used to automatically differentiate which NFV design are to be implemented for a particular device (e.g., different profiles for different analytics).
- the NFV portal 68 may facilitate selection and association of the NFVs with the device menus 74 , 76 , 78 through the drag-and-drop process or other processes sufficient to enable the customizations contemplated herein without overburdening the home network administrator/subscriber.
- the NFV portal 68 may include a description or link to additional information for the operations performed by each of the NFVs to help the home network administrate differentiate the NFVs.
- the NFV portal 68 may include suggested or recommended NFVs for one or more of the devices within a predefined selection menu or listing (not shown), such as to enable the user to drag-and-dropped one of the predefined recommendations to the device listing 70 whereby the related NFV(s) would be automatically associated with the corresponding device without the user having to select each NFV.
- predefined, recommendations may be particularly beneficial for home network administrators lacking technical understanding regarding the nature operations performed by the corresponding NFV.
- the NFV(s) associated with particular devices may be easily removed by dragging and dropping or deleting the corresponding NFV from the appropriate device listing 68 .
- the ability to remove, add or otherwise alter the NFV designed for a particular device may be beneficial in allowing the home network operator to re-program or to otherwise perform sophisticated operations necessary to implementing the desired changes with a simple drag-and-drop, i.e., the user, particularly one unaware of certain firewall restrictions, may select a particular firewall NFV and thereafter determine it to be unsuitability to its purposes whereby it can be easily changed through the NFV portal in a single operation.
- the NFV portal 68 may list historical NFV designs or other prior configurations in a menu (not shown) to further ease burdens on the home network administrator, e.g., a default listing may be selected to return the home network 18 to a default configuration or the user may set a vacation profile when traveling and a normal profile when home.
- the NFV design process 64 may include associating a chain of events for the NFVs associated with a particular device listing 74 , 76 , 78 .
- the chain of events may specify an order or sequence in which each NFV is to be performed.
- FIG. 2 illustrates the NFVs being performed sequentially where a first NFV occurs before a second NFV, however, the NFVs may be implemented in any order to achieve certain/different results.
- the NFV portal 68 may facilitate the ordering or chaining of the NFVs according to relative positioning within the device listing 74 , 76 , 78 , e.g., the NFV at an upper end of device listing 74 , 76 , 78 may occur first with each successive NFV listed thereunder occurring in the corresponding order.
- the network administrator may rearrange or otherwise adapt the order of the NFVs to suit desired purposes.
- the virtual platform may also be configured to override user selection or to otherwise rearrange the order, or in some cases add necessary NFVs omitted by the home network administration, depending on the NFV and/or whether particular NFVs may be required in order to enable subsequent NFVs, which may be beneficial in ameliorating the burden on the network administrator to be aware of NFV ordering requirements.
- the virtual platform 12 may be configured to facilitate implementing the corresponding NFVs.
- the virtual platform 12 may assess whether to apply certain NFV designs to certain packets depending on information included therein or associated therewith, such as MAC destination/source addresses, IP destination/source addresses, service flow identifiers, VXLAN identifiers, VLAN identifiers, IPv6 flow identifiers, or other information suitable to determining the NFV design appropriate for the corresponding packets, such as an NFV identifier unique to particular NFV chains/designs (multiple devices may be associated with the same NFV identifier if the same NFVs are to be used in the same order).
- the virtual platform 12 may determine the appropriate NFVs through inspection of the transmitted packets, such as by inspecting the corresponding headers and/or payloads or through other mechanisms, such as a packet or other identifier associated with a particular packet stream or added thereto (NFV identifier) independently of the packets so as to ameliorate any privacy concerns with inspecting packet information.
- NFV identifier a packet or other identifier associated with a particular packet stream or added thereto
- One contemplated process for upstream transmissions may include a device instigating a transmission 90 of upstream packets to the edge router, whereupon the edge router may instigate a subsequent transmission 92 to the virtual platform 12 or to another device in the home network 20 .
- the edge router 18 may determine the appropriate NFV design and/or perform the NFVs according to instructions provided by the virtual platform 12 in the event the packets are not to be forwarded thereto.
- the virtual platform 12 may perform an NFV identification process 94 when the packets are forwarded thereto in order to determine the desired NFV design.
- the NFV identification process 94 may be performed prior to or upon receipt of the packets as emitted from the device, such as by the device including an NFV identifier or the virtual platform 12 determining the desired NFV design from information normally included within the packet, i.e., without requiring the device to provide the NFV identifier or to provide any information intended to identify the desired NFV design.
- An NFV process 96 may then be performed to implement the virtualizations of the desired NFVs according to the identified NFV design prior to a subsequent transmission 98 of the NFV modified packets.
- Another contemplated process for upstream transmissions may include the device instigating a transmission 102 of upstream packet to the edge router 18 whereupon the edger router 18 performs an identification process 104 to determine the desired NFV design.
- the use of the edge router to perform the identification may be beneficial in allowing the edge router 18 to add the NFV identifier to a subsequent transmission 106 of the packets, optionally without otherwise manipulating the packets, so as to remove the identification responsibilities form the virtual platform 12 and/or to prevent the virtual platform 12 from having to inspect packets or their contents.
- the virtual platform 12 may thereafter perform a NFV process 108 according to the identified NFV design prior to a subsequent transmission 110 of the modified packets.
- the NFVs or virtualization may include control plane NFV features that look at packet headers and enforce policy on a network, e.g. where packets are routed or stopped (firewall), QoS, bandwidth, etc., and/or data plane NFV features that may be inserted in the traffic forwarding path and affect the payload of the traffic, e.g., changing IPv4/I Pv6 addresses to IPv6/I Pv4 addresses.
- One contemplated process for downstream transmissions may include the server 22 instigating a transmission 114 of downstream packets to the virtual platform 12 whereupon the virtual platform 12 performs an NFV identification process 116 to determine whether an NFV design is associated therewith.
- the originator of the transmission (the server) may include an NFV identifier with the transmission 114 and/or the virtual platform 12 may determine the desired NFV design as a function of other information included within the packets, i.e., without requiring the originator to identify the NFV design.
- the virtual platform 12 may thereafter perform a NFV process 118 according to the identified NFV design prior to a subsequent transmission 120 , 122 of the modified packets.
- the downstream packets may be similarly modified according to control plane NFV features where routing or other network policies may be enforced and/or according to data plane NFV features where payloads or other information included within the downstream packets are modified, inspected, confirmed etc.
- FIG. 6 illustrates a messaging diagram for a method of facilitating NFV in accordance with one non-limiting aspect of the present invention.
- the present invention contemplates the NFV being executed on the home gateway itself, as described above, and/or on the virtual platform 12 can exist at the ISP cloud, on the home gateway, or a combination of both.
- FIG. 6 illustrates a service discovery process 130 , 130 to facilitating and NFV design process 134 in a manner similar to that described above whereafter the virtual platform 12 provides NFV instructions 136 to the edge router 18 .
- the edge router 18 can not only identify packets or data streams or devices/users/applications, but also effect the NFV before that traffic is sent to the ISP.
- the NFV instructions 136 may be sufficient to enable the edge router 18 to perform the desired NFV locally instead of at the virtual platform 12 and without requiring the home network administrator to program the edge router 18 .
- the edge router 18 may perform an NFV process 140 according to the NFV design 134 and thereafter transmit 142 the modified packets to the server 22 without requiring further NFV modifications.
- the edge router 18 may perform a partial NFV process 148 whereby the edge router 18 performs some of the NFV specified in the NFV design 134 .
- the edge router 18 may then transmit 150 partial NFV packets to the virtual platform 12 whereupon the virtual platform 12 performs a partial NFV process 152 to complete the remaining NFVs prior to a subsequent upstream transport 154 of the fully modified NFV packets. While not shown, similar processing may be perform for downstream packets whereby the edge router 18 may perform all or a portion of the NFVs designed for downstream packets according to instructions received from the virtual platform 12 .
- one non-limiting aspect of the present invention contemplates facilitating NFV when a subscriber logons to an MSO portal (website) that reflects that particular subscriber's home environment; devices, users and MSO services/policies that can be applied to those devices and/or users.
- the devices can be automatically discovered using mechanisms such as LLDP, mDNS, UPnP, DHCP-fingerprinting or other such known methods.
- the subscriber or a user at the subscriber's premise
- Zones may be created by associating one or more devices to a service or policy by some action such as dragging a policy to a device.
- a device and/or a user and/or an application can be paired to a service or policy to create a zone. Most traffic will egress past the home gateway, to the MSO network and onto a site or service in the Internet. The users, applications and devices within a zone can now have a unique marking applied to the traffic to indicate to the MSO, the services that are required. That marking can be a predefined map that indicates one or more VNFs (Virtual Network Function) in the MSO cloud that are chained together so as to enable an Orchestrator at the MSO to arrange the subscriber's data flow.
- VNFs Virtual Network Function
- the markings for the NFV selection mapping could be accomplished in several ways; a VLAN tag could be added to the Ethernet frame before that frame is encapsulated inside a VXLAN tunnel that connects the Home Gateway to the MSO cloud, such as. Since the VXLAN tunnel has unique tunnel endpoints (IP Addresses defined by the MSO), and since the VLAN information is preserved along the path to the MSO cloud, the MSO knows which subscriber the data flow comes from and the VLAN information indicates which service or services should be applied to that data flow. Hence, every subscriber could theoretically over 16 million subscribers in a single domain. Once the subscriber's traffic arrives to the MSO tunnel terminator, a B/OSS systems identifies the subscriber and authorize the service(s) needed for that data flow.
- IP Addresses IP Addresses defined by the MSO
- the Orchestrator part of the Virtual platform, detects which VNFs are needed and available and with the SDN controller, directs the traffic through the VNFs.
- Those VNFs might be located in the MSO's data center which has massive capacity of servers that can dynamically have Virtual Machines ‘spun up’ as needed and VNFs created on those virtual machines to elastically cover the rise and fall of demand throughout the hours and days.
- the mapping could also use multiple VXLAN tunnels, one tunnel for each ‘service’. Again, since each of these tunnels have a unique identifier, the overall tunnel identifies the subscriber and the individual service tunnels inside the overall tunnel indicate the VNFs (services or policies) to be applied.
- devices and/or users can be dragged to services/policies on the portal instead of devices/users dragged to the service/policy. Either way, a zone may be created. These zones may be predetermined (with their tagged values) by the MSO before they are made available to the MSO portal. If a subscriber logs onto the portal, using unique credentials that identify permission to make changes, user and devices can be placed into zones.
- the subscriber may place the children's PC and two tablets into the Parental Control service.
- the MAC addresses (discovered by the service discovery mechanisms or manually entered) are associated with the device.
- the user could be authenticated by logging into the portal to establish an authorized data flow from a particular device. This could prevent a child from using a parents tablet and bypassing Parental Control features on the child's tablet.
- HIPnet provides IPv6 support in the home, and service discovery and CER-ID.
- VXLAN tunnels provide rich layer-2 information, such as MAC addresses to the MSO.
- the present invention contemplates providing a portal that allows semi-custom features to be applied by the subscriber, dynamically, and utilize high horsepower servers to support hardware accelerators for example for services such as DPI (Deep Packet Inspection). This idea creates zones and maps data flows into zones, which is key to applying services. Analytics can then reveal traffic patterns and can be used to create new services targeted to a group of subscribers that has a high likelihood of success and monetization.
- the present invention contemplates pushing policies to the home gateway as an alternate idea of hosting all services in the MSO cloud.
- NFV home wireless remotely
- SDN home wireless remotely
- NFV provides the ‘what’ (virtualization architecture)
- SDN provides the ‘how’ (APIs and control protocols) to enable service providers to embrace network virtualization.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- This application claims the benefit of U.S. provisional Application No. 62/019,473 filed Jul. 1, 2014, the disclosure of which is incorporated in its entirety by reference herein.
- The present invention relates to facilitating network function virtualization (NFV), such as but not necessary limited to facilitating NFV on packets, frames and/or signaling associated with a home network or other network where configuration of routers or other devices may be difficulty for an associated subscriber/customer.
- Home networks are growing more sophisticated; customers are not. As home networks become more complicated, many customers are looking to MSOs to support these more complicated networks, and MSOs need tools to support them. Network virtualization using technologies such as Software Defined Networking (SDN) and Network function Virtualization (NFV) provides such a set of tools. Generally speaking, SDN describes an open architecture comprising a set of APIs, and control protocols such as Open Flow that allow for dynamic, distributed provisioning and automation. NFV decouples network functions such as firewalls, deep packet inspection, caching, etc., from proprietary hardware so that they can be run in software on generic (e.g., x86) servers. While SDN and NFV can be implemented independently, one non-limiting aspect of the present invention contemplates the benefits multiplying when the technologies are combined
- Home networks are evolving. Most subscribers today connect to the Internet using a home router or ISP supplied Modem/Router combination. Subscribers are connecting additional routers to their networks to extend the reach of their WiFi, or to add services such as home automation and security, IP video, and sensor networks (e.g., Internet of Things). Home routers, however, typically do not run a routing protocol, and networking these routers was challenging, and usually resulted in multiple layers of IPv4 Network Address Translation (NAT). As customers are interconnecting devices within the home for video streaming or remote printing from tablets, these multiple layers of NAT are problematic and severely hamper these in-home services.
- To address these problems, HIPNet™ was developed as a new architecture for leveraging IPv6 provisioning to automatically configure home routers into a routable network without requiring NAT on interior routers. HIPNet functionality is becoming available on cable eRouters, and represents a significant improvement over previous technology. However, some challenges still remain. Service Discovery across routers (e.g., to allow Smart TVs to locate DLNA media servers) is challenging, and MSOs do not have an easy way to manage this proliferation of home routers on behalf of their subscribers. In addition, it is difficult to add new home network services, as they rely on the capabilities of the routers already deployed, and may require a new device to support new features.
-
FIG. 1 illustrates a network function virtualization (NFV) system in accordance with one non-limiting aspect of the present invention. -
FIG. 2 illustrates operation a virtual platform in accordance with one non-limiting aspect of the present invention. -
FIG. 3 illustrates zoning of a home network in accordance with one non-limiting aspect of the present invention. -
FIG. 4 illustrates a messaging diagram for a method of facilitating NFV in accordance with one non-limiting aspect of the present invention. -
FIG. 5 illustrates an NFV portal in accordance with one non-limiting aspect of the present invention. -
FIG. 6 illustrates a messaging diagram for a method of facilitating NFV in accordance with one non-limiting aspect of the present invention. - As required, detailed embodiments of the present invention are disclosed herein; however, it is to be understood that the disclosed embodiments are merely exemplary of the invention that may be embodied in various and alternative forms. The figures are not necessarily to scale; some features may be exaggerated or minimized to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention.
-
FIG. 1 illustrates a network function virtualization (NFV)system 10 in accordance with one non-limiting aspect of the present invention. Thesystem 10 illustrates one exemplary configuration where avirtual platform 12 associated with anoutside network 14 facilitates communications with anedge router 18 of a home or insidenetwork 20, such as in the manner described in U.S. patent application Ser. Nos. 13/792,016, 14/250,444 and 14/668,389, the disclosures of which are hereby incorporated by reference in their entireties herein. Thesystem 10 demonstrate one exemplary, non-limiting use of the present invention where a multiple system operator (MSO), Internet service provider (ISP), cellular service provider or other type of service provider facilitates Internet-based messaging or other network-based messaging/signaling between one ormore servers 22, etc. connected to the Internet or network external to thehome network 20. Thehome network 20 may include a plurality of interconnected, internal routers (IRs) and devices. The signaling associated with facilitating messaging or other exchanges between theservers 22 and the devices may be wireless and/or wired signaling and occurring according to any suitable protocol or standard. - While only one inside
network 20 is illustrated, the MSO may be responsible for facilitating NFV for any number of inside networks or other downstream connected networks. In addition to facilitating NFV, thevirtual platform 12 or other feature of the MSO may be responsible for providing other services to thehome network 20 and devices associated therewith, such as provisioning related services where DHCP or other functions are performed to assign prefixes or other addressing information to the home network prior to facilitating the contemplated NFV. Thehome network 20 may be arranged in a hierarchical order with theedge router 18, which may be periodically referred to herein as a customer edge router (CER) or edge router (ER), connected to the MSO network with a plurality of routers connected downstream thereof in a multi-layered arranged, the routers below the edge router may be periodically referred to herein as internal routers (IRs). Optionally, the ER, IRs and/or devices may be configured to receive multiple prefixes, such as in the manner described in U.S. patent application Ser. No. 13/754,954, Reverse Prefix Delegation, the disclosure of which is hereby incorporated by reference in its entirety. - A five layer architecture is shown to correspond with a first layer having the ER, a second layer having one or more IRs connected directly to the ER, a third layer having one or more IRs and/or devices connected to one of the second layer IRs, a fourth layer having one or more IRs and/or devices connected to one of the third layer IRs, and a fifth layer having one or more devices connected to one of the fourth layer IRs. The IRs and/or devices are shown to be connected to a single upstream ER or IRs as such devices may be configured to listen to no more than one delegating router/device on a network link (solid lines) in order to comply with DHCP requirements. The single-connection of each component is shown for exemplary non-limiting purposes as the present invention fully contemplates the inside network having any number of configurations and interconnections between the ER, IRs and/or devices. One non-limiting aspect of the present invention contemplates the ER and/or the IRs being HlPnet routers or other consumer-level routers having off-the-shelf, default, pre-configured and/or consumer-level configurations whereby operations may be automatically performed or implemented without user/manual manipulation and programming, such as that described in The Internet Engineering Task Force (IETF) Internet draft entitled A Near Term Solution for Home IP Networking (HIPnet) draft-grundemann-hipnet-00 (updated draft 01 draft-grundemann-homenet-hipnet-01) and U.S. provisional application serial No. 61/771,807, the disclosures of which are hereby incorporated by reference in their entireties herein. The
multi-router network 20 may also include non-HlPnet routers or routers otherwise lacking capabilities for performing the out-of-the-box functionality associated with the HlPnet routers. -
FIG. 2 schematically illustrates operation of thevirtual platform 12 being configured to address various home network complexities using NFV in accordance with one non-limiting aspect of the present invention. Thevirtual platform 12 may be considered as a cloud device or other construct operating independently of thehome network 20 and devices connected thereto, i.e., the functions and operations performed by thevirtual platform 12 may be independent of the functions and operations being performed at the ER or IRs of thehome network 20. The operation of thevirtual platform 12 is shown for exemplary non-limiting purposes with respect to processing of packets, such as IP packets, for exemplary non-limiting purposes as the present invention fully contemplates processing any other type of message or signal, e.g. Ethernet frames. Thevirtual platform 12 may be configured with an input/output (I/O) 26, 28 operable to receive messages from one or more of theservers 22 and/or one or more of theinside networks 20. The packets shown to be entering thevirtual platform 12 may be characterized as traveling in an upstream direction when originating from thehome network 20 and may be characterized as traveling in a downstream direction when originating from one of theservers 22. Thevirtual platform 12 may include capabilities sufficient to facilitate simultaneously processing multiple packets and/or multiple packet streams in both of the upstream and downstream directions. - Three
signaling streams virtual platform 12 to selectively apply one or more of a plurality of network virtualizations (NFVs) to each of the streams. Afirst stream 30, which may be characterized as traveling in a downstream direction, may be subjected to a first NFV (NFV #1), a third NFV (NFV #3) and a fourth NFV (NFV #4) before being subsequently transmitted to thehome network 20. Asecond stream 32, which may also be characterized as traveling in a downstream direction, may be subjected to a second NFV (NFV #2), the third NFV (NFV #3) and a fifth NFV (NFV #5) before being subsequently transmitted to thehome network 20. Athird stream 34, which may be characterized as traveling in an upstream direction, may be subjected to the first NFV (NFV #1) and an nth NFV (NFV nth) before being subsequently transmitted to one of theservers 22. The notedstreams virtual platform 12 being capable of simultaneously performing NFV on any number of packets in any direction, e.g., the first NFV is shown to be simultaneously applied to upstream and downstream packets and the third NFV is shown to be simultaneously applied to different downstream packets. The virtual platform may include a memory (not shown) having a plurality of non-transitory computer-readable instructions operable with a processor (not shown) to facilitate the operations contemplated herein. - The
virtual platform 12 or capabilities associated therewith (the MSO may include SDN and/or any number of other devices to facilitate the contemplated NFVs) may provide a solution to the growing complexity of subscriber home networks by virtualizing management of the home network for management by the MSO (or the subscriber via a self-service portal). The offsite management may enable users to move beyond the device-centric architecture and consider a virtualized service-centric architecture, which offers MSOs the ability to better manage subscriber networks and to understand how customers are using them, and offers subscribers a way to tailor the network to optimize their specific use cases such as gaming or video streaming. Many problems experienced in a routed home network, such as service discovery, multiple firewalls, and multicast forwarding, become simpler in a layer 2 (bridged) network, however, existing devices and/or home networks typically include routers. The present invention combats these problems as well as addressing needs of emerging services, such as Smart Grid or home automation, and the needs of routed networks for security purposes or to satisfy regulatory requirements. -
FIG. 3 illustrates azoning 40 of the home network in accordance with one non-limiting aspect of the present invention. In the contemplated virtualized home network, the present invention can have the best of both worlds through such zoning. First, thehome network 20 can be separated into different logical policy domains, such as for Internet access, guest access, VPNs, or in-home video sharing. Eachzone virtual platform 12. Next, eachzone more zones - Within each
zone home network 20 first comes online, it may need a basic level of automatic configuration support plus a path to reach the MSOvirtual platform 12. HIPNet, included in eRouter devices, provides this level of connectivity using DHCPv6 prefix delegation to provision routers in a tree topology and establish routes to all the devices. It may be optimized for Internet connectivity, and also supports host-to-host communication. Once network connectivity is established, the home routers can contact the MSO virtual platform for optimized forwarding instructions using protocols such as Open Flow or TR-069. - To create optimized forwarding paths, the MSO virtual platform can collect topology information from the home network devices, e.g., the home routers can collect this topology information using Link Layer Discovery Protocol (LLDP) and communicate it to the MSO controller using Open Flow or similar protocols. The MSO controller can then use the Dijkstra algorithm (also used in routing protocols such as OSPF and ISIS) to compute optimal forwarding paths and communicate them back to the subscriber's routers. Subscriber routers can also collect and report attached host MAC and IP addresses to help troubleshoot issues that may arise in the home and to further optimize traffic forwarding. In the event of an Internet connectivity failure, this architecture would allow the network to use a backup connectivity mechanism such as WiFi. If that is not available, the home network will continue to operate, albeit with more basic HIPNet functionality. Thus, the MSO controller provides optimizations when the service is connected, but the home has local survivability.
- The
virtual platform 12, or its routers, servers, switches, etc., can be associated with thehome network 20 and/or devices to perform a number of NFVs on behalf of the customer. These features may be generically divided into two types: control plane and data plane. The control plane features may look at packet headers and enforce policy on a network, while data plane features may be inserted in the traffic forwarding path and affect the payload of the traffic. While not an exhaustive list, control plane features may include: -
- Network Address Translation (NAT), which provides differentiation between customer space and public space and which is used to manage IPv4 address scarcity during the transition to IPv6, which may include change an IPv4/IPv6 address included in a packet to and IPv6/IPv4.
- Firewall, which enforces security policy on the network, such as whether packets from/to a particular domain are permitted to pass through the virtual platform or are stop from further transmission.
- Routing and forwarding, which identifies the optimal paths to send traffic through the network.
- Virtual Private Networks (VPNs), which provide private connectivity to remote networks such as corporate offices.
- IPv6 transition technologies.
- Likewise, the data plane features may include:
-
- Dynamic Host Configuration Protocol (DHCP) and Domain Name Service (DNS), which provision devices with IP addresses and provide database lookup services to identify other hosts.
- Deep Packet Inspection, which looks into packet payloads and helps with Denial of Service and Parental Controls.
- Denial of Service protection, which looks for traffic anomalies and block unwanted traffic streams.
- Parental Controls, which block objectionable content.
- Until now, these features have generally been offered on home routers, and configured separately on each router. This has led to a sub-optimal experience for subscribers, who have looked to the teenager down the street or commercial services to configure their routers. With network virtualization techniques contemplated herein, MSOs can host all of these services in their data centers and offer them to subscribers as cloud services. In addition, customers are interested in some control plane features that are not widely available today, either because they have not been possible, or because they have been difficult to implement with existing devices, but that could be delivered according to the present invention. These may include:
-
- Bandwidth on demand, where subscribers can change bandwidth levels on the fly to accommodate large file transfers (e.g., downloading a movie before a flight).
- Priority service for video or gaming services, allowing subscribers smooth delivery of entertainment content.
- Once the virtual network of the present invention is in place, it allows MSOs to offer new network services such as Bandwidth on Demand or enhanced service levels for high-value content such as video streaming or gaming. The
home network 20 described above offers benefits for both MSOs and subscribers. MSOs benefit from reduced expenses, faster time-to-market with new services, and optimized use of deployed reserves. Subscribers benefit from mass-customized services and service-centric policies (as opposed to device-centric policies today). MSOs stand to benefit from reduced expenses, as this virtualized network architecture allows for self-service provisioning via a web portal, simplified upgrades managed by DevOps tools such as Puppet and Chef, and simplified inventory management and certification testing, as the functionality is delivered in software, rather than via specific devices. It also gives MSOs more visibility into the devices attached to the subscriber network, helping them troubleshoot and optimize the network on the subscriber's behalf. As network functions are deployed in software, this architecture offers MSOs shorter build-measure-learn development cycles that will bring new features to market faster. Finally, as virtualized network reserves can be shared across multiple subscribers, it allows MSOs to optimize the use of deployed reserves. - For subscribers, network virtualization offers a mass-customized Internet service. Just as we have seen with cellphone app stores, subscribers value different aspects of a service. Under this approach, they can drag and drop those features that are important to them. For example, an avid gamer might select optimized gaming service, while parents might opt for strict parental controls. As services can be tailored to individual subscriber needs, this approach offers an enhanced quality of experience over today's networks. In addition, network policies are tied to the user, and not the device. This allows subscribers to have the same Internet experience at home or on the road through Cable WiFi. The contemplated network virtualization allows MSOs to offer subscribers a new network architecture that is mass-personalized, automated, and tailored to individual needs. This architecture includes service-(or policy-) specific overlay zones that can be extended into the MSO data center to allow delivery of MSO-managed network features. From the data center, MSO SDN controllers can push policy to individual network devices, optimizing network forwarding paths and enforcing firewall policies. These changes offer improved economics to MSOs and an improved quality of experience to subscribers.
-
FIG. 4 illustrates a messaging diagram for a method of facilitating NFV in accordance with one non-limiting aspect of the present invention. The various operations associated with and/or other process necessarily to the method may be embodied in a computer-readable medium having a plurality of non-transitory transitory instructions operable with a processor or other logically functioning element of the devices attendant thereto. The NFVs are described for exemplary non-limiting purposes with respect to various virtualization performed at thevirtual platform 12 in order to manipulate packets, messaging or other signaling transmitted from/to anetwork 20 having a plurality of devices, such as in the above-described manner where an MSO or other provider executes the NFV for on the behalf of anedge router 18, gateway or other interface to thehome network 20 connected to the devices. As shown inFIG. 2 , the NFVs may generally correspond with thevirtual platform 12 adapting, manipulating or otherwise alternating received packets or the like for subsequent transmission with added, removed, replaced or other changes to data, addresses, content, markers, etc. include in the packets when received (varies depending on the one or more NFVs and/or the ordering in which the NFVs are performed) and/or selecting routing, tunnels, priority and optimizations for communication of the packets (the packets may be considered as modified when route, etc. according to one of the NFV even when there is no alteration of the packet contents (e.g. payload and/or headers). - A service discovery process(s) 60, 62 may include the
virtual platform 12 identifying the devices associated with the home network 20 (services, etc. could similarly be discovered and are referred to a devices for exemplary purposes). The discovered device(s) may be determined as a function of corresponding messages exchanged between thevirtual platform 12 and devices oredge router 18, messages reported from theedger router 18 following its discovery of the devices and/or through other suitable mechanisms, such as those described in the above-referenced patent applications and/or U.S. patent application Ser. Nos. 14/334,027, 62/105,142 and 62/092,449, the disclosures of which are hereby incorporated by reference in their entireties herein. The discovered devices may be associated with a device ID or other identification, such as by MAC or IP address or subscriber input of an identifying name (e.g., Michael's tablet). The capabilities, services, entitlements and other information regarding capabilities of the device, purchased subscriptions, authorizations and the like may be collected to facilitate identifying the devices and/or the NFV amenable to it (e.g., some NFVs may be application to some devices and not others). Theservice discovery - An
NFV design process 64 may be performed in order to select the NFVs relevant to each of the discovered devices or data flows from multiple devices with common needs. TheNFV design process 64 may be performed on a per device basis and/or according to other differentiations, e.g., a device may have multiple IP addresses such that NFVs may be selected for each IP address or a device may support multiple services/service flows such that NFVs may be selected for each.FIG. 5 illustrates anNFV portal 68 in accordance with one non-limiting aspect of the present invention. TheNFV portal 68 may be a webpage or other interface hosted by the MSO and operable with thevirtual platform 12 to facilitate identifying the discovered devices and designing the NFVs operable for association therewith. Access to theNFV portal 68 may be restricted to authenticated or registered users, such as by requiring a username and password combination, token or other construct to be provided in order to associate particular NFVs with the devices. The restricted access may be beneficial in limiting children or other unauthorized users from manipulating operations of the home network or thwarting desired NFV implemented restrictions, e.g., parental controls, firewalls, etc. - The
NFV portal 68 may include a listing of discovereddevices 70, a set of defined users or other groupings such as a group of applications, or other future groupings, and a listing of available NFVs 72. The NFVs may be associated with each device 68 (or other identifiers for signaling amendable to the completed NFV, such as service flows, grouping, applications, etc.) in a drag-and-drop manner whereby a user may click on the desired NFV and drag it to amenu certain device menus device menu - The
NFV portal 68 may include additional customizations or other variables to further define selection of that NFVs desired for each device. This may include altering thedevice menus - The
NFV portal 68 may facilitate selection and association of the NFVs with thedevice menus NFV portal 68 may include a description or link to additional information for the operations performed by each of the NFVs to help the home network administrate differentiate the NFVs. TheNFV portal 68 may include suggested or recommended NFVs for one or more of the devices within a predefined selection menu or listing (not shown), such as to enable the user to drag-and-dropped one of the predefined recommendations to thedevice listing 70 whereby the related NFV(s) would be automatically associated with the corresponding device without the user having to select each NFV. The use of predefined, recommendations may be particularly beneficial for home network administrators lacking technical understanding regarding the nature operations performed by the corresponding NFV. - The NFV(s) associated with particular devices, such as during a prior NFV design process or through selection of a recommended NFV configuration, may be easily removed by dragging and dropping or deleting the corresponding NFV from the
appropriate device listing 68. The ability to remove, add or otherwise alter the NFV designed for a particular device may be beneficial in allowing the home network operator to re-program or to otherwise perform sophisticated operations necessary to implementing the desired changes with a simple drag-and-drop, i.e., the user, particularly one unaware of certain firewall restrictions, may select a particular firewall NFV and thereafter determine it to be unsuitability to its purposes whereby it can be easily changed through the NFV portal in a single operation. TheNFV portal 68 may list historical NFV designs or other prior configurations in a menu (not shown) to further ease burdens on the home network administrator, e.g., a default listing may be selected to return thehome network 18 to a default configuration or the user may set a vacation profile when traveling and a normal profile when home. - The
NFV design process 64 may include associating a chain of events for the NFVs associated with a particular device listing 74, 76, 78. The chain of events may specify an order or sequence in which each NFV is to be performed.FIG. 2 illustrates the NFVs being performed sequentially where a first NFV occurs before a second NFV, however, the NFVs may be implemented in any order to achieve certain/different results. TheNFV portal 68 may facilitate the ordering or chaining of the NFVs according to relative positioning within thedevice listing device listing - After the NFV is designed for each relevant device, user, application etc., the
virtual platform 12 may be configured to facilitate implementing the corresponding NFVs. Thevirtual platform 12 may assess whether to apply certain NFV designs to certain packets depending on information included therein or associated therewith, such as MAC destination/source addresses, IP destination/source addresses, service flow identifiers, VXLAN identifiers, VLAN identifiers, IPv6 flow identifiers, or other information suitable to determining the NFV design appropriate for the corresponding packets, such as an NFV identifier unique to particular NFV chains/designs (multiple devices may be associated with the same NFV identifier if the same NFVs are to be used in the same order). Thevirtual platform 12 may determine the appropriate NFVs through inspection of the transmitted packets, such as by inspecting the corresponding headers and/or payloads or through other mechanisms, such as a packet or other identifier associated with a particular packet stream or added thereto (NFV identifier) independently of the packets so as to ameliorate any privacy concerns with inspecting packet information. - One contemplated process for upstream transmissions may include a device instigating a
transmission 90 of upstream packets to the edge router, whereupon the edge router may instigate asubsequent transmission 92 to thevirtual platform 12 or to another device in thehome network 20. Theedge router 18 may determine the appropriate NFV design and/or perform the NFVs according to instructions provided by thevirtual platform 12 in the event the packets are not to be forwarded thereto. Thevirtual platform 12 may perform anNFV identification process 94 when the packets are forwarded thereto in order to determine the desired NFV design. TheNFV identification process 94 may be performed prior to or upon receipt of the packets as emitted from the device, such as by the device including an NFV identifier or thevirtual platform 12 determining the desired NFV design from information normally included within the packet, i.e., without requiring the device to provide the NFV identifier or to provide any information intended to identify the desired NFV design. AnNFV process 96 may then be performed to implement the virtualizations of the desired NFVs according to the identified NFV design prior to asubsequent transmission 98 of the NFV modified packets. - Another contemplated process for upstream transmissions may include the device instigating a
transmission 102 of upstream packet to theedge router 18 whereupon theedger router 18 performs anidentification process 104 to determine the desired NFV design. The use of the edge router to perform the identification may be beneficial in allowing theedge router 18 to add the NFV identifier to asubsequent transmission 106 of the packets, optionally without otherwise manipulating the packets, so as to remove the identification responsibilities form thevirtual platform 12 and/or to prevent thevirtual platform 12 from having to inspect packets or their contents. Thevirtual platform 12 may thereafter perform aNFV process 108 according to the identified NFV design prior to asubsequent transmission 110 of the modified packets. The NFVs or virtualization may include control plane NFV features that look at packet headers and enforce policy on a network, e.g. where packets are routed or stopped (firewall), QoS, bandwidth, etc., and/or data plane NFV features that may be inserted in the traffic forwarding path and affect the payload of the traffic, e.g., changing IPv4/I Pv6 addresses to IPv6/I Pv4 addresses. - One contemplated process for downstream transmissions may include the
server 22 instigating atransmission 114 of downstream packets to thevirtual platform 12 whereupon thevirtual platform 12 performs anNFV identification process 116 to determine whether an NFV design is associated therewith. As with the upstream transmissions, the originator of the transmission (the server) may include an NFV identifier with thetransmission 114 and/or thevirtual platform 12 may determine the desired NFV design as a function of other information included within the packets, i.e., without requiring the originator to identify the NFV design. Thevirtual platform 12 may thereafter perform aNFV process 118 according to the identified NFV design prior to asubsequent transmission -
FIG. 6 illustrates a messaging diagram for a method of facilitating NFV in accordance with one non-limiting aspect of the present invention. The present invention contemplates the NFV being executed on the home gateway itself, as described above, and/or on thevirtual platform 12 can exist at the ISP cloud, on the home gateway, or a combination of both.FIG. 6 illustrates aservice discovery process NFV design process 134 in a manner similar to that described above whereafter thevirtual platform 12 providesNFV instructions 136 to theedge router 18. Theedge router 18 can not only identify packets or data streams or devices/users/applications, but also effect the NFV before that traffic is sent to the ISP. TheNFV instructions 136 may be sufficient to enable theedge router 18 to perform the desired NFV locally instead of at thevirtual platform 12 and without requiring the home network administrator to program theedge router 18. Upon receipt ofupstream packets 138, theedge router 18 may perform anNFV process 140 according to theNFV design 134 and thereafter transmit 142 the modified packets to theserver 22 without requiring further NFV modifications. Optionally, upon receipt of additionalupstream packets 146, theedge router 18 may perform apartial NFV process 148 whereby theedge router 18 performs some of the NFV specified in theNFV design 134. Theedge router 18 may then transmit 150 partial NFV packets to thevirtual platform 12 whereupon thevirtual platform 12 performs apartial NFV process 152 to complete the remaining NFVs prior to a subsequentupstream transport 154 of the fully modified NFV packets. While not shown, similar processing may be perform for downstream packets whereby theedge router 18 may perform all or a portion of the NFVs designed for downstream packets according to instructions received from thevirtual platform 12. - As supported above, one non-limiting aspect of the present invention contemplates facilitating NFV when a subscriber logons to an MSO portal (website) that reflects that particular subscriber's home environment; devices, users and MSO services/policies that can be applied to those devices and/or users. The devices can be automatically discovered using mechanisms such as LLDP, mDNS, UPnP, DHCP-fingerprinting or other such known methods. Additionally, the subscriber (or a user at the subscriber's premise) can manually enter devices into the portal such that the portal reflects all the devices. Zones may be created by associating one or more devices to a service or policy by some action such as dragging a policy to a device. Users, people that use MSO services behind the subscriber's home gateway, can also be identified on the portal, each with their own login/password credentials. Similarly, an application can be listed on the portal, being identified by some means such as TCP/UDP port number, DPI , or other means. A device and/or a user and/or an application can be paired to a service or policy to create a zone. Most traffic will egress past the home gateway, to the MSO network and onto a site or service in the Internet. The users, applications and devices within a zone can now have a unique marking applied to the traffic to indicate to the MSO, the services that are required. That marking can be a predefined map that indicates one or more VNFs (Virtual Network Function) in the MSO cloud that are chained together so as to enable an Orchestrator at the MSO to arrange the subscriber's data flow.
- The markings for the NFV selection mapping could be accomplished in several ways; a VLAN tag could be added to the Ethernet frame before that frame is encapsulated inside a VXLAN tunnel that connects the Home Gateway to the MSO cloud, such as. Since the VXLAN tunnel has unique tunnel endpoints (IP Addresses defined by the MSO), and since the VLAN information is preserved along the path to the MSO cloud, the MSO knows which subscriber the data flow comes from and the VLAN information indicates which service or services should be applied to that data flow. Hence, every subscriber could theoretically over 16 million subscribers in a single domain. Once the subscriber's traffic arrives to the MSO tunnel terminator, a B/OSS systems identifies the subscriber and authorize the service(s) needed for that data flow. The Orchestrator, part of the Virtual platform, detects which VNFs are needed and available and with the SDN controller, directs the traffic through the VNFs. Those VNFs might be located in the MSO's data center which has massive capacity of servers that can dynamically have Virtual Machines ‘spun up’ as needed and VNFs created on those virtual machines to elastically cover the rise and fall of demand throughout the hours and days.
- The mapping could also use multiple VXLAN tunnels, one tunnel for each ‘service’. Again, since each of these tunnels have a unique identifier, the overall tunnel identifies the subscriber and the individual service tunnels inside the overall tunnel indicate the VNFs (services or policies) to be applied. Alternatively, devices and/or users can be dragged to services/policies on the portal instead of devices/users dragged to the service/policy. Either way, a zone may be created. These zones may be predetermined (with their tagged values) by the MSO before they are made available to the MSO portal. If a subscriber logs onto the portal, using unique credentials that identify permission to make changes, user and devices can be placed into zones. The subscriber may place the children's PC and two tablets into the Parental Control service. The MAC addresses (discovered by the service discovery mechanisms or manually entered) are associated with the device. The user could be authenticated by logging into the portal to establish an authorized data flow from a particular device. This could prevent a child from using a parents tablet and bypassing Parental Control features on the child's tablet.
- HIPnet provides IPv6 support in the home, and service discovery and CER-ID. VXLAN tunnels provide rich layer-2 information, such as MAC addresses to the MSO. The present invention contemplates providing a portal that allows semi-custom features to be applied by the subscriber, dynamically, and utilize high horsepower servers to support hardware accelerators for example for services such as DPI (Deep Packet Inspection). This idea creates zones and maps data flows into zones, which is key to applying services. Analytics can then reveal traffic patterns and can be used to create new services targeted to a group of subscribers that has a high likelihood of success and monetization. The present invention contemplates pushing policies to the home gateway as an alternate idea of hosting all services in the MSO cloud. The MSOs now have unique opportunities for other new services such as controlling or optimizing home wireless remotely (Wi-Fi, Bluetooth, ZigBee, etc. While either SDN or NFV can be used by itself, there is synergy in combining the two technologies. Taken in combination, NFV provides the ‘what’ (virtualization architecture) and SDN provides the ‘how’ (APIs and control protocols) to enable service providers to embrace network virtualization.
- While exemplary embodiments are described above, it is not intended that these embodiments describe all possible forms of the invention. Rather, the words used in the specification are words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the invention. Additionally, the features of various implementing embodiments may be combined to form further embodiments of the invention.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/788,684 US20160006696A1 (en) | 2014-07-01 | 2015-06-30 | Network function virtualization (nfv) |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462019473P | 2014-07-01 | 2014-07-01 | |
US14/788,684 US20160006696A1 (en) | 2014-07-01 | 2015-06-30 | Network function virtualization (nfv) |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160006696A1 true US20160006696A1 (en) | 2016-01-07 |
Family
ID=55017834
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/334,027 Active 2035-05-20 US9832168B2 (en) | 2014-07-01 | 2014-07-17 | Service discovery within multi-link networks |
US14/788,684 Abandoned US20160006696A1 (en) | 2014-07-01 | 2015-06-30 | Network function virtualization (nfv) |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/334,027 Active 2035-05-20 US9832168B2 (en) | 2014-07-01 | 2014-07-17 | Service discovery within multi-link networks |
Country Status (1)
Country | Link |
---|---|
US (2) | US9832168B2 (en) |
Cited By (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160020962A1 (en) * | 2014-07-21 | 2016-01-21 | Alcatel-Lucent Usa Inc. | Management of Virtual CPES |
US20160119166A1 (en) * | 2014-10-28 | 2016-04-28 | Electronics And Telecommunications Research Institute | Method and apparatus for providing gateway function |
US20160226913A1 (en) * | 2015-02-04 | 2016-08-04 | Kapil Sood | Technologies for scalable security architecture of virtualized networks |
CN106059799A (en) * | 2016-05-19 | 2016-10-26 | 西安电子科技大学 | Virtual network mapping method of elastic optical network facing SDN |
US20170161501A1 (en) * | 2015-05-11 | 2017-06-08 | Intel Corporation | Technologies for secure bootstrapping of virtual network functions |
CN106998560A (en) * | 2016-01-25 | 2017-08-01 | 中兴通讯股份有限公司 | A kind of management method, the network equipment and system for virtualizing network function |
US9733975B2 (en) | 2014-04-03 | 2017-08-15 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
WO2017146768A1 (en) * | 2016-02-24 | 2017-08-31 | Centurylink Intellectual Property Llc | System and method for implementing customer control point or customer portal |
CN107294752A (en) * | 2016-04-01 | 2017-10-24 | 中兴通讯股份有限公司 | Realize framework, the method and device of network function communication |
US20170308415A1 (en) * | 2016-04-20 | 2017-10-26 | At&T Intellectual Property I, L.P. | Discovery and Chaining of Virtual Functions |
US9882833B2 (en) | 2015-09-28 | 2018-01-30 | Centurylink Intellectual Property Llc | Intent-based services orchestration |
US9887882B2 (en) * | 2015-06-12 | 2018-02-06 | At&T Intellectual Property I, L.P. | Referent system for devices of an NFV network |
US9948493B2 (en) | 2014-04-03 | 2018-04-17 | Centurylink Intellectual Property Llc | Network functions virtualization interconnection gateway |
US9979602B1 (en) * | 2014-08-25 | 2018-05-22 | Cisco Technology, Inc. | Network function virtualization infrastructure pod in a network environment |
US20180167457A1 (en) * | 2015-06-19 | 2018-06-14 | Nokia Solutions And Networks Oy | Optimizing traffic |
US10078528B2 (en) | 2015-10-06 | 2018-09-18 | Centurylink Intellectual Property Llc | Virtual machine-to-port peripheral device driver for implementing communications between virtual machines and client devices |
WO2018174509A1 (en) * | 2017-03-20 | 2018-09-27 | Samsung Electronics Co., Ltd. | Method for supporting efficient pdu session activation and deactivation in cellular networks |
US10097472B2 (en) | 2016-09-14 | 2018-10-09 | At&T Intellectual Property I, L.P. | Method and system for dynamically distributing and controlling a virtual gateway |
US10104111B2 (en) | 2016-02-17 | 2018-10-16 | Sony Corporation | Network security for internet of things |
US10110710B2 (en) | 2014-04-03 | 2018-10-23 | Centurylink Intellectual Property Llc | System and method for implementing extension of customer LAN at provider network service point |
US10164914B2 (en) | 2016-11-16 | 2018-12-25 | Sprint Communications Company L.P. | Network function virtualization (NFV) software-defined network (SDN) network-to-network interfaces (NNIs) |
US10185599B2 (en) * | 2015-07-07 | 2019-01-22 | Openvpn Technologies, Inc. | Kernel mode accelerator |
US10225327B2 (en) | 2014-08-13 | 2019-03-05 | Centurylink Intellectual Property Llc | Remoting application servers |
CN109842560A (en) * | 2019-04-17 | 2019-06-04 | 中国联合网络通信集团有限公司 | A kind of method and device sending VxLAN message |
CN109906636A (en) * | 2018-02-06 | 2019-06-18 | 瑞典爱立信有限公司 | Method and apparatus for network function |
WO2019153738A1 (en) * | 2018-02-06 | 2019-08-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for a network function |
US10389823B2 (en) * | 2016-06-10 | 2019-08-20 | Electronics And Telecommunications Research Institute | Method and apparatus for detecting network service |
US10419988B2 (en) * | 2015-09-18 | 2019-09-17 | Huawei Technologies Co., Ltd. | Distributed gateways and methods |
US10481938B2 (en) | 2015-05-06 | 2019-11-19 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
US10568061B1 (en) | 2017-03-20 | 2020-02-18 | Samsung Electronics Co., Ltd. | Method for supporting efficient PDU session activation and deactivation in cellular networks |
US10574664B2 (en) | 2017-08-04 | 2020-02-25 | Dish Network L.L.C. | Device zoning in a network gateway device |
US10572284B2 (en) | 2013-03-15 | 2020-02-25 | Centurylink Intellectual Property Llc | Virtualization Congestion Control Framework for Modifying Execution of Applications on Virtual Machine Based on Mass Congestion Indicator in Host Computing System |
US10613892B2 (en) | 2014-08-15 | 2020-04-07 | Centurylink Intellectual Property Llc | Multi-line/multi-state virtualized OAM transponder |
US10645528B2 (en) | 2015-09-18 | 2020-05-05 | Huawei Technologies Co., Ltd. | System and methods for reliable communication with mobility along a predictable route |
WO2020098946A1 (en) * | 2018-11-15 | 2020-05-22 | Huawei Technologies Co., Ltd. | Network node and method for supporting a service based architecture |
US10673978B2 (en) | 2015-05-06 | 2020-06-02 | Centurylink Intellectual Property Llc | Method and system for implementing network experience shifting using shared objects |
US10698569B2 (en) | 2014-04-03 | 2020-06-30 | Centurylink Intellectual Property Llc | System and method for implementing customer control point or customer portal |
US10713076B2 (en) | 2013-11-21 | 2020-07-14 | Centurylink Intellectual Property Llc | Physical to virtual network transport function abstraction |
US10740134B2 (en) | 2018-08-20 | 2020-08-11 | Interwise Ltd. | Agentless personal network firewall in virtualized datacenters |
US10945309B2 (en) * | 2019-03-29 | 2021-03-09 | Intel Corporation | Technologies for providing hardware resources as a service with direct resource addressability |
US10949233B2 (en) * | 2016-06-22 | 2021-03-16 | Ciena Corporation | Optimized virtual network function service chaining with hardware acceleration |
CN113542371A (en) * | 2021-06-29 | 2021-10-22 | 西南大学 | Resource scheduling method and system based on edge gateway |
US11258720B2 (en) * | 2020-05-15 | 2022-02-22 | Entry Point, Llc | Flow-based isolation in a service network implemented over a software-defined network |
US11271807B1 (en) * | 2019-03-14 | 2022-03-08 | Cox Communications, Inc. | Automated installation and configuration of virtual premised servers |
US20220100542A1 (en) * | 2020-09-28 | 2022-03-31 | Vmware, Inc. | Bare metal computer using virtual disk |
US11314570B2 (en) | 2018-01-15 | 2022-04-26 | Samsung Electronics Co., Ltd. | Internet-of-things-associated electronic device and control method therefor, and computer-readable recording medium |
US11593278B2 (en) | 2020-09-28 | 2023-02-28 | Vmware, Inc. | Using machine executing on a NIC to access a third party storage not supported by a NIC or host |
US11606310B2 (en) | 2020-09-28 | 2023-03-14 | Vmware, Inc. | Flow processing offload using virtual port identifiers |
US11636053B2 (en) | 2020-09-28 | 2023-04-25 | Vmware, Inc. | Emulating a local storage by accessing an external storage through a shared port of a NIC |
US11716383B2 (en) | 2020-09-28 | 2023-08-01 | Vmware, Inc. | Accessing multiple external storages to present an emulated local storage through a NIC |
US11863376B2 (en) | 2021-12-22 | 2024-01-02 | Vmware, Inc. | Smart NIC leader election |
US11899594B2 (en) | 2022-06-21 | 2024-02-13 | VMware LLC | Maintenance of data message classification cache on smart NIC |
US11928062B2 (en) | 2022-06-21 | 2024-03-12 | VMware LLC | Accelerating data message classification with smart NICs |
US11928367B2 (en) | 2022-06-21 | 2024-03-12 | VMware LLC | Logical memory addressing for network devices |
US11962518B2 (en) | 2020-06-02 | 2024-04-16 | VMware LLC | Hardware acceleration techniques using flow selection |
US11995024B2 (en) | 2021-12-22 | 2024-05-28 | VMware LLC | State sharing between smart NICs |
US12021759B2 (en) | 2020-09-28 | 2024-06-25 | VMware LLC | Packet processing with hardware offload units |
US12155628B2 (en) | 2016-02-23 | 2024-11-26 | Nicira, Inc. | Firewall in a virtualized computing environment using physical network interface controller (PNIC) level firewall rules |
US12229578B2 (en) | 2021-12-22 | 2025-02-18 | VMware LLC | Teaming of smart NICs |
US12335066B2 (en) | 2014-06-30 | 2025-06-17 | VMware LLC | Methods and systems to offload overlay network packet encapsulation to hardware |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10291697B2 (en) | 2015-11-18 | 2019-05-14 | International Business Machines Corporation | Decentralized discovery across different networks |
EP3430774B1 (en) * | 2016-03-15 | 2019-12-25 | Telefonaktiebolaget LM Ericsson (PUBL) | Method and apparatus for supporting bidirectional forwarding (bfd) over multi-chassis link aggregation group (mc-lag) in internet protocol (ip) networks |
EP3437254B1 (en) * | 2016-03-30 | 2024-10-16 | Intel Corporation | Device and method for nfv life cycle management using configuration management functions |
US11012407B2 (en) * | 2017-10-27 | 2021-05-18 | Dell Products L.P. | System and method of utilizing multiple networks |
CN113162655A (en) * | 2020-01-23 | 2021-07-23 | 华为技术有限公司 | Power line communication time slot distribution method and device |
JP2023533134A (en) * | 2020-05-27 | 2023-08-02 | オッポ広東移動通信有限公司 | Information processing method and apparatus, equipment, computer storage medium |
CN113766432A (en) | 2020-06-04 | 2021-12-07 | 华为技术有限公司 | Multi-link multicast service transmission method and device |
CA3181810A1 (en) * | 2020-06-30 | 2022-01-06 | Mark Stephen GRIFFITHS | Method for providing multicast dns services across ip subnet boundaries |
CN112770408B (en) * | 2021-01-15 | 2023-01-06 | 广州虎牙科技有限公司 | Log transmission method and device, computer equipment and storage medium |
US12010092B2 (en) | 2021-06-24 | 2024-06-11 | Panduit Corp. | Distributed automatic multicast address assignment device and method |
Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060089992A1 (en) * | 2004-10-26 | 2006-04-27 | Blaho Bruce E | Remote computing systems and methods for supporting multiple sessions |
US7260597B1 (en) * | 2000-11-02 | 2007-08-21 | Sony Corporation | Remote manual, maintenance, and diagnostic services for networked electronic devices |
US20120054367A1 (en) * | 2010-08-24 | 2012-03-01 | Ramakrishnan Kadangode K | Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network |
US20120147894A1 (en) * | 2010-12-08 | 2012-06-14 | Mulligan John T | Methods and apparatus to provision cloud computing network elements |
US20120166647A1 (en) * | 2010-12-23 | 2012-06-28 | Electronics And Telecommunications Research Institute | Apparatus for configuring virtual network using network virtualization technique and method thereof |
US8347288B1 (en) * | 2009-12-28 | 2013-01-01 | Amazon Technologies, Inc. | System and method for verification of repeatable virtualized computing |
US20130272305A1 (en) * | 2012-04-16 | 2013-10-17 | Telefonaktiebolaget L M Ericsson (Publ) | Chaining of inline services using software defined networking |
US20130290953A1 (en) * | 2012-04-26 | 2013-10-31 | International Business Machines Corporation | Efficient execution of jobs in a shared pool of resources |
US20140050223A1 (en) * | 2012-08-15 | 2014-02-20 | Futurewei Technologies, Inc. | Method and System for Creating Software Defined Ordered Service Patterns in a Communications Network |
US20140052877A1 (en) * | 2012-08-16 | 2014-02-20 | Wenbo Mao | Method and apparatus for tenant programmable logical network for multi-tenancy cloud datacenters |
US20140092910A1 (en) * | 2012-09-28 | 2014-04-03 | Alcatel-Lucent Usa Inc. | Method And Apparatus For Communication Path Selection |
US20140140344A1 (en) * | 2012-11-22 | 2014-05-22 | Suresh Krishnan | IDENTIFYING NATed DEVICES FOR DEVICE-SPECIFIC TRAFFIC FLOW STEERING |
US20140201374A1 (en) * | 2013-01-11 | 2014-07-17 | Futurewei Technologies, Inc. | Network Function Virtualization for a Network Device |
US20140233387A1 (en) * | 2011-10-28 | 2014-08-21 | Huawei Technologies Co., Ltd. | Method and device for load balance |
US20140259012A1 (en) * | 2013-03-06 | 2014-09-11 | Telefonaktiebolaget L M Ericsson (Publ) | Virtual machine mobility with evolved packet core |
US20140351812A1 (en) * | 2013-05-22 | 2014-11-27 | Fujitsu Limited | Recording medium, management device, and network system |
US20150003455A1 (en) * | 2012-07-24 | 2015-01-01 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for enabling services chaining in a provider network |
US20150106805A1 (en) * | 2013-10-15 | 2015-04-16 | Cisco Technology, Inc. | Accelerated instantiation of cloud resource |
US9055005B2 (en) * | 2013-03-15 | 2015-06-09 | Oracle International Corporation | Virtual-port network switch fabric |
US20150200872A1 (en) * | 2014-01-13 | 2015-07-16 | Cisco Technology, Inc. | Cloud resource placement based on stochastic analysis of service requests |
US20150207586A1 (en) * | 2014-01-17 | 2015-07-23 | Telefonaktiebolaget L M Ericsson (Publ) | System and methods for optical lambda flow steering |
US20150334595A1 (en) * | 2014-05-16 | 2015-11-19 | Cisco Technology, Inc. | System and method for transporting information to services in a network environment |
US20150372911A1 (en) * | 2013-01-31 | 2015-12-24 | Hitachi, Ltd. | Communication path management method |
US20150370586A1 (en) * | 2014-06-23 | 2015-12-24 | Intel Corporation | Local service chaining with virtual machines and virtualized containers in software defined networking |
US20160285764A1 (en) * | 2013-12-10 | 2016-09-29 | Huawei Technologies Co., Ltd | Flow table generating method and apparatus |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009005282A1 (en) * | 2007-07-04 | 2009-01-08 | Lg Electronics Inc. | Interworking procedure with external network in wireless lan and message format for the same |
US8446917B2 (en) * | 2009-05-28 | 2013-05-21 | Qualcomm Incorporated | Methods and apparatus for efficiently communicating information using a proxy |
WO2011007187A1 (en) * | 2009-07-16 | 2011-01-20 | Nokia Corporation | Encapsulation of higher-layer control messages for local area network support into a wide area network protocol |
US9043492B2 (en) * | 2013-02-26 | 2015-05-26 | Dell Products L.P. | Method to publish remote management services over link local network for zero-touch discovery, provisioning and management |
US9479422B2 (en) * | 2013-03-15 | 2016-10-25 | Cable Television Laboratories, Inc. | mDNS-DNS architecture |
-
2014
- 2014-07-17 US US14/334,027 patent/US9832168B2/en active Active
-
2015
- 2015-06-30 US US14/788,684 patent/US20160006696A1/en not_active Abandoned
Patent Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7260597B1 (en) * | 2000-11-02 | 2007-08-21 | Sony Corporation | Remote manual, maintenance, and diagnostic services for networked electronic devices |
US20060089992A1 (en) * | 2004-10-26 | 2006-04-27 | Blaho Bruce E | Remote computing systems and methods for supporting multiple sessions |
US8347288B1 (en) * | 2009-12-28 | 2013-01-01 | Amazon Technologies, Inc. | System and method for verification of repeatable virtualized computing |
US20120054367A1 (en) * | 2010-08-24 | 2012-03-01 | Ramakrishnan Kadangode K | Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network |
US20120147894A1 (en) * | 2010-12-08 | 2012-06-14 | Mulligan John T | Methods and apparatus to provision cloud computing network elements |
US20120166647A1 (en) * | 2010-12-23 | 2012-06-28 | Electronics And Telecommunications Research Institute | Apparatus for configuring virtual network using network virtualization technique and method thereof |
US20140233387A1 (en) * | 2011-10-28 | 2014-08-21 | Huawei Technologies Co., Ltd. | Method and device for load balance |
US20130272305A1 (en) * | 2012-04-16 | 2013-10-17 | Telefonaktiebolaget L M Ericsson (Publ) | Chaining of inline services using software defined networking |
US20130290953A1 (en) * | 2012-04-26 | 2013-10-31 | International Business Machines Corporation | Efficient execution of jobs in a shared pool of resources |
US20150003455A1 (en) * | 2012-07-24 | 2015-01-01 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for enabling services chaining in a provider network |
US20140050223A1 (en) * | 2012-08-15 | 2014-02-20 | Futurewei Technologies, Inc. | Method and System for Creating Software Defined Ordered Service Patterns in a Communications Network |
US20140052877A1 (en) * | 2012-08-16 | 2014-02-20 | Wenbo Mao | Method and apparatus for tenant programmable logical network for multi-tenancy cloud datacenters |
US20140092910A1 (en) * | 2012-09-28 | 2014-04-03 | Alcatel-Lucent Usa Inc. | Method And Apparatus For Communication Path Selection |
US20140140344A1 (en) * | 2012-11-22 | 2014-05-22 | Suresh Krishnan | IDENTIFYING NATed DEVICES FOR DEVICE-SPECIFIC TRAFFIC FLOW STEERING |
US20140201374A1 (en) * | 2013-01-11 | 2014-07-17 | Futurewei Technologies, Inc. | Network Function Virtualization for a Network Device |
US20150372911A1 (en) * | 2013-01-31 | 2015-12-24 | Hitachi, Ltd. | Communication path management method |
US20140259012A1 (en) * | 2013-03-06 | 2014-09-11 | Telefonaktiebolaget L M Ericsson (Publ) | Virtual machine mobility with evolved packet core |
US9055005B2 (en) * | 2013-03-15 | 2015-06-09 | Oracle International Corporation | Virtual-port network switch fabric |
US20140351812A1 (en) * | 2013-05-22 | 2014-11-27 | Fujitsu Limited | Recording medium, management device, and network system |
US20150106805A1 (en) * | 2013-10-15 | 2015-04-16 | Cisco Technology, Inc. | Accelerated instantiation of cloud resource |
US20160285764A1 (en) * | 2013-12-10 | 2016-09-29 | Huawei Technologies Co., Ltd | Flow table generating method and apparatus |
US20150200872A1 (en) * | 2014-01-13 | 2015-07-16 | Cisco Technology, Inc. | Cloud resource placement based on stochastic analysis of service requests |
US20150207586A1 (en) * | 2014-01-17 | 2015-07-23 | Telefonaktiebolaget L M Ericsson (Publ) | System and methods for optical lambda flow steering |
US20150334595A1 (en) * | 2014-05-16 | 2015-11-19 | Cisco Technology, Inc. | System and method for transporting information to services in a network environment |
US20150370586A1 (en) * | 2014-06-23 | 2015-12-24 | Intel Corporation | Local service chaining with virtual machines and virtualized containers in software defined networking |
Cited By (110)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10572284B2 (en) | 2013-03-15 | 2020-02-25 | Centurylink Intellectual Property Llc | Virtualization Congestion Control Framework for Modifying Execution of Applications on Virtual Machine Based on Mass Congestion Indicator in Host Computing System |
US10713076B2 (en) | 2013-11-21 | 2020-07-14 | Centurylink Intellectual Property Llc | Physical to virtual network transport function abstraction |
US10356225B2 (en) | 2014-04-03 | 2019-07-16 | Centurylink Intellectual Property Llc | System and method for implementing isolated service overlays between provider network service point and customer premises |
US10110710B2 (en) | 2014-04-03 | 2018-10-23 | Centurylink Intellectual Property Llc | System and method for implementing extension of customer LAN at provider network service point |
US10698569B2 (en) | 2014-04-03 | 2020-06-30 | Centurylink Intellectual Property Llc | System and method for implementing customer control point or customer portal |
US11212159B2 (en) | 2014-04-03 | 2021-12-28 | Centurylink Intellectual Property Llc | Network functions virtualization interconnection gateway |
US10666772B2 (en) | 2014-04-03 | 2020-05-26 | Centurylink Intellectual Property Llc | System and method for implementing extension of customer LAN at provider network service point |
US9733975B2 (en) | 2014-04-03 | 2017-08-15 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
US10897523B2 (en) | 2014-04-03 | 2021-01-19 | Centurylink Intellectual Property Llc | System and method for implementing isolated service overlays between provider network service point and customer premises |
US9998320B2 (en) | 2014-04-03 | 2018-06-12 | Centurylink Intellectual Property Llc | Customer environment network functions virtualization (NFV) |
US10616377B2 (en) | 2014-04-03 | 2020-04-07 | Centurylink Intellectual Property Llc | System and method for implementing network enhanced gateway functionality |
US9948493B2 (en) | 2014-04-03 | 2018-04-17 | Centurylink Intellectual Property Llc | Network functions virtualization interconnection gateway |
US11381669B2 (en) | 2014-04-03 | 2022-07-05 | Centurylink Intellectual Property Llc | System and method for implementing extension of customer LAN at provider network service point |
US12335066B2 (en) | 2014-06-30 | 2025-06-17 | VMware LLC | Methods and systems to offload overlay network packet encapsulation to hardware |
US20160020962A1 (en) * | 2014-07-21 | 2016-01-21 | Alcatel-Lucent Usa Inc. | Management of Virtual CPES |
US10992734B2 (en) | 2014-08-13 | 2021-04-27 | Centurylink Intellectual Property Llc | Remoting application servers |
US10225327B2 (en) | 2014-08-13 | 2019-03-05 | Centurylink Intellectual Property Llc | Remoting application servers |
US10613892B2 (en) | 2014-08-15 | 2020-04-07 | Centurylink Intellectual Property Llc | Multi-line/multi-state virtualized OAM transponder |
US10929172B2 (en) | 2014-08-15 | 2021-02-23 | Centurylink Intellectual Property Llc | Multi-line/multi-state virtualized OAM transponder |
US9979602B1 (en) * | 2014-08-25 | 2018-05-22 | Cisco Technology, Inc. | Network function virtualization infrastructure pod in a network environment |
US20160119166A1 (en) * | 2014-10-28 | 2016-04-28 | Electronics And Telecommunications Research Institute | Method and apparatus for providing gateway function |
US9560078B2 (en) * | 2015-02-04 | 2017-01-31 | Intel Corporation | Technologies for scalable security architecture of virtualized networks |
US11533341B2 (en) | 2015-02-04 | 2022-12-20 | Intel Corporation | Technologies for scalable security architecture of virtualized networks |
US20160226913A1 (en) * | 2015-02-04 | 2016-08-04 | Kapil Sood | Technologies for scalable security architecture of virtualized networks |
US10397280B2 (en) | 2015-02-04 | 2019-08-27 | Intel Corporation | Technologies for scalable security architecture of virtualized networks |
US12204928B2 (en) | 2015-05-06 | 2025-01-21 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
US11099883B2 (en) | 2015-05-06 | 2021-08-24 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
US11740924B2 (en) | 2015-05-06 | 2023-08-29 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
US10481938B2 (en) | 2015-05-06 | 2019-11-19 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
US11544101B2 (en) | 2015-05-06 | 2023-01-03 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
US10673978B2 (en) | 2015-05-06 | 2020-06-02 | Centurylink Intellectual Property Llc | Method and system for implementing network experience shifting using shared objects |
US11934860B2 (en) | 2015-05-06 | 2024-03-19 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
US10880399B2 (en) | 2015-05-06 | 2020-12-29 | Centurylink Intellectual Property Llc | Method and system for implementing network experience shifting using shared objects |
US9864859B2 (en) * | 2015-05-11 | 2018-01-09 | Intel Corporation | Technologies for secure bootstrapping of virtual network functions |
US20170161501A1 (en) * | 2015-05-11 | 2017-06-08 | Intel Corporation | Technologies for secure bootstrapping of virtual network functions |
US10977372B2 (en) | 2015-05-11 | 2021-04-13 | Intel Corporation | Technologies for secure bootstrapping of virtual network functions |
US10862763B2 (en) | 2015-06-12 | 2020-12-08 | At&T Intellectual Property I, L.P. | Referent system for devices of an NFV network |
US9887882B2 (en) * | 2015-06-12 | 2018-02-06 | At&T Intellectual Property I, L.P. | Referent system for devices of an NFV network |
US10491484B2 (en) | 2015-06-12 | 2019-11-26 | At&T Intellectual Property I, L.P. | Referent system for devices of an NFV network |
US11463317B2 (en) | 2015-06-12 | 2022-10-04 | At&T Intellectual Property I, L.P. | Referent system for devices of an NFV network |
US20180167457A1 (en) * | 2015-06-19 | 2018-06-14 | Nokia Solutions And Networks Oy | Optimizing traffic |
US10185599B2 (en) * | 2015-07-07 | 2019-01-22 | Openvpn Technologies, Inc. | Kernel mode accelerator |
US10791488B2 (en) * | 2015-09-18 | 2020-09-29 | Huawei Technologies Co., Ltd. | Distributed virtual gateways |
US10419988B2 (en) * | 2015-09-18 | 2019-09-17 | Huawei Technologies Co., Ltd. | Distributed gateways and methods |
US10645528B2 (en) | 2015-09-18 | 2020-05-05 | Huawei Technologies Co., Ltd. | System and methods for reliable communication with mobility along a predictable route |
US10673777B2 (en) | 2015-09-28 | 2020-06-02 | Centurylink Intellectual Property Llc | Intent-based services orchestration |
US10250525B2 (en) | 2015-09-28 | 2019-04-02 | Centurylink Intellectual Property Llc | Intent-based services orchestration |
US9882833B2 (en) | 2015-09-28 | 2018-01-30 | Centurylink Intellectual Property Llc | Intent-based services orchestration |
US10705871B2 (en) | 2015-10-06 | 2020-07-07 | Centurylink Intellectual Property Llc | Virtual machine-to-port peripheral device driver for implementing communications between virtual machines and client devices |
US10078528B2 (en) | 2015-10-06 | 2018-09-18 | Centurylink Intellectual Property Llc | Virtual machine-to-port peripheral device driver for implementing communications between virtual machines and client devices |
CN106998560A (en) * | 2016-01-25 | 2017-08-01 | 中兴通讯股份有限公司 | A kind of management method, the network equipment and system for virtualizing network function |
US10104111B2 (en) | 2016-02-17 | 2018-10-16 | Sony Corporation | Network security for internet of things |
US12155628B2 (en) | 2016-02-23 | 2024-11-26 | Nicira, Inc. | Firewall in a virtualized computing environment using physical network interface controller (PNIC) level firewall rules |
WO2017146768A1 (en) * | 2016-02-24 | 2017-08-31 | Centurylink Intellectual Property Llc | System and method for implementing customer control point or customer portal |
CN107294752A (en) * | 2016-04-01 | 2017-10-24 | 中兴通讯股份有限公司 | Realize framework, the method and device of network function communication |
US20170308415A1 (en) * | 2016-04-20 | 2017-10-26 | At&T Intellectual Property I, L.P. | Discovery and Chaining of Virtual Functions |
US11409583B2 (en) | 2016-04-20 | 2022-08-09 | At&T Intellectual Property I, L.P. | Discovery and chaining of virtual functions |
US10430258B2 (en) | 2016-04-20 | 2019-10-01 | At&T Intellectual Property I, L.P. | Discovery and chaining of virtual functions |
US10963321B2 (en) | 2016-04-20 | 2021-03-30 | At&T Intellectual Property I, L.P. | Discovery and chaining of virtual functions |
CN106059799A (en) * | 2016-05-19 | 2016-10-26 | 西安电子科技大学 | Virtual network mapping method of elastic optical network facing SDN |
US10389823B2 (en) * | 2016-06-10 | 2019-08-20 | Electronics And Telecommunications Research Institute | Method and apparatus for detecting network service |
US10949233B2 (en) * | 2016-06-22 | 2021-03-16 | Ciena Corporation | Optimized virtual network function service chaining with hardware acceleration |
US10097472B2 (en) | 2016-09-14 | 2018-10-09 | At&T Intellectual Property I, L.P. | Method and system for dynamically distributing and controlling a virtual gateway |
US10958584B2 (en) | 2016-09-14 | 2021-03-23 | At&T Intellectual Property I, L.P. | Method and system for dynamically distributing and controlling a virtual gateway |
US10469392B2 (en) | 2016-09-14 | 2019-11-05 | At&T Intellectual Property I, L.P. | Method and system for dynamically distributing and controlling a virtual gateway |
US10164914B2 (en) | 2016-11-16 | 2018-12-25 | Sprint Communications Company L.P. | Network function virtualization (NFV) software-defined network (SDN) network-to-network interfaces (NNIs) |
US10568061B1 (en) | 2017-03-20 | 2020-02-18 | Samsung Electronics Co., Ltd. | Method for supporting efficient PDU session activation and deactivation in cellular networks |
US10251147B2 (en) | 2017-03-20 | 2019-04-02 | Samsung Electronics Co., Ltd. | Method for supporting efficient PDU session activation and deactivation in cellular networks |
US11122534B2 (en) | 2017-03-20 | 2021-09-14 | Samsung Electronics Co., Ltd. | Method for supporting efficient PDU session activation and deactivation in cellular networks |
US10595294B1 (en) | 2017-03-20 | 2020-03-17 | Samsung Electronics Co., Ltd. | Method for supporting efficient PDU session activation and deactivation in cellular networks |
US10470152B2 (en) | 2017-03-20 | 2019-11-05 | Samsung Electronics Co., Ltd. | Method for supporting efficient PDU session activation and deactivation in cellular networks |
WO2018174509A1 (en) * | 2017-03-20 | 2018-09-27 | Samsung Electronics Co., Ltd. | Method for supporting efficient pdu session activation and deactivation in cellular networks |
US10849088B2 (en) | 2017-03-20 | 2020-11-24 | Samsung Electronics Co., Ltd. | Method for supporting efficient PDU session activation and deactivation in cellular networks |
US10470153B2 (en) | 2017-03-20 | 2019-11-05 | Samsung Electronics Co., Ltd. | Method for supporting efficient PDU session activation and deactivation in cellular networks |
US11102216B2 (en) | 2017-08-04 | 2021-08-24 | Dish Network L.L.C. | Device zoning in a network gateway device |
US10574664B2 (en) | 2017-08-04 | 2020-02-25 | Dish Network L.L.C. | Device zoning in a network gateway device |
US11314570B2 (en) | 2018-01-15 | 2022-04-26 | Samsung Electronics Co., Ltd. | Internet-of-things-associated electronic device and control method therefor, and computer-readable recording medium |
US11283687B2 (en) | 2018-02-06 | 2022-03-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for a network function to support service discovery using intimacy information |
WO2019153738A1 (en) * | 2018-02-06 | 2019-08-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for a network function |
CN109906636A (en) * | 2018-02-06 | 2019-06-18 | 瑞典爱立信有限公司 | Method and apparatus for network function |
US11526373B2 (en) | 2018-08-20 | 2022-12-13 | Interwise Ltd. | Agentless personal network firewall in virtualized datacenters |
US10740134B2 (en) | 2018-08-20 | 2020-08-11 | Interwise Ltd. | Agentless personal network firewall in virtualized datacenters |
WO2020098946A1 (en) * | 2018-11-15 | 2020-05-22 | Huawei Technologies Co., Ltd. | Network node and method for supporting a service based architecture |
US11271807B1 (en) * | 2019-03-14 | 2022-03-08 | Cox Communications, Inc. | Automated installation and configuration of virtual premised servers |
US10945309B2 (en) * | 2019-03-29 | 2021-03-09 | Intel Corporation | Technologies for providing hardware resources as a service with direct resource addressability |
US11617227B2 (en) | 2019-03-29 | 2023-03-28 | Intel Corporation | Technologies for providing hardware resources as a service with direct resource addressability |
CN109842560A (en) * | 2019-04-17 | 2019-06-04 | 中国联合网络通信集团有限公司 | A kind of method and device sending VxLAN message |
US11258720B2 (en) * | 2020-05-15 | 2022-02-22 | Entry Point, Llc | Flow-based isolation in a service network implemented over a software-defined network |
US11962518B2 (en) | 2020-06-02 | 2024-04-16 | VMware LLC | Hardware acceleration techniques using flow selection |
US11606310B2 (en) | 2020-09-28 | 2023-03-14 | Vmware, Inc. | Flow processing offload using virtual port identifiers |
US12192116B2 (en) | 2020-09-28 | 2025-01-07 | VMware LLC | Configuring pNIC to perform flow processing offload using virtual port identifiers |
US11736566B2 (en) | 2020-09-28 | 2023-08-22 | Vmware, Inc. | Using a NIC as a network accelerator to allow VM access to an external storage via a PF module, bus, and VF module |
US11792134B2 (en) | 2020-09-28 | 2023-10-17 | Vmware, Inc. | Configuring PNIC to perform flow processing offload using virtual port identifiers |
US11824931B2 (en) | 2020-09-28 | 2023-11-21 | Vmware, Inc. | Using physical and virtual functions associated with a NIC to access an external storage through network fabric driver |
US11829793B2 (en) | 2020-09-28 | 2023-11-28 | Vmware, Inc. | Unified management of virtual machines and bare metal computers |
US20220100542A1 (en) * | 2020-09-28 | 2022-03-31 | Vmware, Inc. | Bare metal computer using virtual disk |
US11875172B2 (en) * | 2020-09-28 | 2024-01-16 | VMware LLC | Bare metal computer for booting copies of VM images on multiple computing devices using a smart NIC |
US11736565B2 (en) | 2020-09-28 | 2023-08-22 | Vmware, Inc. | Accessing an external storage through a NIC |
US11593278B2 (en) | 2020-09-28 | 2023-02-28 | Vmware, Inc. | Using machine executing on a NIC to access a third party storage not supported by a NIC or host |
US12021759B2 (en) | 2020-09-28 | 2024-06-25 | VMware LLC | Packet processing with hardware offload units |
US11716383B2 (en) | 2020-09-28 | 2023-08-01 | Vmware, Inc. | Accessing multiple external storages to present an emulated local storage through a NIC |
US11636053B2 (en) | 2020-09-28 | 2023-04-25 | Vmware, Inc. | Emulating a local storage by accessing an external storage through a shared port of a NIC |
CN113542371A (en) * | 2021-06-29 | 2021-10-22 | 西南大学 | Resource scheduling method and system based on edge gateway |
US11995024B2 (en) | 2021-12-22 | 2024-05-28 | VMware LLC | State sharing between smart NICs |
US11863376B2 (en) | 2021-12-22 | 2024-01-02 | Vmware, Inc. | Smart NIC leader election |
US12229578B2 (en) | 2021-12-22 | 2025-02-18 | VMware LLC | Teaming of smart NICs |
US11928367B2 (en) | 2022-06-21 | 2024-03-12 | VMware LLC | Logical memory addressing for network devices |
US11928062B2 (en) | 2022-06-21 | 2024-03-12 | VMware LLC | Accelerating data message classification with smart NICs |
US11899594B2 (en) | 2022-06-21 | 2024-02-13 | VMware LLC | Maintenance of data message classification cache on smart NIC |
US12314611B2 (en) | 2022-06-21 | 2025-05-27 | VMware LLC | Logical memory addressing for network devices |
Also Published As
Publication number | Publication date |
---|---|
US9832168B2 (en) | 2017-11-28 |
US20160006822A1 (en) | 2016-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20160006696A1 (en) | Network function virtualization (nfv) | |
US10587698B2 (en) | Service function registration mechanism and capability indexing | |
EP3917096B1 (en) | Data center tenant network isolation using logical router interconnects for virtual network route leaking | |
EP3219057B1 (en) | Optimized inter-vrf (virtual routing and forwarding ) route leaking in network overlay based environments | |
EP3117562B1 (en) | Zero touch deployment of multi-tenant service in a home network environment | |
EP3692685B1 (en) | Remotely controlling network slices in a network | |
JP7095102B2 (en) | Systems and methods for creating group networks between network devices | |
US9762484B2 (en) | Role based router functionality | |
JP5558485B2 (en) | Operation method of multi-domain provider Ethernet network | |
US11824897B2 (en) | Dynamic security scaling | |
US11792119B2 (en) | Multi-protocol service chaining among devices of interconnected topology | |
US10659255B1 (en) | Identity-based virtual private network tunneling | |
CN106487556A (en) | The dispositions method of business function SF and device | |
EP3799366B1 (en) | Mapping services to tunnels in order to forward packets using a network device | |
Shif et al. | Improvement of security and scalability for IoT network using SD-VPN | |
JP2016012909A (en) | Communication device, communication method and communication system | |
Moser | Performance Analysis of an SD-WAN Infrastructure Implemented Using Cisco System Technologies | |
JP5986044B2 (en) | Network system, communication control method, communication control apparatus, and program | |
KR20170006950A (en) | Network flattening system based on sdn and method thereof | |
US20240007396A1 (en) | Multi-protocol service chaining among devices of interconnected topology | |
Didier | Reference Architectures for Industrial Automation and Control Systems | |
Pandey | SDN Practical Orientation | |
Adekunle et al. | A SECURITY ARCHITECTURE FOR SOFTWARE DEFINED NETWORK (SDN) | |
CN107995085A (en) | A kind of message forwarding method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CABLE TELEVISION LABORATORIES, INC., COLORADO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DONLEY, CHRISTOPHER J.;BERG, JOHN;KLOBERDANS, MICHAEL;SIGNING DATES FROM 20150629 TO 20150707;REEL/FRAME:036581/0688 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STCV | Information on status: appeal procedure |
Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: TC RETURN OF APPEAL |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STCV | Information on status: appeal procedure |
Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |